Lab2.5 (ITF+ Preparation)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following would pose an availability concern to your company's data? (Choose two.) A. Snooping B. Dumpster diving C. Denial of service D. Power outage

C, D. Examples of availability threats include denial of service, power outage, hardware failure, destruction, and service outage.

You are configuring a computer to participate on a network that will connect to the Internet. Which of the following are mandatory? (Choose three.) A. IP address B. Default gateway C. DHCP server D. DNS server E. Subnet mask

A, B, E. For network communications on a TCP/IP network, an IP address and a subnet mask are required. If you want to communicate outside your network, a default gateway is also required. DHCP servers automatically assign clients IP configuration information, and DNS servers resolve host names to IP addresses.

Which of the following are high-level languages used to create programs such as games and operating systems? (Choose two.) A. Interpreted B. Compiled C. Query D. Assembly

A, B. Interpreted and compiled are high-level language types used to create programs. Query languages retrieve data from databases, and assembly is a low-level programming language.

Which of the following actions can you take to increase the security of your web browser? (Choose two.) A. Disable autofill B. Upgrade to the newest version C. Enable cookies D. Enable SSL

A, B. Two things you can do to increase Internet browser security are disabling autofill and upgrading your browser to the newest version. SSL is used by secure websites, but it is not something you enable on a client computer.

Your network administrator tells you that recently there has been an upsurge in Internet-based attacks on your work network. What two actions are most appropriate for you to take to harden your system in this situation? (Choose two.) A. Disable unused services B. Install a hardware lock C. Install antimalware D. Enable encryption

A, C. All four answers are device hardening options. If you are worried about Internet-based attacks, disabling services and installing antimalware are the two best options. These two are the best for preventing attackers from gaining access to your system remotely.

Which of the following are examples of authentication factors? (Choose two.) A. Biometrics B. Signature C. One-time password D. Receipt

A, C. Biometrics and a one-time password are examples of authentication factors. Other examples are passwords, PINs, software tokens, hardware tokens, specific location, and security questions.

When configuring a wireless router, which of the following should you always do? (Choose two.) A. Configure WPA2 B. Enable DNS C. Change the wireless password D. Configure NAT

A, C. You should always configure security, and WPA2 is the best option. In addition, change the wireless password to something secure. Finally, you should always change the SSID and administrator password on a wireless router too.

John purchases a concurrent software license for an application and installs it on his desktop, and then he installs it on his laptop computer. Which of the following statements are true? (Choose two.) A. John can use the application on both computers at the same time .B. John can use the application on both computers, but only one at a time .C. John can only use the application on one of the computers. D. John can share the application with his friends to install on their computers

A, D. Concurrent software licenses allow users to install it on any number of computers. As long as John has enough licenses to run a certain number of copies simultaneously, he's fine.

Which of the following types of storage are nonvolatile? (Choose two.) A. SSD B. RAM C. SODIMM D. HDD

A, D. Nonvolatile means that the contents will not be lost when the power turns off. Hard drives and solid-state drives will retain data even without power. RAM will not, and SODIMMs are a type of RAM.

You recently joined a new company. During your orientation, they tell you that they take computer security very seriously and require biometric authentication. What types of biometric identification are common? (Choose two.) A. Fingerprint B. Urine sample C. DNA testing D. Facial recognition

A, D. Two common types of biometric authentication are fingerprint scanners and facial recognition software. Retinal scanners are also somewhat common but not as much as the other two.

A programmer needs to insert a data point into a program, and the data will change over time. What type of data will the programmer be using? A. Variable B. Constant C. Array D. Vector

A. A variable is a single data point that can change. Constants do not change. Arrays and vectors are containers of multiple data points.

You are at an Internet café, and you are worried that someone is trying to hack your mobile device. What can you do to disable all wireless connections quickly? A. Turn on airplane mode B. Turn on silent mode C. Untether from the Wi-Fi connection D. Press the Home button five times to reset all wireless connections

A. Airplane mode turns off all wireless connections on your mobile device.

Which of the following concepts best describes the question "Who are you?" on a computer network? A. Authentication B. Authorization C. Accounting D. Nonrepudiation

A. Authentication determines who the user is, authorization determines what the user can do, accounting tracks what the user did, and nonrepudiation makes it so someone can't deny that an event happened.

One of your co-workers, Marc, is complaining that whenever he searches the Internet, he always gets directed to the same website, which is not relevant to his needs. What could be the problem? A. His computer has adware. B. He is typing in the wrong search terms. C. He needs to update his browser. D. He needs to disable autofill.

A. Browser and search engine redirection are common symptoms of an adware infection. He should remove the adware immediately.

You just deleted a file from your Work folder on your Mac. What happened to the file? A. It is placed in the Trash but has not moved on the hard drive. B. It is physically deleted from the hard drive. C. It is placed in the Trash and physically deleted from the hard drive. D. It is placed in the Trash and moved from the Work folder to the Trash folder on the hard drive.

A. Deleting a file will move it to the Trash (or the Recycle Bin in Windows). The file's metadata will change to indicate that it now belongs to the Trash folder instead of the Work folder, but the file itself is not physically moved.

A user sees a notice that a web browser extension he is using has a potential security flaw and the developer is working on a patch. What should the user do? A. Disable the extension B. Delete the extension C. Reinstall the extension D. Test the extension with Windows Defender

A. If an extension is not working or needs to be patched, disable it until the patch is available for installation. Deleting it would be fine as well, but this will require more effort to reinstall it once the patch is issued.

You're asked to troubleshoot a PC that's not working properly. You push the power button but don't see anything on the screen or hear any fans spinning. What is the first thing to check? A. Loose cables or connections B. Broken power supply C. Manufacturer documentation D. Internet technical support group

A. It sounds like a power issue. The first thing to check is to make sure that it's plugged in properly. If so, then the most likely cause is the power supply since there are no fans spinning.

Your co-worker Sandeep just read an article about cache memory, but he doesn't remember which one is the fastest. Which one is the fastest? A. L1 B. L2 C. L3 D. They are all the same speed

A. L1 cache is the fastest, as it is closest to the CPU core. The others are away from the CPU core by a bit; therefore, they will not be as fast.

One connector type is so commonly used with printers that it is often called the printer port. What type is it? A. Parallel B. Serial C. PS/2 D. USB

A. Parallel ports became synonymous with printers in the 1990s, and so they often were called printer ports. Printers also used serial ports, and use USB ports today, but those two did not get called printer ports.

You have installed a new video card. What software is required to make the video card work properly? A. Driver B. Plug-and-play C. BIOS D. GPU

A. Peripherals require drivers to work properly. Sometimes Windows will automatically detect and install a driver, which is called plug-and-play.

What is the maximum speed supported by cables connected with RJ-11 connectors? A. 56 Kbps B. 56 Mbps C. 480 Mbps D. 1.5 Gbps

A. RJ-11 connectors are on the ends of phone lines, which connect to modems. The fastest modems produced had speeds of 56Kbps.

Which of the following is not considered to be a password best practice? A. Reuse passwords across sites B. Create an open password reset process C. Require a long and complex password D. Enforce password history

A. Reusing a password across sites increases security risk because if a user's password is compromised, the attacker can use the password for multiple logins. Reusing a password across sites is not recommended. Allowing users to reset their passwords is fine. Password policies should require long and complex passwords and not let users reuse passwords they have used before.

Roku is an example of which type of IoT device? A. Streaming media device B. Medical device C. Modern car D. Security system

A. Roku is a streaming media device.

Which hard drive type uses no internal moving parts? A. SSD B. HHD C. PATA D. SATA

A. Solid-state drives (SSDs) do not have internal moving parts. Conventional hard disk drives (HHDs) do. PATA and SATA are hard drive connectors.

You need to delete a database. Which command is used to do this? A. DROP B. ALTER C. DELETE D. REMOVE

A. Sometimes you need to delete tables or databases, and in database terms this is known as dropping. The DROP command is used to drop a database or table in a database.

When working in a database, which of the following commands is not used for data manipulation? A. ALTER B. SELECT C. INSERT D. UPDATE

A. The ALTER command is used as part of data definition, not data manipulation. The data manipulation commands are SELECT, INSERT, DELETE, and UPDATE.

Which of the following commands best describes the function of the DELETE command in a relational database? A. Deletes a record from a table B. Deletes a field from a table C. Deletes a schema from a table D. Deletes a database or a table

A. The DELETE command deletes records (rows) from a table. To delete a field (column), use ALTER. Tables and databases are deleted with the DROP command.

Which of the following operating systems does not require file extensions to execute a file? A. Linux B. Windows 8 C. Windows 10 D. iOS

A. The Linux operating system does not require file extensions to execute a program.

Where is your computer's hardware configuration and time and date stored? A. BIOS B. CPU C. RAM D. HDD

A. The basic input output system (BIOS) holds configuration information such as the amount of RAM your computer has as well as the time and date.

What is the name of the program that sits on top of the OS, allowing users to execute commands? A. Shell B. GUI C. Source D. Kernel

A. The shell is the program that allows users to execute commands. A graphical user interface (GUI) can be an implementation of a shell. The kernel is the core of the OS.

Which of the following wireless security options is based on the Advanced Encryption Standard (AES) and therefore is the most secure option available on wireless routers today? A. WPA2 B. WPA C. WEP D. TKIP

A. WPA2 is based on AES, and it is he most secure. WPA uses TKIP. WEP is the least secure.

Which type of language is most likely to be used to write a web page? A. Interpreted B. Compiled C. Assembly D. Scripted

A. Web pages are written in markup languages, which are a form of interpreted language.

You just copied a file named Proj1 from the Work directory to the Projects directory on your Windows PC. What happened to the original Proj1 file on the hard drive? A. Nothing B. The file was deleted from the Work directory and placed in the projects directory C. The file was not moved, but a new pointer record was created associating the file with the Projects directory. D. The file was moved to a new location on the hard drive, and it was associated with the Projects directory.

A. When you copy a file, the original file remains intact, and a new version of that file is created elsewhere on the hard drive. The new version is associated with the new folder. Nothing happens to the original.

With which of the following file systems can you rename a file when it's open? A. ext3 B. FAT C. HDDFS D. NTFS

A. With the FAT and NTFS file systems, you cannot rename a file, or change any of the metadata, while the file is open or in use. With ext3 you can. HDDFS is not a file system.

Which of the following is not grouped as business software? A. Word processing software B. Database software C. Project management software D. Accounting software

A. Word processing software is productivity software, not business software.

Word processing software, web browsers, and visual diagramming software are examples of what? A. Productivity software B. Collaboration software C. Utility software D. Business software

A. Word processing software, spreadsheet software, presentation software, web browsers, and visual diagramming software are examples of productivity software.

Which of the following is an example of a char data type? A. a B. abc C. 123 D. 123.123

A. char is short for character, which is a data type for a single character.

What type of expansion card allows your computer to communicate over telephone lines? A. Modem B. NIC C. PSU D. PCIe

A.Modems use telephone lines. A network interface card (NIC) lets your computer participate on a network, either wired or wireless. PSU is a power supply unit, and PCIe is an expansion slot type.

What type of power do internal computer components require? A. AC B. DC C. LVC D. HVC

B .Computer components require direct current (DC). Power supplies convert alternating current (AC) from wall sockets into DC.

Which of the following peripherals are input and output devices? (Choose two.) A. Webcam B. Multifunctional Printer C. Touchscreen D. CRT

B, C. Multifunctional printers and touchscreens are input and output devices. Webcams are input and CRTs are monitors, so they are output only.

Which of the following are not concepts related to nonrepudiation? (Choose two.) A. Biometrics B. Least privilege model C. Signatures D. Software tokens

B, D. Nonrepudiation is making it so that someone can't deny that an event happened. Usually this includes video, biometrics, signatures, or receipts. Least privilege model is an authorization concept, and software tokens are an authentication factor.

Which of the following are basic functions of an operating system? (Choose two.) A. Warn of imminent hardware failure B. Provide environment for software to function C. Provide antivirus protection D. Coordinate hardware components

B, D. Operating systems provide an interface between the user and hardware, coordinate hardware components, provide an environment for software to function, monitor system health, and display file structure and directories for data management.

Mary, a user, has created a SQL query to access data in her database. Which of the following terms best describes the type of access she is using? A. User interface/utility access B. Programmatic access C. Database dump D. Direct/manual access

B. A SQL query is an example of programmatic access to a database.

The network administrator at your company is implementing multifactor authentication. She is going to require users to provide something they know and something they have. What is an example of something they have? A. Password B. Smart card C. Credit card D. Fingerprint

B. A smart card is an example of something you have. Passwords are something you know, and fingerprints are something you are.

Which of the following is the most correct term for the item that can hold multiple variables and does not have a fixed length? A. Container B. Vector C. Array D. Float

B. A vector is a type of container designed to hold variables (or other data). It is not fixed in length, whereas an array is a fixed-length container.

Your boss asks you to decide which new laptops to buy for your company. One requirement is that the laptops should be more resistant to damage from accidental drops. What should you look for? A. HDD B. SSD C. NVRAM D. Carbon fiber cases

B. Although carbon fiber cases would be cool, it's not what's needed here. Solid-state drives (SSDs) are more shock-resistant than conventional hard disk drives (HHDs), so that's what you should go with.

You need to delete a database from a SQL Server instance. Which command should you use? A. REMOVE B. DROP C. DELETE D. ALTER

B. Databases and tables are removed with the DROP command. The DELETE command is used for data within a database. ALTER modifies records within a database. There is no REMOVE SQL command.

Which of the following services makes it possible for you to type in a website name such as and have your computer find the website? A. DHCP B. DNS C. NAT D. APIPA

B. Domain Name System (DNS) resolves host names, such as those found on the Internet, into IP addresses. Without DNS you would need to type in the IP address of every website you wanted to visit.

What is the purpose of file extensions? A. To organize the files when viewing them B. To instruct the operating system on which application to use to open them C. To indicate which operating system these files will work with D. To specify which platform the files will work with

B. File extensions exist so that the operating system knows which application to open for that file to work.

Which of the following is a feature of a file system? A. Disk management B. Naming rules C. Process management D. Access control

B. File system features include compression, encryption, permissions, journaling, and naming rules.

You have a contact list for an online marketing company. It contains names and email addresses for approximately three million people. A team of 20 marketers works with information on the list. Which solution should you use to store the data? A. Spreadsheet B. Relational database C. Word processing software D. Nonrelational database

B. For large quantities of organized, structured data, a relational database is the best solution.

Which of the following units of storage is the largest? A. MB B. PB C. GB D. TB

B. From smallest to largest, the units of storage are bit, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte. Therefore, of the options listed, petabyte (PB) is the largest.

Which high-level language type is read line by line every time it is executed? A. Compiled B. Interpreted C. Query D. Assembly

B. Interpreted languages are not compiled—they are read line by line and interpreted every time they are executed.

Rebecca, your boss, has recently been getting telephone calls from someone in the IT department telling her that her email account needs to be reset and asking for her password. What is this an example of? A. Email support management B. Social engineering C. Password cracking D. Phishing

B. Social engineering is when attackers ask people for information to help them gain access to sensitive information. In this case, it can be an attempt to crack Rebecca's password.

What command would you use on a Windows client to determine your TCP/IP configuration information? A. ifconfig B. ipconfig C. ipinfo D. tcpipconfig

B. The ipconfig command is used on Windows clients to show your IP address and other TCP/IP configuration information.

nterpret the following logic. For data input on someone who is 13 years old, which category will they fall into? if age < 13, then category "Child" else if age < 20, then category "Teen" else if age < 65, then category "Adult" else category "Senior" A. Child B. Teen C. Adult D. Senior

B. The logic says that anyone younger than 13 is a Child, while anyone younger than 20 is an Teen. Since this person is 13 exactly, they are in the Teen category.

Which of the following outlines the structure of the database, such as what tables and fields are included? A. Physical schema B. Logical schema C. Forms D. Primary key

B. The logical schema outlines the structure of the database, such as the tables and their fields (columns), and relationships between tables. The physical schema is the actual tables, columns, and relationships created in the RDBMS.

You are setting up a new Wi-Fi connection on your iPhone. What step do you take after locating the SSID? A. Verify wireless capabilities B. Enter wireless password C. Verify Internet connection D. Turn on Wi-Fi

B. The proper steps in order are to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter wireless password, and verify Internet connection.

You are uploading email to an email server. Which protocol is your computer most likely using? A. IMAP B. SMTP C. POP3 D. HTTP

B. The three email protocols are IMAP, SMTP, and POP3. SMTP is used to upload email to a server. IMAP and POP3 are for downloading email. HTTP is used with web browsers.

Using an Android phone, you want to scroll up. What do you do to accomplish this? A. Swipe up B. Swipe down C. Pinch fingers together D. Start with pinched fingers and separate them

B. To scroll up, you need to "pull" the page down, so swipe down.

You are purchasing a commercial software package for office use. There are 100 computers, but typically only 25 people are online at any given time. What type of software license should you buy? A. Single use B. Subscription C. Concurrent D. Group/site

C. A concurrent license will probably be the best option. A group/site license would work, but it will probably cost more than a concurrent license because you would need to buy it for 100 computers.

In troubleshooting theory, after you establish a theory of probable cause, what do you do next? A. Use external resources B. Establish a plan of action C. Test solutions D. Document the findings

C. After establishing the theory, you need to test solutions. If the solution works or doesn't work, then you establish a further plan of action.

Which of the following is not a basic function of an operating system? A. Monitor system health B. Coordinate hardware components C. Provide antivirus protection D. Display file structure and directions for data management

C. By default, operating systems typically do not provide antivirus protection.

You want to enable backups of your new iPhone to your laptop computer. Which option should you choose? A. iDrive B. iCloud C. iTunes D. iBackup

C. For syncing and backing up iPhones (and iPads), you can use iCloud to back up to the Internet or iTunes to back up to a local computer.

A technician says a desktop computer has fried RAM. Which component most likely caused this? A. CPU B. GPU C. PSU D. PDU

C. Fried components are most likely due to a power supply problem; therefore, the PSU is the best choice.

Which of the following is not a form of intellectual property protection? A. Trademark B. Copyright C. Authentication D. Patent

C. Intellectual property protections include trademarks, copyrights, and patents. Authentication validates the identity of a user.

The computer that Michael uses for his daily work also hosts the printers for four other users on the network. What type of device is Michael using? A. Workstation B. Dedicated server C. Non-dedicated server D. Laptop

C. Michael uses his system as a workstation, but because it provides services to others, it's classified as a server. Since it doesn't function exclusively as a server, it's a non-dedicated server.

You are using Microsoft Edge, and you want to browse a website. However, you don't want to have the website stored in your browsing history. What should you do? A. Log in as someone else to browse the site B. Configure independent browsing C. Use InPrivate D. Use Incognito

C. Microsoft's version of private browsing is called InPrivate. Chrome's version is Incognito.

Which of the following is considered non-structured data? A. Text B. Numbers C. Pictures D. Pictures with metadata

C. Pictures themselves are not searchable—they are just collections of pixels. Therefore, they are non-structured data.

Previously, your network required you to enter passwords for four different systems when you logged on at the beginning of your shift. Now you only need to enter your password once to access all four systems. What is this an example of? A. Multifactor authentication B. Password convergence C. Single sign-on D. Security convergence

C. Single sign-on means that you only have to supply your login credentials once, and the authenticating system passes your credentials on to other systems on the network. It can be convenient for end users, but it can also potentially create security holes.

Your friend recently got a new iPhone and comes over to your house. What app does your friend use to set up a Wi-Fi connection with your wireless router? A. Connections B. Networking C. Settings D. Wi-Fi

C. The Wi-Fi settings are in the Settings app in iOS as well as Android.

In troubleshooting theory, what is the first step toward solving a problem? A. Establish a theory of probable cause B. Test the simple stuff first C. Identify the problem D. Reboot

C. The first step in troubleshooting is to identify the problem. This can involve talking to end users, gathering information, and trying to isolate the problem.

Which of the following terms is not used in relation to wireless networking? A. Bluetooth B. NFC C. Thunderbolt D. RF

C. Thunderbolt is a wired connector type, used for a variety of peripherals. Bluetooth, NFC, and RF are all related to wireless communications.

On an iPhone, which motion allows you to zoom out on a map? A. Tap B. Double-tap C. Pinch D. Reverse pinch

C. To zoom out on a map, you use a pinching motion.

At work, you want to ensure that interns can only access the files specifically created for them and no other files. Which term is most correct in describing this configuration? A. Authorization B. Role-based user access C. Least privilege model D. Mandatory access controls

C. Users should only be given permissions to the resources they absolutely need and no more. This is an example of the least privilege model (which is an authorization concept).

A technician just installed a new scanner on a computer. The light turns on, but it won't scan. What resource should she consult first for more information? A. Her manager B. The computer's documentation C. The scanner manufacturer's website D. Technical community support groups

C. When there is an issue with a hardware component, always check the manufacturer's website for information on solving the problem. It could be a driver issue or another issue for which they will have troubleshooting tips.

You just bought a wireless router off of Craigslist. You want to set it up, but you don't know the password. What should you do? A. Unplug the router and plug it back in B. Use the password reset option in your router configuration utility C. Hold the reset button down for 30 seconds to reset the router D. Use the default password of admin

C. Wireless routers will have a reset button on their bottoms or backs. Press and hold the button for about 30 seconds, and the router will reset to factory specifications.

A laptop will not connect to the local wireless network to access server resources. Which expansion device will help the laptop connect? A. Modem B. WNIC C. Bluetooth adapter D. WLAN card

D. A wireless network card, also called a WLAN card, can be used to connect to a wireless network. Modems are used to connect via phone lines. Bluetooth is not typically used in this wireless manner. There is no WNIC.

You are troubleshooting a PC that powers on, but nothing appears on the screen. You plugged in a working monitor, and it didn't help. Which troubleshooting device may help you find the issue? A. BIOS self-test B. System Restore C. MSCONFIG D. POST card

D. A POST card is a circuit board that you insert into an open slot on the motherboard. It displays a two-digit code to tell you where the system is in the booting process. This is useful when nothing is displayed on-screen.

You want to store some data on a DVD-ROM. Which one will allow you to store the most data? A. SL SS B. DL SS C. SL DS D. DL DS

D. A double-sided, dual-layer DVD-ROM can store more data than the other types listed.

You are creating a table in a relational database. Which of the following is required? A. Foreign key B. Constraints C. Logical schema D. Primary key

D. A primary key is one or more fields whose data is used to uniquely identify a record. Every table in a relational database is required to have a primary key.

Which of the following terms best describes the process that determines what a user can do on a network? A. Nonrepudation B. Accounting C. Authentication D. Authorization

D. Authentication determines who the user is, authorization determines what the user can do, accounting tracks what the user did, and nonrepudiation makes it so someone can't deny that an event happened.

You just installed a new network card in a computer and then installed the driver. Now Windows won't load properly. What should you use to try to resolve the issue? A. Recovery Console B. Recovery Environment C. Safe Mode with Networking D. Safe Mode

D. Boot into safe mode to load Windows without the network card driver. Uninstall the driver and then reboot Windows normally. It should work fine.

A user with a visual impairment wants to make his web browser display brighter than normal colors. What can he do to make this happen? A. Enable pop-ups B. Disable script blockers C. Obtain a valid certificate D. Install a browser extension

D. Browser extensions add functionality to a web browser. Extensions or add-ons are available to help those with visual impairments.

Susan, an administrator at work, wants to create a partition on a hard drive. Which utility should she use? A. Partition Creator B. Device Manager C. Services D. Disk Management

D. Disk Management is used to manage hard drive space, including creating a partition and formatting a hard drive.

Which type of device uses a function (Fn) key to provide specialized input? A. Tablet B. Smartphone C. Gaming console D. Laptop

D. Laptops have a function (Fn) key built in, which allows a single key to have multiple inputs (or functions).

You share a workstation with two other colleagues. Which of the following settings can you enable to ensure that your colleagues never have access to your files? A. File locking B. Share permissions C. Local permissions D. File encryption

D. Local permissions might do the trick, but they are not guaranteed, especially if any of the other users have administrative access. Enabling file encryption will ensure that other users cannot access your files.

What type of document file was created to work across platforms but needs a special software application to create it? A. CAD B. DOC C. TXT D. PDF

D. PDF files were designed to be platform-agnostic, but they do require a special program (a PDF creator) to be created.

Which of the following connectors is not used with display devices? A. DisplayPort B. VGA C. HDMI D. RJ-45

D. RJ-45 is a network connector. DisplayPort, VGA, and HDMI are all video connectors.

Which hard drive connector will give you the greatest speed? A. PCIe B. AGP C. PATA D. SATA

D. Serial ATA (SATA) is faster than Parallel ATA (PATA). PCIe and AGP are expansion slot types.

Which data type is used as control logic within a program? A. Binary B. Char C. String D. Boolean E. Float

D. The Boolean data type is true or false. If a Boolean response is true, a program will perform one task; while if it's false, the program will perform a different task.

Which of the following is a home security camera most likely to be a component part? A. Server B. Domain C. Workgroup D. IoT

D. The Internet of Things is a collection of devices that can be used to gather data for a variety of purposes. Security cameras are likely to participate in the IoT.

Which command is used to create queries in a relational database? A. FIND B. SEEK C. SEARCH D. SELECT

D. The SELECT command is used to create queries to search for data.

What type of expansion slot is used exclusively for video cards? A. PCIe x16 B. PCIe x1 C. PCI D. AGP

D. The accelerated graphics port (AGP) slot was created specifically for video cards. It's since been replaced by PCIe, but PCIe supports more than just video cards.

What external storage connection type requires the external hard drive to supply its own power? A. Thunderbolt B. USB C. FireWire D. eSATA

D. The eSATA connector is the only one that does not provide power. All of the others do.

In which of the following notational systems is the number 1001 written? A. Binary B. Decimal C. Hexadecimal D. Unable to determine

D. The number 1001 could be binary, decimal, or hexadecimal. More information is needed to determine the notational system used for this number.

After downloading and installing a new application, your Windows 10 computer is now booting very slowly. Which tool should you use to check to see which programs are running on startup of Windows? A. Recovery Console B. Safe Mode C. Startup Editor D. MSCONFIG

D. The system configuration utility, or MSCONFIG, allows users to see which applications are loading at the startup of Windows. If too many programs load on startup, it will slow down the boot process.

Which of these connections is the slowest? A. HDMI B. USB C. RJ-45 D. RJ-11

D. Used with modems and capped at 56 Kbps, RJ-11 is the slowest connection. RJ-45 is another communications connector, but you can get 1 Gbps out of it. USB can transmit at 10 Gpbs and HDMI at 18 Gpbs.

While troubleshooting a computer with macOS, you boot up and receive the prohibition icon (a red circle with a line through it) and an error code. What should you do next? A. Replace the hard drive B. Replace the memory modules C. Reinstall macOS D. Search for the error code online

D. When you receive the prohibition icon, it means that there has been a system failure of some sort (usually not related to the hard drive). Search for the error code online to understand what could be causing the problem.

Which data type consists of only a single character? A. String B. Float C. Single D. Char

D. char is short for character, which is a data type that contains only a single character.


संबंधित स्टडी सेट्स

CHM102 MasteringChemistry Ch. 14

View Set

IBC Chapter 10 - Means of Egress

View Set

Starting a Business - Sole Proprietorship

View Set

MGMT 311 Final / Quiz 3 Questions

View Set

4A - Understanding of Information Technology (IT). Questions from review

View Set

Public Speaking- Chapter 8: Outlining and Organizing

View Set

Capitalization and Quotation Marks

View Set