COMP TiA Fundamentals

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

OSI Layers (1 to 7)

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

Structured Query Language (SQL)

A language used to create and manipulate databases.

Programmatic access

A software application can interact closely with a database either using SQL commands or using SQL commands stored as procedures in the database.

How does a search engine work? A) A search engine usually works by compiling a database of information about web pages. B) A search engine usually works by searching a web cache in real-time to get the most current results. C) A search engine accesses a collection of web pages and downloads them to your computer for viewing. D) A search engine usually works by compiling a group of web pages and bookmarking them in your local cache for quick access.

A) A search engine usually works by compiling a database of information about web pages.

When considering application interaction, an example of programmatic access can be best defined as what? A) A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database. B) Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS C) An application might use a database "in the background" without the user really being aware of its presence. D)Providing a GUI for users to select actions to perform on the database, which then converts those selections to the SQL statements that will be executed.

A) A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.

What functionality can turn off a mobile device's Wi-Fi without shutting off the device? A) Airplane mode B) Screen lock C) Forget network D) HPSA+

A) Airplane mode

Which of these is a plain text file a website creates when you visit it? A) Cookie B) URL C) UNC D) Donut

A) Cookie

Which of these is an Availability concern? A) Destruction B) Replay C) Snooping D) Impersonation

A) Destruction

Which of these is a protocol used to upload and download files between clients and servers? A) FTP B) OCR C) HFC D) NFC

A) FTP

Which of these is a Business Continuity concern? A) Fault tolerance B) Data restoration C) Restoring access D) Prioritization

A) Fault tolerance

Mobile devices detect the device's movement by using accelerometers and what other device? A) Gyroscopes B) Stethoscope C) Oscilloscope D) Bathyscope

A) Gyroscopes

How is open source code used by developers? A) It is code used by developers that they have the rights to modify without requiring permission to meet their project needs. B) It is unique code built from scratch by developers which must then be submitted and approved by a vendor prior to use in a live environment. C) It is code used by developers that must be paid for prior to use, and has restrictions in place in regards to modification. D) It is custom code modified by a developer to use in a project that is considered proprietary to a vendor and a license is required.

A) It is code used by developers that they have the rights to modify without requiring permission to meet their project needs.

What type of address identifies a network interface in the context of the local network segment only? A.A Media Access Control (MAC) B.IP address C.DNS D.URL

A.A Media Access Control (MAC)

You want to use a website that hosts training modules in a custom media format. What type of add-on would you need to install to play this media? A.A Plug-in B.An Extension C.A Theme D.A Cookie

A.A Plug-in

What is a zip file? A.A file archive containing other files in a compressed format. B.A Windows installer file used to install and uninstall software applications. C.A container file format designed to deliver Flash Video. D.An image file format most widely used for photographic pictures.

A.A file archive containing other files in a compressed format.

What sort of device could you use to expand the storage capacity of a smartphone? A.A flash memory card B.An extra battery C.An SSD D.A SIM card

A.A flash memory card

Java

An object-oriented programming language designed specifically for programs (particularly multimedia) to be used over the Internet. Java allows programmers to create small programs or applications to enhance websites.

Which non-discretionary access control type is based on the idea of security clearance levels? A.Role-based Access Control (RBAC) B.Discretionary Access Control (DAC) C.Mandatory Access Control (MAC) D.Rule-based access control

C. Mandatory Access Control (MAC)

COBOL

Common Business Oriented Language, considered a compiled programming language, you must transform the code to an executable binary before it can run.

What is the CIA triad?

Confidentiality, integrity, and availability. Which are the elements of the information system that each organization is trying to protect.

Direct/Manual Access

Connecting directly to a database using administrative tools, and running SQL commands

Which protocol allows people to use names/labels, rather than numeric addresses, to address network resources? A.URL B.IP address C.MAC address D.Domain Name System (DNS)

Domain Name System (DNS)

top-level domain (TLD)

Identifies the type of organization associated with the domain.

Hypertext Markup Language (HTML)

Language used to compose Web pages.

Query/Report Builder

Provides a GUI for users to select actions to perform on the database, and convert those selections to SQL statements that will be executed.

File path

The file path portion of the web address specifies the directory and file name location of the resource on the designated host.

eXtensible Markup Language (XML)

The markup language designed to transport and store data on the Web.

What are routers used for?

Transmit data between different networks. They are responsible for the forwarding function used in packet switching.

CSS (Cascading Style Sheets)

a HTML language that can be used to style a web page via changes in colors, sizes, spacing, fonts, and more

Symmetric

a form of encryption where a single secret key is used to both encrypt and decrypt data, therefore, symmetric encryption is reversible.

Cryptographic hash

designed to make it impossible to recover the original data from the hash and ensure that no two pieces of information produce the same hash. It can be used to prove that a message has not been altered or to store information like passwords within a database.

peer-to-peer

file sharing, clients contribute a certain amount of storage space and bandwidth. Each client can then search for and download or upload files.

Open Document Format (ODF)

files are associated with word processing applications.

Asymmetric

form of encryption where a private key is used to decrypt information that has been encrypted using a public key. Asymmetric encryption is reversible when using the private key.

NTFS file system

has a 64-bit addressing scheme which allows much larger partitions (up to 2 TB) than FAT. It also has extended attributes that allow for file-level security permissions, compression, and encryption. Windows 10 must be installed to an NTFS partition.

<p>

indicates the content is a paragraph block-level element. These are typically used for general text on a webpage

C#

is considered a compiled programming language, you must transform the code to an executable binary before it can run.

C++

is considered a compiled programming language, you must transform the code to an executable binary before it can run.

Display tab

is part of the System settings and is used to adjust screen resolution, scale, and layout.

IP address

is the result of the DNS resolution of the host location from the web address. People prefer web addresses, while networks need IP addresses.

TWAIN

it is not the function of a scanner. It is software that acts as the plug-and-play feature of scanners to connect to your computer. Older scanners use TWAIN-based software to interface with a computer.

Telnet

network protocol that allows users to log onto another computer on the same network, including over the Internet.

Transmission Control Protocol (TCP)

part of the transport layer, which provides communication sessions between computers.

Internet Control Message Protocol (ICMP)

responsible for sending messages and reports on errors regarding the delivery of packets.

Optical Character Recognition (OCR).

software to convert a text image into a computer-editable text document.

FTP (File Transfer Protocol)

uploads and download files between clients and servers.

Address Resolution Protocol (ARP)

used to resolve a host's local Media Access Control (MAC) address to a logical IP address.

The FAT-32 files system

was used for older versions of Windows, and is preserved under Windows 10 for compatibility.

Replay Attack

where a host captures another host's response to some server, and replays that response in an effort to gain unauthorized access. This is an Integrity concern.

The ext file system

The ext file system can be found on most Linux distributions.

Data Definition Language (DDL)

A collection of instructions and commands used to define and describe data and relationships in a specific database. Add to or modify the structure of the database

What is the purpose of BIOS? A) It is the firmware that drives the bootstrapping process. B) It is the software that allocates memory to applications. C) It is the hardware used to transfer data from the CPU to other components on the motherboard. D) It is the instruction set of the CPU that decodes each instruction and decides whether to execute it or send it on.

A) It is the firmware that drives the bootstrapping process.

Which of these is an Integrity concern? A) Man-in-the-middle B) Social engineering C) Wiretapping D) Denial of service

A) Man-in-the-middle

Which of the following is NOT considered to be a measurement of file size? A) MicroByte B) KiloByte C) MegaByte D) GigaByte

A) MicroByte

What do we call an online network where instead of a central server, each client contributes resources to the network? A) Peer-to-Peer B) Smartsheet C) FTP D) Telnet

A) Peer-to-Peer

Which of the following would NOT be defined as an input device? A) Printer B) Keyboard C) Mouse D) Biometric Scanner

A) Printer

Select the one UNTRUE statement in regard to system memory. A) RAM is random access memory and is non-volatile storage. B) System memory is much faster than accessing data in a mass storage system, such as a hard disk. C) If there isn't enough room in RAM, the memory space can be extended by using virtual memory. D) Memory is the main storage space for programs and data when the computer is running.

A) RAM is random access memory and is non-volatile storage.

In the area of workplace surveillance, what is monitoring data communications and employee's behavior called? A) Security assurance B) Monitoring data C) Physical monitoring D) Eavesdropping/wiretapping

A) Security assurance

Which of these is a Confidentiality concern, as defined in the "CIA Triad"? A) Snooping B) Destruction C) Replay D) Impersonation

A) Snooping

What is the purpose of Task Scheduler? A) Task Scheduler is used to schedule tasks to run at a specific time. B) Task Scheduler is used to open applications on demand. C) Task Scheduler is used to exit an application that is not responding. D) Task Scheduler is used to schedule appointments in the Outlook Calendar.

A) Task Scheduler is used to schedule tasks to run at a specific time.

What three elements are required for a computer to perform useful tasks? A) The hardware, software, and the computer's user. B) The computer, Central Processing unit (CPU), and Random Access Memory (RAM). C) The Hardware, monitor, and printer. D) A Mouse, keyboard, and the Central Processing Unit (CPU).

A) The hardware, software, and the computer's user.

How can you modify your File Explorer options to allow you to view hidden files? A) Use the View tab under the File Explorer Options applet. B) Modify the properties of the File Explorer window by clicking on the Properties button. C) Select the hidden files in the File Explorer window, right-click, and select view. D) Use the Change Security and Maintenance Settings in the Control Panel.

A) Use the View tab under the File Explorer Options applet.

If you do not have a support contract, what is likely to be the best option for obtaining advice about a problem with an application? A)A product support or community forum B)Download a free application fix-it tool off the Internet C)Delete and reload the application D)Obtain a copy of the application from a third-party vendor

A)A product support or community forum

What is a typical speed for a mid-range CPU to run at? A)Around 2 GHz; budget models might run as low as 1 GHz, while faster ones run at 3 or 4 GHz. B)Around 2 MHz, if you overclock it. Most still run at 1 MHz. C)Around 4 GHz for each core processor. D)1.21 Gigawatts.

A)Around 2 GHz; budget models might run as low as 1 GHz, while faster ones run at 3 or 4 GHz.

Which notation system supports presenting the largest numbers using the fewest digits? A)Hexadecimal B)Decimal C)Binary D)KiloByte

A)Hexadecimal

What part of the process of data analytics is most closely supported by meaningful reporting? A)Insights B)Data C)Information D)Correlation

A)Insights

Which data type provides for whole numbers only? A)Integer B)Boolean C)Hexadecimal D)Secondary

A)Integer

What type of mouse would you recommend for someone who uses their computer principally to play computer games and why? A)Laser mouse — this registers cursor movements more quickly and accurately. B)Mechanical mouse — it requires less wrist movement and you don't need a mouse pad. C)A stylus mouse — as its accuracy is high and can easily be moved around the input field. D)Optical mouse — it senses movement relative to a surface using light instead of a roller ball.

A)Laser mouse — this registers cursor movements more quickly and accurately.

You have to open a word processing application, but you cannot see an icon on the desktop. What should you do? A)Look for the shortcut in Start Menu or Start Screen. B)Right-click on the desktop, go to view, and change the icon size to large. C)Double click the Blue E or Orange Fox in your taskbar, and search for the icon on the internet. D)Look for the shortcut in the C: drive of the computer.

A)Look for the shortcut in Start Menu or Start Screen.

You have just bought a new computer but want to use the older version of Windows that came with your previous computer. Windows was provided as an OEM license. Can you use this license key to install the software on your new PC? A)Original Equipment Manufacturer (OEM) licenses can only be used on the brand and model it was initially installed on. B)Original Equipment Manufacturer (OEM) licenses can be transferred between different computers, just not at the same time. C)Original Equipment Manufacturers (OEM) licenses are only used in Enterprise environments, prohibiting use on a new computer. D)Original Equipment Manufacturer (OEM) licenses are authorized for use on multiple computer systems at the same time, enabling use on the new computer.

A)Original Equipment Manufacturer (OEM) licenses can only be used on the brand and model it was initially installed on.

What is TRUE about legal protection for a novel software algorithm? A)Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way. B)Trademark provides the best protection as it can enforce ownership to protect the unique elements of a software algorithm. C)You can only copyright the name, not the software algorithm itself. The copyright will make you the sole owner of that brand. D)You can't legally protect a novel software algorithm. It will be owned by the original publisher of the software that you used to create it.

A)Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way.

What three things define an object? A)Properties, attributes, and methods B)Branches, loops, and operators. C)Data, information, and insights D)Stored value, class, and interface

A)Properties, attributes, and methods

What compatibility information should you confirm before installing a software application? A)That it works with the version of the operating system that you have, and that your computer meets the system (hardware) requirements. B)That you read the End User License Agreement (EULA) and agree to the terms of the license agreement. C)That you select the "repair" option if the software program has stopped working properly. D)That you review the advanced options and select specific feature sets.

A)That it works with the version of the operating system that you have, and that your computer meets the system (hardware) requirements.

A friend is asking for your help in using her computer. When your friend presses the key marked @, the " symbol appears. What could be the cause? A)The keyboard is set to use a UK layout. B)Somebody has moved a key to a different place on the keyboard. C)The Shift button doesn't work properly. D)The keyboard is broken.

A)The keyboard is set to use a UK layout.

What term is used to describe terminating a process that is not responding to user input? A)This is often called "killing" the process. B)This is often called "exterminate" the process. C)This is called "choking" the process. D)This is called "process abort."

A)This is often called "killing" the process

Windows comes with web server software, but it is not installed by default. How would you install this software? A)Use the Turn Windows features on or off dialog from Programs and Features. B)Use App Installer feature in Programs and Features tab to uninstall and then reinstall the web server software. C)Use the Repair option inherent in Programs and Features to automatically run the web server feature. D)Use the Server Software tab in Programs and Features to install the web server.

A)Use the Turn Windows features on or off dialog from Programs and Features.

What should you do before attempting to set up a new computer system? A)Verify that the environment is suitable and that the installation will be safe. B)Verify that the computer is concealed within a desk compartment and out of sight. C)Verify that the computer cables are loose and free of any bindings. D)Verify that the placement maximizes space even if the keyboard is in an awkward place.

A)Verify that the environment is suitable and that the installation will be safe.

Which of these statements is FALSE regarding the Windows 10 versions available? A)Windows 10 Enterprise is similar to the Pro edition but designed for licensing by small businesses. B)Windows 10 Pro comes with extra networking and management features. C)Windows 10 Home is designed for domestic consumers. D)Windows 10 Education/Pro Education is for schools and colleges.

A)Windows 10 Enterprise is similar to the Pro edition but designed for licensing by small businesses.

What is the best way to install a web application on your computer? A)You do not install a web application on your computer. You access it through your browser. B)Go to the vendor's website and have them mail it to you and install it when the disk arrives. C)Download it from the browser and install it on the computer. D)Call in an IT specialist to come install it for you.

A)You do not install a web application on your computer. You access it through your browser.

What is the file path to the Documents folder for a user named "David", assuming Windows is installed to a hard disk with a single partition using the default settings? A)c:\Users\David\Documents B)d:\Users\David\Documents C)C:\Windows\DAVID\Documents D)D:\Windows\David\Documents

A)c:\Users\David\Documents

What is it called when antivirus software remediates a system by blocking access to an infected file but not actually deleting it. A.Quarantining the file B.Cleaning the infection C.Erasing the file D.Updating the signatures

A.Quarantining the file

How is a Windows library different from a folder? A.A library acts as a virtual folder by displaying the contents of multiple folders, which could be located on different drives. B.A library is the user's private folder containing subfolders for different types of files like documents, music, and pictures. C.A folder acts as a virtual library by displaying the contents of multiple libraries, which could be located on different drives. D.A library and a folder are virtually the same thing.

A.A library acts as a virtual folder by displaying the contents of multiple folders, which could be located on different drives.

What is a Wide Area Network (WAN)? A.A network that connects sites in different geographic locations B.A network in a single location C.A company that specializes in providing Internet access D.A company that operates the national telephone networks

A.A network that connects sites in different geographic locations

What is the main difference between virus and worm malware? A.A virus has to infect a file whereas a worm propagates in memory and over computer networks. B.A virus propagates in memory and over computer networks whereas a worm has to infect a file. C.A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros. D.A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

A.A virus has to infect a file whereas a worm propagates in memory and over computer networks.

What is a reputable source of management software and drivers for a particular system? A.An OEM website B.A third-party driver website C.A peer-to-peer download application D.A public forum website

A.An OEM website

Which version or edition of Windows can be used to share files with other users? A.Any version or edition B.Enterprise versions only C.Versions and editions after Windows 7 D.Any non-server edition

A.Any version or edition

What security concern is snooping most affected by? A.Confidentiality B.Integrity C.Availability D.Authentication

A.Confidentiality

You have a motherboard that is designed for Double Data Rate 2 (DDR2) memory that works at a bus speed of 533 MHz. You have some DDR3 memory modules that also work at a bus speed of 533 MHz. Are the modules compatible with the motherboard? A.DDR3 modules cannot be used in DDR2 slots. B.DDR3 modules can be used in DDR2 slots. C.DDR2 and DDR3 are packaged in DIMMs and can be used in any slots. D.DDR2 and DDR3 are both packaged in SO-DIMMs and can be used in any slots.

A.DDR3 modules cannot be used in DDR2 slots.

If you use an open network, what email configuration setting should you configure? A.Enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption to protect the account password B.Enable anti-malware software to protect from viruses C.Disable active content types like flash and Java to protect the web browser D.Enable a script blocker to prevent scripts from running

A.Enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption to protect the account password

What can you do to reduce the risk of using a free Wi-Fi network to place an order from an online shop? A.Ensure that the online store uses a secure (HTTPS) connection. B.Request an encrypted transaction. C.Change your password. D.Change your credit card number often.

A.Ensure that the online store uses a secure (HTTPS) connection.

How can a smartphone join a Wi-Fi network if the SSID is not being broadcast? A.Enter the network name manually, as with a computer. B.Use a generic SSID. C.It is not possible. D.Use the Forget Network command to bypass the network.

A.Enter the network name manually, as with a computer.

What is the difference between HTTP and HTTPS protocols? A.HTTPS serves SSL (Secure Sockets Layer) secured HTML web pages, whereas HTTP serves unsecured web pages. B.HTTP serves web pages on the extranet, whereas HTTPS serves web pages on the intranet. C.HTTP does not require DNS to resolve a web address to an IP address, whereas HTTPS does. D.HTTP can serve HTML web pages, whereas HTTPS can serve HTML web pages, as well as XML pages displayed as HTML.

A.HTTPS serves SSL (Secure Sockets Layer) secured HTML web pages, whereas HTTP serves unsecured web pages.

What is the latest Wi-Fi standard and which frequency band(s) does it use? A.IEEE 802.11ac works in the 5 GHz band. B.IEEE 802.11n works in the 5 GHz band. C.IEEE 802.11b works in the 5 GHz band. D.IEEE 802.11g works in the 2.4 GHz band.

A.IEEE 802.11ac works in the 5 GHz band.

What are the four processes of an access control system? A.Identification, authentication, authorization, and accounting B.Subjects, objects, Access Control Lists (ACLs), and permissions C.DAC, RBAC, MAC, and rule-based D.User, default, administrator, and guest

A.Identification, authentication, authorization, and accounting

What type of printer uses a fuser? A.Laser printer B.Color bubblejet printer C.A 3D printer D.Impact printer

A.Laser printer

What sort of device would you need to transfer data from a "Memory Stick"? A.Memory card reader / multi-card reader. B.A keyboard C.A wireless adapter D.A microphone and headset

A.Memory card reader / multi-card reader.

In Windows, do letter-labeled "drives" correspond exactly to physical disks? A.Not in the case of hard disks, which can be configured with multiple partitions, each of which can be assigned a drive letter. B.Only in the case of hard disks, which are usually allocated letter "c." C.Not in the case of optical drives, which can be configured with multiple partitions, each of which can be assigned a drive letter. D.Only in the case of hard disks, which are usually allocated the letter "a."

A.Not in the case of hard disks, which can be configured with multiple partitions, each of which can be assigned a drive letter.

What function of a scanner would you use if you want to convert a letter that someone has mailed to you into a computer-editable document? A.Optical Character Recognition (OCR). B.TWAIN C.Windows Image Acquisition (WIA) D.Portable Document Format (PDF) or Joint Photographic Experts Group (JPEG)

A.Optical Character Recognition (OCR).

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging? A.Overwhelm the server with a Denial of Service (DoS) B.Stealing a user's login information C.Using an unattended computer that is still logged in D.Using malware such as a Trojan

A.Overwhelm the server with a Denial of Service (DoS)

You have made a backup of system data using a removable hard disk. Time and security are of great importance. What should you do next? A.Store the disk in a secure, off-site location. B.Delete the original, since the backup is current. C.Complete the restore procedure. D.Make a copy of the disk on the cloud.

A.Store the disk in a secure, off-site location.

What type of file system must be used for the partition where Windows 10 is installed? A.The NTFS file system B.The FAT-32 files system C.The ext file system D.The HFS+ file system

A.The NTFS file system

Which admin tool or screen would you use to configure a Windows computer to join a domain? A.The System applet in Control Panel B.Administrative Tools in Control Panel C.Select Settings and choose Remote Desktop D.Select Settings and then Network and Internet

A.The System applet in Control Panel

How can a client-server application architecture be described if it could be re-developed to split the application and presentation layers? A.This could be described as a two-tier application capable of becoming a tier-three application. B.This could be described as a one-tier application capable of becoming a tier-two application. C.This could be described as a three-tier application capable of becoming a n-tier application. D.This could be described as a n-tier application that cannot be further re-developed.

A.This could be described as a two-tier application capable of becoming a tier-three application.

What are the two main ways that spam might expose recipients to hazardous content? A.Through malware-infected attachments and through links to malicious websites B.Through websites vulnerable to cross-site scripting and through fake login pages C.Through third-party sites hosting fake drivers and through poisoned app store applications D.Through vulnerable web browser add-ons and through unpatched operating systems

A.Through malware-infected attachments and through links to malicious websites

What do you need to know to connect to a device that is configured over the network? A.Typically, the Internet Protocol (IP) address of its management page or the device's hostname B.Typically, the Media Access Control (MAC) address of the device you want to connect to C.Typically, the physical location of the computer D.Typically, the port in the wall where the network cable is plugged into

A.Typically, the Internet Protocol (IP) address of its management page or the device's hostname

Select the best example of using dual monitors with multiple windows in Extended mode: A) A sales rep uses a PowerPoint presentation at a meeting, with the keyboard, mouse, and one monitor facing him, and the second monitor facing a group of customers. B) A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor. C) An accountant uses both monitors side-by-side to stretch out one Excel spreadsheet so that it can be displayed in its entirety. D) A football coach attaches a second, larger monitor to a laptop, so that the PC screen image can display on the larger monitor instead.

B) A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor.

Which of these is an access control? A) Destruction B) Accounting C) Integrity D) Snooping

B) Accounting

Of the following, which language is typically used with markup language? A) C++ B) CSS C) C# D) COBOL

B) CSS (Cascading Style Sheets)

When does a new creation become "copyrighted"? A) Copyrights are put in place once the user files the appropriate paperwork. B) Creations are copyrighted immediately upon creation. C) Copyright is obtained by mailing something to yourself. D) Copyright is granted when you create something similar to another creation.

B) Creations are copyrighted immediately upon creation.

What is used to prove a program was created by a trustworthy software publisher? A) Operating System (OS) B) Digital certificate C) Applications (or Apps) D) Web Applications

B) Digital certificate

Which best defines ergonomics? A) Ergonomics is the process of completing the same task in a repetitive manner. B) Ergonomics is the study of factors affecting the performance of people at work. C) Ergonomics is the ability for the mind to process data as quickly as the computer. D) Ergonomics is a strategy used to remain active when at work.

B) Ergonomics is the study of factors affecting the performance of people at work.

USB and thumb drives are examples of which type of storage device? A) Hard drive B) Flash memory C) Optical drive D) Solid state

B) Flash memory

What is the purpose of a NIC card? A) It increases the speed of video streaming. B) It allows the computer to connect to network. C) It sends video signals to a display device. D) It provides extra ports for peripherals.

B) It allows the computer to connect to network.

How is data stored on a hard disk drive? A) A layer of foil includes pits to represent digital data. B) It is encoded magnetically on a platter that spins. C) A layer of photosensitive dye is marked by a laser. D) It is encoded magnetically on a small, light, fixed surface.

B) It is encoded magnetically on a platter that spins.

In terms of file systems, what benefits does exFAT provide over FAT and NTFS? A) It has a larger maximum file size than its predecessors and can store file sizes up to 2TB. B) It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead. C) It introduces a 64-bit addressing scheme, which allows for larger partitions than its predecessors. D) It provides some additional attributes not provided before—for example, file-level security permissions.

B) It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.

What is the principle that grants users the rights necessary to perform their job and no more? A) Accounting B) Least privilege C) Identification D) Authorization

B) Least privilege

What is the physical address of a network interface called? A) IP address B) MAC address C) URL address D) Postal address

B) MAC address

Which is NOT an example of a Relational Database Management Systems (RDBMS)? A) Oracle Database B) Microsoft Office Excel C) Microsoft Office Access D) MySQL

B) Microsoft Office Excel

In the context of programming languages such as JAVA, what does the acronym OOP best represent? A) Obsolete-Object Programming (OOP) B) Object-Oriented Programming (OOP) C) Ordered-Operational Programming (OOP) D) Outside-Object Programming (OOP)

B) Object-Oriented Programming (OOP)

Where does the Central Processing Unit (CPU) live in a computer? A) On the hard disk. B) On the motherboard. C) On the network. D) On the back of the computer.

B) On the motherboard.

Which of these is a typical device hardening policy? A) Disabling passwords B) Patching C) Using default passwords D) Using virus software

B) Patching

Which of these is the name for a type of an add-on for a web browser? A) USB B) Plug-in C) HDMI D) Cookie

B) Plug-in

Which of the following is Task Manager commonly used for? A) To close an application using the "X" in the upper-right corner of the application window. B) To end an unresponsive process that cannot be closed from the application window itself. C) To shut down the operating system before going home after work. D) To launch a program because the icon is no longer on the desktop.

B) To end an unresponsive process that cannot be closed from the application window itself.

Why would you virtualize an environment? A) To increase hardware redundancy across multiple physical workstations. B) To use hardware and software resources effectively, as well as potentially to save time and money. C) To allow remote access through a virtual private network (VPN) for users. D) To implement cloud storage on a system.

B) To use hardware and software resources effectively, as well as potentially to save time and money.

You want to check whether a condition has been met, and if it has, perform one action. Otherwise, you want your program to perform a second action. What sort of programming operation would help achieve this? A)A programming identifier B)A conditional branch C)A simple array D)A continuous loop

B)A conditional branch

Which system object provides the functionality for a hardware component? A)A directory B)A device driver C)A program D)A document

B)A device driver

The Task Scheduler allows you to run a process automatically in Windows. What is a widely-used Linux equivalent? A)Taskkill B)Cron C)Vi D)Nano

B)Cron

Why would Windows prompt you to enter a password if you try to install a software application? A)Installing an application requires the use of the application's setup files which may require specific user privileges to access. B)Installing an application requires administrator privileges and is an action protected by User Account Control C)Installing an application requires a second level of verification. An administrator verifies a standard user and a second administrator can verify the first one. D)Installing an application requires that you have exited other applications so that the antivirus software can be disabled.

B)Installing an application requires administrator privileges and is an action protected by User Account Control

Your colleague has to run many applications at the same time and finds it difficult to know which icon to choose when switching between them. What alternative method could you suggest? A)Place all the application shortcuts within a favorites folder for quick access. B)Press Alt+Tab - this shows previews of the window and allows the user to quickly switch between windows. C)Upload documents to the cloud and use a cloud interface to switch between them. D)Press "CTL-ALT-DEL" - task manager will show him a list of all the active programs.

B)Press Alt+Tab - this shows previews of the window and allows the user to quickly switch between windows.

What are constants and variables examples of? A)Simple arrays B)Programming identifiers C)Conditional branches D)Continuous loops

B)Programming identifiers

What type of software manages tasks, dependencies, and timelines? A)Accounting software B)Project management software C)Database software D)Business-specific applications

B)Project management software

What term is used to describe selecting and viewing information in a database? A)Report B)Query C)Storage D)Create

B)Query

Which of these statements is true regarding a standard user and their password? A)Standard users must get permission from the administrator to change a password. B)Standard users can change their own password but cannot change anyone else's password. C)Once a standard user sets their first password they cannot change or modify it. D)Password management is automatically controlled in the BIOS.

B)Standard users can change their own password but cannot change anyone else's password.

Why might one of your first tasks on receiving a new computer be to remove software applications? A)The computer may already have a virus pre-installed that you do not want. B)The computer may be bundled with pre-installed software that you do not want. C)The computer may have spyware bundled in that will watch every action that do on your computer. D)The computer may not have enough storage left to run any of the software applications.

B)The computer may be bundled with pre-installed software that you do not want.

Which is a true statement regarding whether or not laptops make good servers? A)Their size and weight make them perfect for a server rack, and this allows for better cooling. B)There are limited options for expansion, and its components are not practical for network-wide use cases. C)Their redundancy makes them reliable, particularly during power outages. D)Their mobility allows for more flexibility in where you store the server.

B)There are limited options for expansion, and its components are not practical for network-wide use cases.

Why is a smartphone NOT a good tool for writing a report? A)They have great user interfaces that enable you to write quickly. B)Touchscreen or mini keyboards are not optimized for writing lots of text. C)They have large displays with excellent resolution. D)Their size makes them easy to place in ergonomic positions.

B)Touchscreen or mini keyboards are not optimized for writing lots of text.

Following installation of an application, another program on your computer has stopped working. What could you do to try to fix it? A)Try using the Turn Windows features on or off dialog tab from Programs and Features (if available). B)Try using the Repair option in Programs and Features (if available) or re-installing the program. C)Try using the software components tab under Device Manager to fix the problem. D)Log into User Account Control and edit the settings in the control panel and reduce the security posture. It may have blocked the other program.

B)Try using the Repair option in Programs and Features (if available) or re-installing the program.

What is the technical term for a web address? A)Hyperlink (HL) B)Uniform Resource Locator (URL) C)Address bar D)Website name

B)Uniform Resource Locator (URL)

Which method does a technician use to configure and improve a system's memory usage? A)Users do not configure any of the system memory setup because the OS handles all system memory activities. B)Use of virtual memory or a pagefile, where disk space is used to supplement system RAM. C)Use of general system memory, where a percentage of memory can be allocated to specific applications. D)Use of mass storage, where disks can be partitioned to separate OS files from user files.

B)Use of virtual memory or a pagefile, where disk space is used to supplement system RAM.

What protection feature in Windows is designed to prevent a script or software from making unauthorized changes to the OS configuration? A)Graphical User Interface (GUI) B)User Account Control (UAC) C)Default account types D)Password options

B)User Account Control (UAC)

In order to obtain support on a currently installed application, the software vendor wants to know the application's product ID. How would you locate this information? A)Look in the Warranty information packet. B)Usually via the Help > About menu. C)Open the System Settings menu. D)Search manufacturer's website.

B)Usually via the Help > About menu.

Which type of display interface does NOT support High Definition picture resolution? A)HDMI B)VGA C)Thunderbolt D)DVI

B)VGA

You want to purchase a flat panel monitor that can show widescreen movies. Which native resolution should you choose? A.1024x768 B.1920x1080 C.1920x1440 D.1400x1050

B.1920x1080

A hard drive is rated at 10,000 rpm. What is the significance of this statistic? A.A measurement of the capacity of the drive B.A measurement of the speed of the drive C.A measurement of the composition of the drive's platters D.A measurement of the access time for information on the drive

B.A measurement of the speed of the drive

What device is used to connect computers together in an Ethernet network? A.An access point B.A switch C.Internet router D.Internet modem

B.A switch

How does a one-time password work? A.The existing password is sent to a user after having requested a password change on a website. B.A unique password is generated using an algorithm known to both a device (fob) and the authenticating server. C.A temporary password is sent to a user via email after requesting a password reset. D.A user must enter a hardware token, like a smart card, and enter a password or PIN.

B.A unique password is generated using an algorithm known to both a device (fob) and the authenticating server.

What does AAA stand for and in which order are they typically performed? A.Accounting, Authorization, Authentication B.Authentication, Authorization, Accounting C.Authentication, Appropriation, Accounting D.Accounting, Authorization, Access control

B.Authentication, Authorization, Accounting

Which four toners are used to produce color prints? A.Red, green, blue, black B.Cyan, magenta, yellow, and black C.Red, blue, yellow, and black D.Light blue, pink, yellow, black

B.Cyan, magenta, yellow, and black

Which of these statements is true regarding how you set up your display? A.Dots Per Inch (DPI) or scaling is configured via the Personalization applet. B.Dots Per Inch (DPI) or scaling is configured via Display settings. C.Dots Per Inch (DPI) is determined by the monitor and device driver and cannot be user configured. D.Dots Per Inch (DPI) or scaling is configurable using your computers IP-based interface.

B.Dots Per Inch (DPI) or scaling is configured via Display settings.

How is a relationship identified between two tables in an RDBMS? A.Each table contains a foreign key whose value is unique for each record in the table. A foreign table can use the value of a foreign key as a relation, storing the value in a primary key field. B.Each table contains a primary key whose value is unique for each record in the table. A foreign table can use the value of a primary key as a relation, storing the value in a foreign key field. C.A relationship between tables is created and identified by the schema. D.A constraint defines the relationship between tables.

B.Each table contains a primary key whose value is unique for each record in the table. A foreign table can use the value of a primary key as a relation, storing the value in a foreign key field.

How could you access a network folder called DATA on a network server called TOWER1 using the Explorer address bar? A.It is not possible to access a network folder from the address bar. B.Enter the Universal Naming Convention (UNC) path. C.Enter the web address. D.Enter the IP address.

B.Enter the Universal Naming Convention (UNC) path.

You are configuring dual monitors positioned side-by-side. You want to increase the amount of screen space available. Which multiple display option should you set? A.Portrait orientation B.Extend the displays. C.Show only on display #2 D.Duplicate the displays.

B.Extend the displays.

Which protocol would be best used to provide encrypted file downloads directly from a web server? A.HTTP B.HTTPS C.FTP D.P2P

B.HTTPS

How would you access the system setup program on a PC? A.Historically, by pressing and holding the Windows key (4 little white boxes) on your keyboard. Modern PCs use the function key "F5" B.Historically, by pressing the appropriate key during startup (ESC, DEL, F1, F2, or F10). Modern PCs often use fast boot modes that require some other means of booting to the firmware setup program. C.Logically, by pressing CTL+ALT+DEL twice during startup. Just like when you want to exit a program on your PC. D.Logically, by pressing ALT+F4 during startup will access the startup menu through windows.

B.Historically, by pressing the appropriate key during startup (ESC, DEL, F1, F2, or F10). Modern PCs often use fast boot modes that require some other means of booting to the firmware setup program.

You log into a SOHO router and review current settings to prepare it for use. Which of the following items is NOT needed to configure a wireless connection on the router? A.SSID B.IP address C.Encryption type D.Authentication info

B.IP address

What system policy ensures that users do not receive rights unless granted explicitly? A.Least privilege B.Implicit deny C.Allow all D.Deny all

B.Implicit deny

What protocol is usually used to provide logical addressing on networks? A.Address Resolution Protocol (ARP) B.Internet Protocol (IP) C.Internet Control Message Protocol (ICMP) D.Transmission Control Protocol (TCP)

B.Internet Protocol (IP)

Which of the following is NOT a medium used for Internet access? A.Cable/Hybrid Fiber Coax B.Internet Service Provider (ISP) C.Fiber to the Curb (FTTC) D.Digital Subscriber Line (DSL)

B.Internet Service Provider (ISP)

What is the purpose of an accelerometer, as fitted in a mobile device? A.It is the software interface for speech recognition. B.It is one of the components that detects how the user is moving the device around. C.It is the component that detects a fingerprint to unlock the screen D.It is a software component that provides faster access to applications.

B.It is one of the components that detects how the user is moving the device around.

Select the one UNTRUE statement in regard to cookies. A.A cookie is a plain text file created by a website you've visited and stored on your hard drive. B.It's not legal for a web site to store cookies on your computer. C.Cookies may contain more information about you than you are aware of. D.Spyware and adware may extract data from your cookies to track your computer use.

B.It's not legal for a web site to store cookies on your computer.

You are considering buying a new display device. The model you are considering accepts digital inputs only. Your computer's graphics adapter has a blue port with 15 holes. Would this flat panel be a wise purchase? A.Yes, as this connector is DVI which supports digital only. B.No, as this connector is VGA which supports analog output only. C.Yes, as this connector is HDMI which supports both digital and analog. D.No, as this connector is DisplayPort which supports analog output only.

B.No, as this connector is VGA which supports analog output only.

What are the key features of a packet switching network? A.A packet sent down the network can switch its destination mid-stream. B.Nodes within the network can perform a forwarding function, allowing a packet to utilize any available path through the network. C.Packets can be switched from a TCP/IP protocol to another available protocol to increase the transmission speed. D.A packet switching network opens a direct channel on which to transmit the packet, so a break in the channel stops the transmission.

B.Nodes within the network can perform a forwarding function, allowing a packet to utilize any available path through the network.

You need to configure settings for an input device. What should be your first step? A.Configure the wireless adapter to connect to the new input device. B.Open the Settings app or Control Panel. C.Go to the Printers and Scanners tab in system setting. D.Open the Settings add or remove programs.

B.Open the Settings app or Control Panel.

You are trying to find a use for an old dot matrix printer. The only port on the printer is a large edge-style one with 36 contacts. What type of port is this? A.USB port B.Parallel port C.HDMI port D.RJ45 port

B.Parallel port

What type of gesture is typically used for zooming on a touchscreen? A.Slide B.Pinch C.Tap-and-hold D.Swipe

B.Pinch

Select the one UNTRUE statement in regard to browser pop-up windows. A.Pop-up windows are usually designed to be helpful to the user. B.Pop-up windows are always a sign of viruses. C.Pop-up windows are implemented using scripts or add-ons. D.Pop-up windows can be controlled using browser settings.

B.Pop-up windows are always a sign of viruses.

You want to configure a printer to use both sides of the paper (duplex) by default. You have alt-clicked the printer object. Which command should you select to proceed? A.Open B.Printer properties C.Printing preferences D.Troubleshoot

B.Printer properties

You need a development environment with a library of database functions. What type of interface are you using? A.Direct/Manual Access B.Programmatic access C.Query/Report Builder D.Utility Access

B.Programmatic access

Malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key. What type of malware is being described? A.Spyware B.Ransomware C.Trojans D.Worm

B.Ransomware

Which feature allows data to be removed from a device if it is lost or stolen? A.Lockout policy B.Remote wipe C.Screen lock D.Encryption

B.Remote wipe

Why is prioritization a critical task for disaster recovery? A.Integrity of the data will need to be checked before access is re-enabled. B.Services may have dependencies that make restoring them in the wrong order futile. C.System demand will need to be monitored after rebuilding to verify stability. D.Network cabling should be designed to allow for multiple paths between the various servers.

B.Services may have dependencies that make restoring them in the wrong order futile.

What language is usually used to request data from an RDBMS such as Oracle? A.eXtensible Markup Language (XML) is used to query RDMBS-based database platforms. B.Structured Query Language (SQL) is used to query RDBMS-based database platforms. C.Hypertext Markup Language (HTML) is used to query RDBMS-based database platforms. D.Java is used to query RDBMS-based database platforms.

B.Structured Query Language (SQL) is used to query RDBMS-based database platforms.

You want to restrict access to a computer on your network to a single internet host running a particular application. What two things do you need to configure in your firewall's access control list? A.The SSID and the IP address B.The IP address of the host and the port number of the application C.The SSID and the application name D.The IP address of the host and the application name

B.The IP address of the host and the port number of the application

What default installation folders contain system and application files that should not normally be deleted or modified manually? A.The Downloads folder B.The Windows and Program Files folders. C.The Temp folder D.The Desktop folder

B.The Windows and Program Files folders.

Why might a company ban use of the corporate network and desktop software for personal communications? A.The company wants employees to focus 100% of their energy on job duties. B.The company might be held responsible for inappropriate content posted by its employees. C.The company has purchased, and therefore owns, the network and software. D.The company's resources are too limited to allow personal use.

B.The company might be held responsible for inappropriate content posted by its employees.

You need to plug a microphone into a computer to make a recording. How would you identify which jack to use? A.The jack is color-coded green. B.The jack is color-coded pink. C.Plug into the RJ45 Jack. D.Use the HDMI connection.

B.The jack is color-coded pink.

What is the difference between a modem and a router? A.The modem forwards packets between the local network and the Internet while the router transmits frames across the WAN link B.The modem transmits frames across the WAN link while the router forwards packets between the local network and the Internet. C.The modem and the router have exactly the same responsibilities, so the terms are often used interchangeably. D.The modem transmits frames across the WAN link while the router translates the server's web address into an IP address.

B.The modem transmits frames across the WAN link while the router forwards packets between the local network and the Internet.

What type of connection would a NAS (Network Atached Storage) device NOT be able to use? A.A wired Ethernet port B.Twisted pair (RJ-11) C.Wi-Fi D.LAN port on a SOHO router

B.Twisted pair (RJ-11)

What type of wired interface is a printer MOST likely to use? A.HDMI B.USB C.VGA D.S/PDIF

B.USB

What is the main means by which anti-virus software identifies infected files? A.Using heuristics to detect suspicious behavior B.Using definitions or signatures of known virus code C.Using signatures of zero-day exploits D.Using AutoRun to execute files of unknown provenance

B.Using definitions or signatures of known virus code

What type of information would NOT be considered confidential and governed by classification and handling procedures? A.Company confidential information B.Website information C.Customer information D.Personally identifiable information

B.Website information

What is the result of putting a phone in "airplane mode?" A.The phone is shut down. B.Wireless features are disabled. C.The volume is muted. D.GPS is connected to the airplane's system.

B.Wireless features are disabled.

What type of software is an ODF file associated with? A.Video conferencing software B.Word processing software C.Email client software D.Database software

B.Word processing software

Which of the following is NOT a privacy issue that is related to using a social networking site? A.You need to control how far the information that you post to the site is distributed. B.You need to ensure that private information is physically shredded prior to disposal. C.You need to know how the company processes, stores, and transfers or sells any data it collects about you. D.You can never take back information that is publicly posted, as others may have downloaded or duplicated it.

B.You need to ensure that private information is physically shredded prior to disposal.

What is the decimal number 75 in binary and hexadecimal? A)5C in binary and 0101 1100 in hex B)4B in binary and 0100 1011 in hex C)0100 1011 in binary and 4B in hex D)0101 1100 in binary and 5C in hex

C)0100 1011 in binary and 4B in hex

Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)? A) <!DOCTYPE> B) <body> C) <h7> D) <p>

C) <h7> heading tags represents heading titles of a web page

Which is an example of a Human Interface Device (HID)? A) A computer programmer uses a network connection to monitor transactions from an application. B) An administrative assistant uses a printer to print a five-page report, formatted to print on both sides. C) A customer uses a keyboard to enter a username and password into a shopping application. D) A teenager uses a high-resolution monitor attached to a PC for viewing movies and music videos.

C) A customer uses a keyboard to enter a username and password into a shopping application.

Software programs that let users do useful things with their computer, such as create and edit documents are known as what? A) Random Access Memory (RAM) B) Operating System (OS) C) Applications (or Apps) D) Device Drivers

C) Applications (or Apps)

What do we call loss of strength of a wireless signal? A) Long Term Evolution (LTE) B) Interference C) Attenuation D) 802.11b

C) Attenuation

You created a folder called MyFiles under the root in a Windows file system. How would that folder be identified? A) C:/MyFiles B) C:\root\Myfiles C) C:\MyFiles D) \MyFiles

C) C:\MyFiles

Why is RAM an example of a volatile storage device? A) Ram is not enclosed in a protective case, and is more easily damaged than a hard drive. B) Ram chips can easily be removed from the motherboard. C) Data stored in RAM is only stored as long as there is a power source sending constant power to the chip. D) Ram can easily be upgraded and replaced in most sizes and brands of computer systems.

C) Data stored in RAM is only stored as long as there is a power source sending constant power to the chip.

Which of these is NOT a social engineering attack? A) Dumpster diving B) Impersonation C) Denial-of-service D) Shoulder surfing

C) Denial-of-service

Which of these is a protocol to allow a mail client to download message from a mail server? A) HTTP B) ARP C) IMAP D) HID

C) IMAP

Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage? A) Accessibility B) Confidentiality C) Integrity D) Availability

C) Integrity

Select the one UNTRUE statement in regard to an expansion bus. A) It's one of two kinds of bus in the PC system: the expansion bus and the system bus. B) It carries four things: data, address information, a timing signal, and power. C) It's also referred to as the Front Side Bus (FSB) or the local bus. D) Its purpose is to provide the circuitry that connects the various microprocessors and other components on the motherboard.

C) It's also referred to as the Front Side Bus (FSB) or the local bus.

What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements? A) EM64T B) Device manager C) Kinetics D) App

C) Kinetics

The market for workstation operating systems is divided into three main sections. Which of the following is NOT one of those? A) Network Operating System (NOS) B) Enterprise Client C) Mainframe OS D) Home Client

C) Mainframe OS

Which of these is a Disaster Recovery concern? A) Contingency Planning B) Fault tolerance C) Prioritization D) Network Redundancy

C) Prioritization

Which Redundant Array of Independent Disks (RAID) has only striping with parity? A) RAID 1 B) RAID 10 C) RAID 5 D) RAID 6

C) RAID 5

What are the two interfaces used for configuring input devices? A) File Manager and the Settings app. B) Control Panel and File Manager. C) The Settings app and Control Panel. D) The vendor's website and File Manager.

C) The Settings app and Control Panel.

What is the main purpose of the Power-On Self-Test (POST)? A) The computer performs a Power-On Self-Test (POST) to check that monitor display settings are correct. B) The computer performs a Power-On Self-Test (POST) to ensure the printer powers up correctly. C) The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads an operating system. D) The computer performs a Power-On Self-Test (POST) to check that the computer is plugged in and receiving power.

C) The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads an operating system.

Which best defines throughput rate of a device at any given time? A) The measurement of voltage being input into the power supply. B) The measurement of information stored on an external hard drive. C) The measurement of data transferred between computers over a network. D) The maximum amount of data allowed to be transferred over a network.

C) The measurement of data transferred between computers over a network.

What are the two important components that can be increased to improve video? A) Size of pixels and the number of colors. B) Software and driver versions. C) The number of pixels and the refresh speed. D) Number of colors and bus size.

C) The number of pixels and the refresh speed.

Which best describes an Information Technology (IT) system? A) When a system processes information and stores it. B) When a system is activated and engaged by a user. C) When a system processes, stores, and transfers information. D) When a system utilized the TCP/IP model to transfer data across the network.

C) When a system processes, stores, and transfers information.

Which of the following is an example of a compressed file format? A) rtf B) exe C) zip D) png

C) zip

What is a Command Line Interface (CLI)? A)The Command Line Interface allows the user to schedule tasks to run at a particular time. B)The Command Line Interface allows the user to format mass storage devices using a GUI. C)A Command Line Interface allows the user to interact with the OS using typed commands or scripts rather than a GUI. D)The Command Line Interface prevents access to administrative functions without administrative privileges.

C)A Command Line Interface allows the user to interact with the OS using typed commands or scripts rather than a GUI.

What type of computer is best suited for using in a job where you have to make notes and be able to move around easily? A)Desktop computer with an electronic stylus. B)A server that is mounted on a cart for easier mobility. C)A tablet or smartphone or possibly a hybrid laptop/tablet. D)Gaming console with voice activated commands.

C)A tablet or smartphone or possibly a hybrid laptop/tablet.

What systems use a Central Processing Unit (CPU) and memory? A)Desktops only B)Servers only C)All types of computers D)Laptops only

C)All types of computers

A user has two USB drives connected to her PC. She complains that when she copies large files to both drives at the same time, it seems to take much longer. Why might this be? A)Writing to USB drives can only occur one at a time. B)The flash drive partitions haven't been formatted. C)Bandwidth on the USB bus is shared between all devices. D)She has the cables swapped backwards.

C)Bandwidth on the USB bus is shared between all devices.

What three scripting options are commonly used in Windows 10 to perform administrative tasks? A)PowerCLI, Perl, and Python B)Mocha, LiveScript, and JavaScript C)Batch files, Windows PowerShell scripts, and VBScripts D)AppleScript Editor, Xcode, and Smile

C)Batch files, Windows PowerShell scripts, and VBScripts

What key combination can you use to force the browser to ignore any locally cached files when refreshing a page? A)Ctrl++ B)Crtl+Alt+Del C)Ctrl+F5 D)Alt+F4

C)Ctrl+F5

A database administrator is looking to remove a table from a database using Data Definition Language (DDL) commands. Which of the following would achieve only this result? A)CREATE B)ALTER TABLE C)DROP D)UPDATE

C)DROP

What type of computer is most likely to need peripheral devices? A)Smartphone B)Laptop C)Desktop D)Server

C)Desktop

In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches? A)Security B)Compatibility C)Details D)General

C)Details

What data protection technology could you implement in order to restrict the type of activity that a user could employ on digital products that they have purchased or rented? A)Trademark B)Patent C)Digital Rights Management D)Copyright

C)Digital Rights Management

What is an interpreted programming language? A)Interpreted languages represent machine code in human-readable text and are typically specific to a particular hardware architecture. B)Interpreted languages do not need to be compiled and are designed to retrieve specific records from a data set. C)Interpreted languages do not need to be compiled because the code gets converted to machine code at runtime. D)Interpreted languages organize data through structured nested tags and are rendered by a web browser.

C)Interpreted languages do not need to be compiled because the code gets converted to machine code at runtime.

You are setting up a new computer, but it doesn't seem to be working. Should you check anything or contact the manufacturer? A)It's broken. Unplug everything and send it back. B)It's a brand-new computer, you don't need to check anything. C)It would be best to double-check you have connected the cables correctly. D)Just contact the manufacturer and get their technical opinion.

C)It would be best to double-check you have connected the cables correctly.

Give two examples of semi-structured data stores. A)Relational databases and text files B)Key/value pair database and PowerPoint presentations C)Key/value pair databases and markup language document stores. D)Word documents and PowerPoint presentations

C)Key/value pair databases and markup language document stores.

Why might you use the Services snap-in to manage background processes rather than Task Manager? A)The Task Manager allows you to modify which user or system account the service runs as but the Services snap-in has restart functionality. B)The Service snap-in tool allows you to start and stop services, but the Task Manager will also allow you to configure service properties. C)Task Manager allows you to start and stop services but the Services snap-in also allows you to configure service properties. D)The Task Manager requires administrative privileges to run but the Services snap-in can be run by any user.

C)Task Manager allows you to start and stop services but the Services snap-in also allows you to configure service properties.

What two things are configured on a disk to make storage space on the disk available to the Windows OS? A)The disk must have a recovery file and configure the backup settings to point to that file. B)The disk must have 6 GB of RAM configured and the system should automatically allocate a matching pagefile. C)The disk must contain at least one partition, typically allocated a drive letter, and the partition must be formatted with a suitable file system. D)The GUID Partition Table (GPT) needs to be configured and then you must populate the volumes.

C)The disk must contain at least one partition, typically allocated a drive letter, and the partition must be formatted with a suitable file system.

What computer component is most restrictive in terms of determining upgrade potential for a desktop computer? A)System firmware B)The Network Interface Card (NIC) C)The motherboard D)The Graphics Processing Unit (GPU)

C)The motherboard

Which of these statements is NOT true about Universal Serial Bus (USB) cables? A)There are USB cables with normal size connectors on one end and mini or micro device connectors on the other. B)The connectors for the host (PC) and device use different form factors. C)USB cables never have the same connectors at either end. D)There are now USB cables with reversible Type C connectors.

C)USB cables never have the same connectors at either end.

Which data representation format can encode the widest range of characters? A)Binary B)ASCII C)Unicode D)Hex

C)Unicode

You are looking for content on a topic, but your search is returning millions of matches that are not particularly helpful. Which option includes two methods that you could use to get better search results? A)Search using a broader criterion (don't be as specific), or use an asterisk (*) in place of a character in your search term. B)Use a different search engine, or start your search over and come back to it later. C)Use more search keywords (ideally with 'uncommon' words), or search for an exact phrase by enclosing it in quotes. D)Verify your spelling using a spellchecker, or use a question mark in place of a character in your search term.

C)Use more search keywords (ideally with 'uncommon' words), or search for an exact phrase by enclosing it in quotes.

You have to sign in to Windows - does it matter if the CAPS LOCK light on the keyboard is activated? A)Windows usernames and passwords are converted to upper case, so the CAPS LOCK does not affect login. B)Windows usernames are not case sensitive, so the CAPS LOCK does not affect login. C)Windows passwords are case sensitive, so the CAPS LOCK may prevent successful login. D)Windows passwords are not case sensitive, so the CAPS LOCK key is ignored during login.

C)Windows passwords are case sensitive, so the CAPS LOCK may prevent successful login.

What is a packet made up of? A.A packet is the destination address of a unit of data being transmitted over the network. B.A packet is the data inside the wrapper used for each data unit transmitted over the network. C.A packet consists of a number of fields contained within a header section plus a payload. D.A packet consists of a payload wrapped around a header section.

C.A packet consists of a number of fields contained within a header section plus a payload.

What type of device is used to transfer packets between different networks? A.A hub B.A switch C.A router D.A Network Interface Card (NIC)

C.A router

How might spyware be able to steal a password? A.By forcing the use of Secure Sockets Layer (SSL) encryption B.By performing a Man-in-the-Middle attack over Wi-Fi C.By monitoring key strokes or stealing a password database D.By installing ransomware that locks users out of their files

C.By monitoring key strokes or stealing a password database

An INSERT statement is an example of what data language type? A.Both Data Manipulation Language and Data Definition Language B.Data Definition language C.Data Manipulation Language D.Neither Data Manipulation Language nor Data Definition Language

C.Data Manipulation Language

What class of data is a transport encryption protocol designed to protect? A.Data being hashed B.Data at rest C.Data in transit D.Data in storage

C.Data in transit

What are the three main areas where redundancy should be provisioned? A.Circuits, power generators, Uninterruptible Power Supplies (UPSs) B.RAID 1, RAID 5, and RAID 10 C.Data, network links, and power D.Authentication, authorization, and accounting

C.Data, network links, and power

What does a hard disk connected to a computer via a USB port describe? A.Network printer sharing B.Network attached storage C.Direct attached storage D.Cloud-based storage

C.Direct attached storage

Mice and keyboards CANNOT connect to which types of ports? A.Bluetooth interfaces B.PS/2 ports C.Ethernet ports D.USB ports

C.Ethernet ports

Your computer has 4 SATA ports. How many hard drives can be installed? A.Two drives B.Eight drives C.Four drives D.Zero drives

C.Four drives

What view options could you use to show files of a particular type sorted by date? A.Group the files by category, then sort by date. B.Group the files by date, then sort by file type. C.Group the files by file type, then sort by date. D.Group the files by file type, then sort by category.

C.Group the files by file type, then sort by date.

What sort of account allows someone to access a computer without providing a user name or password? A.User account B.Administrator account C.Guest account D.Microsoft Account

C.Guest account

What impact is presented when users reveal their passwords to technical support staff? A.It exposes the passwords to brute-force attacks from malicious hackers. B.It provides technical support staff with access to the user's personal files stored on the network. C.It exposes users to social engineering attacks that try to gather login credentials for malicious use. D.It prevents the user from needing to change a password following the password history component of the policy.

C.It exposes users to social engineering attacks that try to gather login credentials for malicious use.

What type of print technology uses toner? A.Inkjet B.Thermal transfer C.Laser D.Impact

C.Laser

What does attenuation mean? A.Bluetooth signal strength B.Signal interference C.Loss of strength of a signal D.Inactive access point

C.Loss of strength of a signal

You want to purchase a computer with a fast graphics interface. What type of expansion slot should you look for? A.Motherboard SIMM slots—this type of slot has 30-pin slots typically used in laptops while the 64-pin and 72-pin slots were found on desktop motherboards. B.SDRAM and DDR—this type of slot is common for desktop computers (if you use a laptop, you need to look for a SODIMM) each having various types and speeds. C.PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3). D.Connect solid-state graphics to the high-speed SATA slots and mechanical disk drives to the lower-speed slots.

C.PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3).

What basic command demonstrates that a printer is connected properly to a computer and that its driver is installed correctly for Windows? A.Run the troubleshooter B.Check devices and features C.Print test page. D.Printing preferences

C.Print test page.

If you have made changes to a file and want to keep both the original file and the modified version, what command should you use? A.Share B.Save C.Save As. D.Export

C.Save As.

What type of component provides persistent storage? A.The Random Access Memory (RAM) B.The Central Processing Unit (CPU) C.The Hard Disk Drive (HDD) and Solid State Drive (SSD) D.The Graphics Processing Unit (GPU)

C.The Hard Disk Drive (HDD) and Solid State Drive (SSD)

Why should you be more careful about deleting files from a USB flash drive than from the main hard drive? A.The files from the flash drive get recycled to the Windows recycle bin, making for easy recovery at a later time. B.The files from the main hard drive will not be recycled, so retrieving them if you change your mind will be very difficult. C.The files from a flash drive will not be recycled, so retrieving them if you change your mind will be very difficult. D.The files from the main hard drive get flagged for deletion but remain until the next Windows Update cycle.

C.The files from a flash drive will not be recycled, so retrieving them if you change your mind will be very difficult.

A printer is rated at 20ppm. What is the significance of this statistic? A.This is the number of projects per minute that your printer can handle. B.This is an image format used to measure the quality of an image the printer can produce. C.This is the number of pages per minute the printer can output. High page rates are important in high-volume environments. D.This is the voltage measurement of your printer.

C.This is the number of pages per minute the printer can output. High page rates are important in high-volume environments.

Which of the following parts of a friendly URL is dependent on a name resolution service? A.File path B.Protocol type C.Top level domain D.IP address

C.Top level domain

What type of access mechanism is MOST vulnerable to a replay attack? A.Use of multi-factor authentication B.Use of a complex password C.Use of a token generated by software D.Use of biometrics

C.Use of a token generated by software

What technique makes password cracking fairly easy? A.Choosing a passphrase instead of a password B.Including numbers, special characters, and letters C.Using simple words or names as a password D.Reusing the password across many sites

C.Using simple words or names as a password

Which of these is a NOT a "generation" of cellular Internet services? A) EV-DO B) GPRS/EDGE C) HSPA+ D) ARP

D) ARP (Address Resolution Protocol

Which of the following enable you to create segments of code that you can reuse? A) Neither procedures nor functions. B) Procedures C) Functions D) Both procedures and functions.

D) Both procedures and functions.

Which best defines Access Control on a computing device? A) Using a computer lock to physically secure the device to a permanent structure. B) Installing mantraps and other physical security mechanism to prevent access. C) Requiring biometric access to enter the facility where the device is located. D) Controlling who has the ability to use the device, or information stored on the device.

D) Controlling who has the ability to use the device, or information stored on the device.

With which method could an attacker use sniffing? A) Impersonation B) Destruction C) Availability D) Eavesdropping

D) Eavesdropping

Which of the following best represents the way data moves through a computer system? A) Processing, storage, input, and output. B) Output, input, processing, and storage. C) Processing, input, output, and storage. D) Input, processing, output, and storage.

D) Input, processing, output, and storage.

Which of these is NOT a form of a multitouch gesture? A) Sliding B) Tap C) Swiping D) Poke

D) Poke

In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently? A) Data Persistence B) Creation C) Import D) Queries

D) Queries

Which of these is NOT a form of malware? A) Spyware B) Virus C) Adware D) Software

D) Software

What would be considered a downside to producing digital products? A) They make global distribution easier. B) They are 100% safe from pirating. C) They are quick to download. D) They are easy to copy and steal.

D) They are easy to copy and steal.

Which of the following is NOT considered a best practice for installing software? A) Verify that the software is compatible with your operating system. B) Verify the computer hardware meets the application's recommended system requirements. C) Verify that you have a valid agreement or license to install and use the product. D) Verify the software was created in the country which you live in.

D) Verify the software was created in the country which you live in.

How does Plug-and-Play Installation work? A) A plug-and-play device can be plugged in and used immediately without requiring a device driver. B) When a new device is plugged in, a script plays to instruct the user on the process of installing a device driver. C) When a new device is plugged in, the user inserts/plays a CD on which drivers and instructions are provided. D) When a user connects a new device, Windows identifies it and attempts to install a new device driver.

D) When a user connects a new device, Windows identifies it and attempts to install a new device driver.

When troubleshooting a computer for a specific issue, what information do you need when searching the internet for possible solutions? A) You should obtain the serial number in order to find solutions related to your specific computer. B) You should obtain the processor type in order to find solutions related to your specific computer. C) You should obtain the manufacturer name in order to find solutions related to your specific computer. D) You should obtain the computer model in order to find solutions related to your specific computer.

D) You should obtain the computer model in order to find solutions related to your specific computer.

What is the main advantage of using a CPU in 64-bit mode? A)It's new and technically more scalable than the 32-bit CPU. B)CPUs don't use 64-bit mode; they are limited to 16 bits. This means that each instruction is 16-bits "wide". C)There are no advantages of a 64-bit CPU over a 32-bit CPU. They cost more money and are not worth the cost. D)64-bit software is more reliable and a bit faster than 32-bit software. It also supports more system memory.

D)64-bit software is more reliable and a bit faster than 32-bit software. It also supports more system memory.

What type of component provides a passive cooling solution? A)An insulation blanket B)A cooling fan C)A liquid cooling system D)A heatsink

D)A heatsink

In general, what is the difference between the char and string data types? A)There is a limit on the amount of storage that can be used by a string. There is no limit for a character. B)Char is variable length field for storing a sequence of characters. A string stores a single textual character or string in a fixed length field (typically 1 byte). C)A number entered as a string cannot be used for mathematical operations. When a number is entered as a character data type, you can perform mathematical operations on it. D)Char stores a single textual character in a fixed length field (typically 1 byte). A string is a variable length field for storing a sequence of characters.

D)Char stores a single textual character in a fixed length field (typically 1 byte). A string is a variable length field for storing a sequence of characters.

You are advising a colleague about best practices when troubleshooting. You have identified the following techniques to use to identify a problem: gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following CompTIA's troubleshooting model, what other piece of advice should you give? A)Test the theory to determine a cause B)Research the knowledge base or Internet C)Establish a theory of probable cause D)Determine if anything has changed

D)Determine if anything has changed

What factors should you consider when positioning input and output devices? A)Ensure that there is proper lighting on your desk to illuminate the screen. B)Ensure that there is enough room on your desk to stack them on top of each other. C)Ensure that the monitor is located at the edge of the desk to maximize work area. D)Ensure that they can be used without exerting strain, especially on the arms / wrists and back / neck.

D)Ensure that they can be used without exerting strain, especially on the arms / wrists and back / neck.

You have asked a senior manager to authorize your plan of action for resolving a fault in a software application. What name is given to the process you are following? A)Verifying full system functionality B)Testing the theory C)Considering multiple approaches D)Escalating the problem

D)Escalating the problem

You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed? A) If the printer is not a plug and play device, it does not require a driver. Just plug in the printer and connect it to the computer to complete the installation. B) Use a driver that has already been installed on the computer. A driver from any similar device should work. C) Use the File Manager to write a new driver for the printer. Install the driver, then upload it to the Windows Update website. D)Find and install the driver. Check first to see if it has been included with the printer. Otherwise, check the Windows Update website. If it isn't there, check the vendor's website.

D)Find and install the driver. Check first to see if it has been included with the printer. Otherwise, check the Windows Update website. If it isn't there, check the vendor's website.

What function of an operating system is performed by the "shell"? A)Interface between a host computer and a guest operating system. B)Interface between the applications and the hardware. C)Interface between the hardware and the firmware. D)Interface between the user and the computer.

D)Interface between the user and the computer.

What is an example of open source operating systems? A)BIOS and UEFI firmware B)Windows and MacOS C)Embedded operating systems D)Linux, Chromium, or Android

D)Linux, Chromium, or Android

What is the difference between freeware and open source software? A)Open source applications are those that may be downloaded from the Internet and used without restriction. B)Open source means that the software is intended for purchase to meet commercial needs. C)Open source is provided on a trial basis and users commonly have to purchase the full version after the trial period has passed. D)Open source means that the programming code used to design the software is publicly available.

D)Open source means that the programming code used to design the software is publicly available.

You are using the mouse to access a file located on a network server. There are currently no mapped drives. What should be your first step? A)Open the search dialog box and type the name of the file you are looking for. B)Open the This PC object from Explorer and locate the server hosting the file. C)Open the Quick Access object from Explorer and locate the server hosting the file. D)Open the Network object from Explorer and locate the server hosting the file.

D)Open the Network object from Explorer and locate the server hosting the file.

What type of software would you use to configure a server by connecting to it over the network? A)System restore B)Wireless input device C)Collaboration software D)Remote desktop

D)Remote desktop

What IoT device may contain a "black box" that is able to record event data? A)Environmental controls B)Home appliances C)Window curtains D)Smart Vehicle

D)Smart Vehicle

What crucial piece of information would you need when trying to locate support information about a computer system on the manufacturer's website? A)The type of keyboard and mouse you are using. B)The cost and date of purchase. C)The voltage on the power supply. D)The model number or a service code.

D)The model number or a service code.

Your colleague is using a laptop and you notice that he laboriously clicks the external mouse repeatedly to scroll through the document you are co-editing. Which feature could he use to be more productive? A)The zoom function to zoom out so that each click scrolls through more pages B)The Ctrl + Arrow Keys to move through a document word by word instead of letter by letter C)The trackpad on the laptop since it is designed for easy scrolling D)The mouse scroll-wheel on the external mouse to maneuver the scroll bar

D)The mouse scroll-wheel on the external mouse to maneuver the scroll bar

What is the registry and how does it distinguish Windows and Linux? A)The registry sets tasks to run at a particular time. Linux uses the cron utility to run tasks at a particular time. B)The registry is a utility that allows the user to shut down processes. Linux uses a command-line tool to kill a process. C)The registry is a snap-in to check which services are running and to start and stop each service. Linux does not use snap-ins. D)The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings.

D)The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings.

Following installation of a program written for an older version of Windows, you receive an alert that it might not have installed correctly. What feature could you use to make the program run correctly? A)Use the Repair option inherent in most programs to automatically fix this issue. B)The program's Details tab to use settings for the latest version with the latest patches. C)Use the uninstall/reinstall feature that should fix any compatibility issues you may have. D)Use the program's Compatibility tab to use settings for the older Windows version.

D)Use the program's Compatibility tab to use settings for the older Windows version.

What type of computing device(s) is macOS designed for installation on? A)Servers and network storage B)Smartphones and tablets C)Feature phones D)Workstations and laptops

D)Workstations and laptops

Your computer locks up (freezes) periodically and feels hot to the touch. Could these things be related? A)No, two different problems likely exist that need troubleshooting. B)Yes, overheating often occurs when the computer is locked up. C)No, temperature of your computer does not affect computer operation. D)Yes, many lockup problems are caused by overheating.

D)Yes, many lockup problems are caused by overheating.

You want to find something on a particular website, but the site does not have a search tool. Could you use a general search engine (and if so, how)? A)Yes—just type the website name first in the search engine, and then the keywords in quotations. B)No—you just need to keep searching the website until you find what you're looking for. C)No—it is not necessary to use a general search engine. Just type CTRL-F and type the word you are looking for. D)Yes—you use an advanced search form and provide a URL such as comptia.org.

D)Yes—you use an advanced search form and provide a URL such as comptia.org.

When setting up a desktop computer, what factor should you consider when deciding on the location of the system case? A)You need to find a dry and warm place where a cover can protect the unit from dust. B)You need to find the best location on the floor so that the system unit has accessible drives and USB ports. C)You need to check the proximity of the refrigerator to ensure that it is close enough. D)You need to consider the position of power outlet(s) and peripheral devices as well as air flow around the system unit.

D)You need to consider the position of power outlet(s) and peripheral devices as well as air flow around the system unit.

An attacker has used a rogue access point to intercept traffic passing between wireless clients and the wired network segment. What type of attack is this? A.A Denial of Service (DoS) attack B.A replay attack C.An impersonation attack D.A Man-in-the-Middle (MitM) attack

D.A Man-in-the-Middle (MitM) attack

When a client connects to a folder on a network server via a drive letter, what is the drive called? A.Shared folder B.Client-server drive C.Drive share D.A mapped drive

D.A mapped drive

What is a Standard Operating Procedure (SOP)? A.Policies that include privilege management, data/information handling, incident response, and use of company devices B.A measure by which to evaluate compliance with the policy C.General instructions for when situations have not been fully assessed or because the decision-making process is too complex D.An inflexible, step-by-step listing of the actions that must be completed for any given task

D.An inflexible, step-by-step listing of the actions that must be completed for any given task

What type of disk has the greatest capacity? A.DVD that is dual layer and single sided B.DVD that is dual layer and double sided C.DVD that is single layer and single sided D.Blu-ray that is a single layer

D.Blu-ray that is a single layer

How might malware hosted on a website be able to infect your computer simply by your browsing the site? A.By exploiting a human vulnerability related to deception B.By exploiting outdated hardware installed in the computer chassis C.By exploiting an improperly configured firewall D.By exploiting a vulnerability in software installed on your computer

D.By exploiting a vulnerability in software installed on your computer

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next? A.Prevent the browser from installing the plug-in and change your passwords due to phishing. B.Allow the browser to install the plug-in as it can be uninstalled later. C.Run an antivirus scan because you have an active malware infection. D.Check whether your friend actually sent the link in good faith first.

D.Check whether your friend actually sent the link in good faith first.

You are using a computer in an Internet cafe. What should you do at the end of the session? A.Log out of all applications you've been using. B.Log off the computer you're using. C.Power off the computer. D.Clear the browser cache.

D.Clear the browser cache.

Which of the following configuration changes does NOT reduce the attack surface? A.Removing unwanted and unnecessary software B.Closing unnecessary network ports C.Disabling unused OS features and services D.Configuring data back-ups in case ransomware encrypts the file system

D.Configuring data back-ups in case ransomware encrypts the file system

Which Windows interface is used for advanced management and troubleshooting of devices? A.Display tab B.Web configuration C.Personalization applet D.Device manager

D.Device manager

Which specific attack uses a botnet to threaten availability? A.Replay B.Power outage C.Man-in-the-Middle (MitM) D.Distributed Denial of Service (DDoS)

D.Distributed Denial of Service (DDoS)

What are the structural elements of a database? A.Each table stores information about queries and reports. B.Each query stores information about tables in reports. C.Each report stores information about tables in fields. D.Each table stores information about records in fields.

D.Each table stores information about records in fields.

Which email protocol(s) are used to download messages from a mail server? A.Either Internet Message Access Protocol (IMAP) or Simple Mail Transfer Protocol (SMTP) B.Either Post Office Protocol (POP) or Mail Exchanger (MX) C.Either Mail Exchanger (MX) or Internet Message Access Protocol (IMAP) D.Either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP)

D.Either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP)

How does Microsoft SQL Server differ from Microsoft Excel when used to store a dataset? A.Excel is an example of relational database software that is better suited for larger volumes of information and more users, whereas SQL Server is a flat file system. B.Excel is an example of relational database software, whereas SQL Server is a flat file system that is better suited for larger volumes of information and more users. C.Excel is an example of a flat file system that is better suited for larger volumes of information and more users, whereas SQL Server is relational database software. D.Excel is an example of a flat file system, whereas SQL Server is relational database software that is better suited for larger volumes of information and more users.

D.Excel is an example of a flat file system, whereas SQL Server is relational database software that is better suited for larger volumes of information and more users.

What type of cryptographic operation(s) are non-reversible? A.Key-pair B.Symmetric C.Asymmetric D.Hashing

D.Hashing

In considering availability concerns, what use might a lockable faceplate on a server-class computer be? A.It may prevent a natural disaster from damaging the hardware and corrupting the data. B.It may prevent the computer or server from overheating and shutting down. C.It may prevent a hacker from obtaining remote unauthorized network access. D.It may prevent the user from switching the machine on/off or accessing removable drives and ports.

D.It may prevent the user from switching the machine on/off or accessing removable drives and ports.

Why can't you use memory modules designed for a desktop computer in a laptop? A.Desktops use a different voltage level and it is unsafe to use DIMMs in a SO-DIMM slot because of overheating. B.You should be able to swap them because laptops and desktops both use the same type of DIMM Memory cards. C.The functionality of laptop and desktop memory are different enough so that one cannot be used in the other. D.Laptops use a smaller form factor called SO-DIMM while desktops use DIMMs.

D.Laptops use a smaller form factor called SO-DIMM while desktops use DIMMs.

What type of control prevents a user from denying they performed an action? A.Authentication B.Accounting C.Authorization D.Non-repudiation

D.Non-repudiation

What type of connector would you NOT use for an external hard drive to connect to a Windows PC? A.USB B.Firewire C.eSATA D.RGB

D.RGB

Which of the following is NOT an example of unstructured data? A.PowerPoint presentation B.Image files C.Text files D.Relational databases

D.Relational databases

What type of system allows a user to authenticate once to access multiple services? A.Virtual Private Network (VPN) B.Public Key Infrastructure (PKI) C.A one-time password D.Single Sign-On (SSO)

D.Single Sign-On (SSO)

What provides sound functionality in a personal computer? A.Sound functions in modern PCs will send your audio directly to an external radio for processing. B.Sound functions must be provided by a plug-in sound card. C.Sound functions are provided by a plug-in card with external speakers. D.Sound functions are often provided by the motherboard chipset.

D.Sound functions are often provided by the motherboard chipset.

What identifies a website as using the secure HTTPS protocol with a valid certificate? A.The URL shows the "http://" protocol and the browser shows a padlock icon. B.The website has a recent copyright date. C.Check the Better Business Bureau. D.The URL shows the "https://" protocol and the browser shows a padlock icon.

D.The URL shows the "https://" protocol and the browser shows a padlock icon.

What kind of data would you expect to find in a file with a TIFF extension? A.This is a text format. B.This is a video format. C.This is a sound format. D.This is an image file format.

D.This is an image file format.

You have installed a screensaver application. Later, after updating your anti-virus software, a malicious program is found. This appears to have infected your system at the same time as the screensaver was installed. What class of malware is this? A.Spyware B.Virus C.Adware D.Trojan Horse

D.Trojan Horse

Which of these statements is false? A.You can transfer images from the camera over Wi-Fi or Bluetooth if supported. B.You can connect the camera itself to the PC over a USB cable. C.You can remove the flash media from the camera and insert it into a flash reader. D.You can connect the camera's flash memory card directly into your computer's USB port.

D.You can connect the camera's flash memory card directly into your computer's USB port.

<!DOCTYPE>

Defines the document type. This declaration goes before the <html> start tag

HPSA+

Evolved High Speed Packet Access (HSPA+) is a 3G standard developed from GSM networks

HFS+ file system

The Hierarchical File System (HFS+) can be found on Apple Mac workstations and laptops

Protocol Type

The protocol type provided in the web address describes the access method or service type being used. For example, HTTP://

Utility Access

Utility Access happens when an application might use a database "in the background" without the user really being aware of its presence. Alternatively, the application might provide a specific Graphical User Interface (GUI) or form to allow ordinary users to add and search records.

WIA

WIA is not a function, it is the plug-and-play software that newer scanners use. This software will present options for the image output.

Smartsheet

allow access to word processing, spreadsheets, and presentations with just a web browser installed on the client.

key-pair encryption

an implementation of asymmetric encryption and can be found in a Public Key Infrastructure (PKI). A key-pair uses one key to encrypt a message and another key to decrypt the message. This is a reversible process.

Web configuration

an interface used to configure IP-based peripherals and is accessed using a web browser. Only devices with IP addresses can be managed this way.


Set pelajaran terkait

FI-094 Individual Activity 1: The Income Statement Scramble

View Set

Form A Workplace Communica!on with Computers

View Set

LUOA World History Unit 8 Test Review

View Set

Unit 3: States and Changes of Matter - Chemistry Honors

View Set

Pathophysiology Chapter 19 (Disorders of Cardiac Function) PrepU Quizzes

View Set