it fundamentals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the maximum working range of a Class 3 Bluetooth device?

1 meter

Which of the following is the binary number equivalent of the hexadecimal number F5C8?

1111010111001000

Which of the following 802.11 standards measures its maximum transfer rate in Gbps (gigabytes per second)?

802.11ac

Lydia, a programmer, is using a two-dimensional array to store a user's status for their chat program. As a container, an array is a special kind of variable that can store many values. Lydia created the following: declare user(40,2) as a string Which of the following is true about containers?

A container is an identifier that is used to reference the user array.

What is the basic difference between a switch and a router in a Small Office Home Office (SOHO) network?

A switch sends data to a device on the network; a router sends data to another network.

Which of the following is true of ADSL?'

ADSL has asymmetric speeds.

Which of the following CPU types does Nvidia's Tegra fall under?

ARM

After working for a large corporate company for years, Tom has decided to start his own consulting company. He has hired a few people and has a list of loyal customers. He realizes he's going to need some software tools to help him run his new company efficiently. He needs software that can process orders, do business accounting, and run his payroll. He also needs software to organize sales leads and contacts.

Accounting and commercial software

A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users. Which of the following is the BEST approach to solving these problems?

Approach each problem separately.

A programmer is developing a program that will list the order history for a customer. Which of the following data structures is the BEST one to use?

Array

April, a programmer, wants to convert the binary number 1111001101011011 to a hexadecimal number. What is the recommended first step to perform this conversion manually?

Break up the binary number into chunks of four digits.

Hannah is the manager of a successful Thai cuisine restaurant. It's November and Hannah wants to begin reviewing salary expenses for the year. She decides to generate a payroll report for all her employees. Which of the following types of business software could easily provide Hannah with the report she needs?

Business accounting software

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

CD or DVD installation

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Cipher text

Object-Oriented Programming (OOP) is a newer approach to programming where functionality is divided into smaller groups of tasks and actions. With OOP, you can model real world objects in a programming language. There are two main concepts. The first is like a template, and the second is the specific models built from the templates. What are these two concepts called?

Classes Object

Which of the following is the BEST example of using an application that is locally installed without network access?

Creating a PowerPoint presentation for a team meeting.

There are several processes related to database usage. Which of the following involves the information stored in a database, where the database is hosted, and how clients can access the data?

Creation

What do you call any type of storage, whether it is an internal hard drive, an internal optical drive, an external drive, a thumb drive, or a memory card, that has been shared on a computer connected to a network for other computer to use?

DAS (direct attached storage)

Which of the following display devices uses adjustable mirrors along with a light source and color filters to display the correct image?

DLP

April is a database manager who wants to insert some new records (rows) into the company's customer contact database. Instead of using a database client to insert the records, she wants to use a command.

DML (Data Manipulation Language)

Which of the following chips is responsible for processing audio input from a microphone and converting it into data?

DSP

Which of the following are optical storage devices? (Select three.)

DVD BD CD

Which of the following terms describes the set of SQL commands that change the structure or schema of a database, such as the DROP command?

Data Definition Language (DDL)

What group of database commands is used to define and modify metadata?

Data definition

A systems engineer wants to set up an array of hard disks with the same service (and its associated data) stored on each disk. If one disk fails, the service can still be accessed by another hard disk in the array. Which of the following BEST describes this type of fault tolerance strategy?

Data redundancy

Given the numerical value 1010101.11, which of the following number systems is MOST likely represented?

Decimal

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)

Details Processes

You are replacing your graphics card and have uninstalled the driver using the software package. You want to verify that the device is fully uninstalled. Which of the following would be the BEST place to verify the graphics card has been fully uninstalled?

Device Manager

While editing a report in Google Docs, April receives a web browser error message that there's a conflict with a Google add-on that she frequently uses. Which of the following is the BEST solution for April to resolve the error message issue and continue editing the report?

Disable the add-on while editing the report.

Ryan has a Google Docs account and has created a family history spreadsheet to manage important family dates (such as birthdays and anniversaries). He has given full access to the spreadsheet to several family members to keep the information updated. Which of the following BEST describes this type of access model?

Discretionary access control

What does the following JavaScript code snippet do when the code is loaded in a browser?

Displays the text "My JavaScript Button" and a button labeled "Click me!"

A database administrator for a graphics design firm wants to create a database for storing several kinds of files, including photographs, videos, audio files, design documents, and contracts. Which of the following database types is designed for storing these types of files

Document database

An IP address is represented by four numbers between 0 and 255 separated by periods. What is another name for this type of representation?

Dotted decimal notation

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Encryption Authentication

When resetting a password for a website, which of the following are the MOST likely security identification requirements that you need to meet before the password can be changed? (Select two.)

Enter a security code. Answer a security question.

A database administrator wants to export the data in a product airline schedule database into a Microsoft Excel spreadsheet. Which of the following methods would allow the administrator to perform this task?

Export a database dump to a CSV file; then import the CSV file into the spreadsheet.

April wants to protect her Small Office Home Office (SOHO) network from malicious data that could enter her network and impact her business. Which of the following provides the BEST solution for protecting her computer from malicious data?

Firewall

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall

For many years, computers placed data on hard drives magnetically using platters coated with an iron oxide. Modern computers are now using the more modern solid-state drives, which are faster and less prone to mechanical failures. Which component is used inside a solid-state drive to store data?

Flash memory

Which of the following reflects the inverted hierarchical tree structure of Domain Name System (DNS) servers?

Fully qualified domain name (FQDN)

Julien, a programmer, was fixing a bug in the programming code written by another developer. He discovered that the code with the bug was repeated several times. Instead of fixing the bug in multiple places, which of the following programming features should he use so the code is only located in one place?

Functions

What is the number of instructions a CPU can perform per second measured in?

Hertz

Which of the following are examples of newer devices that are often automated using (Internet of Things) IoT technology? (Select three.)

Home appliances Security Systems Streaming media devices

When Sally walks into her house, she uses her voice to turn on lights and to tell her TV to turn on the news. What are these examples of?

Home automation

Identifying the problem is the first step in CompTIA's troubleshooting model. Which of the following are tasks associated with this step? (Select three.)

Identify symptoms Question users Duplicate the problem

Martin, a software developer, is working on a programming function that takes input and displays a message based on which input the user enters. The input is the primary colors, red, blue, and green. Which is the BEST programming construct to use?

If

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

A network engineer has set up a network at company headquarters to service all employees. Which of the following BEST describes this type of network topology?

LAN

Classes contain properties, which are the attributes or characteristics that objects can hold as fields or private variables.

Methods are used to read or write properties.

Modern smartphones are amazing devices. They have more computing power than the computers that put a man on the moon in 1969. Which type of operating system do they run?

Mobile OS

Which of the following is available in Windows to provide usage restrictions for data files?

NTFS Permissions

A computer system can be interconnected to other computer systems for the purpose of sharing information with each other. What are these computer systems called?

Network Clients

Cindy wants to use a database to store and retrieve information for a research project. She has gathered photos, newspaper articles, interviews, and notes. The information does not appear to have a clear pattern. Which of the following types of data does Cindy want to store?

Non-structured

You are using your new scanner to scan a text document so you can edit it on the computer. Which type of software would you use to do this?

OCR

A business is requesting confidential information from a customer to complete an online transaction. Which of the following is the MOST important action the business should take as part of their information request?

Obtain permission from the customer to process and store the confidential information.

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Open-source Software

Personnel management policies provided by Human Resources contribute significantly to security in a company. Which of the following is the personnel management policy type that communicates the importance of security to employees?

Operation

One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process?

Output

Which of the following divides a single physical disk into multiple logical drives called volumes?

Partitioning

The password policy below incorporates the following: Passwords must include at least one capital letter Passwords must include a mix of letters and numbers Passwords must be different from the past eight passwords Passwords must contain at least one non-alphanumeric character Which of the following password best practices are being used? (Select TWO).

Password history Password complexity

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process?

Perform a backup.

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

In most operating systems, what is a running application called?

Process

Which of the following helps you determine your level of software product technical support?

Product ID

In addition to having a good backup that can restore files that have been encrypted as a result of a ransomware attack, which of the following is one of the BEST ways to avoid being threatened to pay a ransom?

Protect confidential company information

Carol is connecting to a wireless network from her Windows 10 laptop and wants to make sure that her laptop is hidden from other computers on the network and that file sharing is disabled. Which of the following wireless network options should Carol select to enable these features?

Public

Which of the following programming languages are interpreted languages? (Select three.)

Python JavaScript Ruby

A relational database has become corrupted, and now the database administrator needs to import the most recent database backup to fix the issue. Which SQL command can the administrator use to perform this task?

RESTORE

Which type of port is used on an NIC to connect a computer to the network with unshielded twisted-pair cables?

RJ-45

Brandon, a technician, has recently noticed that the wireless network in the office has slowed down. What could he do to support faster connections?

Reduce any possible EMI

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?

Redundacy

A graphic designer is backing up some video files from a Windows desktop to a new 128-gigabytes flash drive. An error message appears indicating that a 6-gigabyte video file cannot be copied due to file size limitations. The graphic designer contacts the company help desk for a solution to the problem. Which of the following would be a solution that the help desk could offer?

Reformat the flash drive to use an NTFS file system.

Rebecca has noticed that her new computer is beginning to run slower than when she first purchased it, especially when using business applications from her hard drive. Which of the following would be the BEST solution to help speed up the processing time on the new computer?

Remove (uninstall) any unnecessary software.

A company executive has been experiencing slowness when her laptop boots. After performing some diagnostics and troubleshooting, you determine the hard drive has sufficient free space and it is rated as a 5400 RPM drive. You decide to defragment the hard drive. After the drive is defragmented, the laptop boot performance has not improved. Which of the following internal computing components would MOST LIKELY resolve the performance issue?

Replace the hard drive with an SSD

Peter is a regional sales manager for an online clothing retail company. He would like information on all the customers in his region and the purchases made by each of them during the last quarter. Which of the following database elements can BEST provide the information Peter needs?

Report

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Reports

A network administrator has verified the integrity of data restored from a backup to a network server and synchronized the data to a RAID system. Which of the following is the next step in the disaster recovery process?

Restore normal user access to the data.

You are in the process of purchasing several new Windows-based computers to replace broken or outdated computers. You have heard that solid state drives (SSDs) can significantly increase the overall performance of the system. Which of the following BEST describes the features of solid state drives (SSD) compared to hard disk drives (HDD)? (Select TWO).

SSD opens files faster than HDD. SSD uses flash technology to store data.

Which of the following is a database concept that allows for storage and analysis for a few dozen to billions of data points?

Scalability

Which of the following provides the ability to control which websites can run client-side scripting in your web browser?

Script blocker add-on

You are troubleshooting a client's issue. Whenever she tries to double-click on a folder, the folder highlights but does not open. Your client gets frustrated because she has to keep clicking until the folder finally opens.

Select a slower double-click speed in Mouse Properties.

Which type of data have elements in common but do not fit into rigid rows and columns in a table?

Semi-structured

Which of the following flow chart concepts is depicted below?

Sequence

Pamela decides to download and install a sound editor for free. However, once she installs and starts the program, a message is displayed indicating that she has 30 days to register the software to continue using it. Which type of software has Pamela installed?

Shareware

Which of the following are examples of Type 1 (something you know) identification? (Select two.)

Single use passwords PII (personally identifiable information)

A systems engineer is part of a company team creating a business continuity plan to recover critical data in case of a natural disaster. Which of the following fault tolerance methods should the team include in the plan to be able to recover data? (Select two.)

Site redundancy Replication

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC?

Task Manager

A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?

The data can be organized into separate tables that are related to each other.

When composing an email message, why might you want to use the Bcc field?

To copy the email confidentially

Which of the following are important reasons for reading the documentation before installing an application on your computer? (Select two.)

To make sure that you have a valid software agreement or license To make sure that the application is compatible with your operating system

You are backing up a database that uses a relational database management system (RDBMS). Which of the following do you need to back up in addition to the database's data?

Transaction logs

Which of the following internet protocols makes sure that data packets are assembled on the receiving end in the correct order so that a complete data package is delivered?

Transmission Control Protocol (TCP)

Which of the following SQL commands would change the title of a movie in a Movies relational database from "The Education of Rita" to "Educating Rita"?

UPDATE Movies SET movie_title = "Educating Rita" WHERE id=124

Which of the following Unicode character encoding standards is MOST commonly used for building web pages?

UTF-8

A system administrator has Windows 10 running on all company laptops and desktops and is using Windows Defender as the default firewall on each individual computer system. However, the IT department has just purchased a third-party firewall to install and use on company laptops and desktops. Which of the following is a best practice that the system administrator should perform to make sure that the new third-party firewall works properly?

Uninstall Windows Defender to avoid conflicts.

Which of the following provides data encryption for an entire device such as a hard drive or optical drive?

Whole disk encryption

Email and instant messaging (IM) seem to be very similar. What is the major difference between the two communication systems?

With instant messaging, you and the message recipient are logged into the same sever.

Which of the following video standards provided resolutions up to 1024x768, color depths up to 32 bits, and higher refresh rates when it was released?

XGA

When using an if...else statement or a while loop, a programmer must test for a certain condition to be true. In the following pseudocode example, which line contains the condition? program guessMyFavoriteColor declare favoriteColor equal to Yellow declare guess read guess from user do while (guess does not equal favoriteColor) display "You guessed my favorite color" else display "That is not my favorite color" end while end program

guess does not equal favoriteColor

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

import random


संबंधित स्टडी सेट्स

Entrepreneurship Ideas In Action Chapter 3

View Set

11. Quantitative vs. Qualitative Research Methods

View Set

Davis Ch 47: Crisis and Violence

View Set

Patho - Final Exam - Combined Sets

View Set

Aultman - Intro to HC - Final Review

View Set