CompTIA - ITF Practice test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use? String Boolean Float Integer

String

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on? Only 32-bit systems Only 64-bit systems Only 16-bit and 32-bit systems Both 32-bit and 64-bit systems

Both 32-bit and 64-bit systems

You sign up for an online class at the local community college. The course is all web based. You open your favorite browser to enter the class portal, and you get a message "Use one of these browsers."What is the problem? You typed the URL wrong. You need to make a secure connection. The class has not started yet. Browser compatibility.

Browser compatibility.

Microsoft Office 365 and Google G Suite are examples of what type of internet service? Cloud-based collaborative applications Always-on applications Cloud storage Network attached storage solution

Cloud-based collaborative applications

In which of the following situations should you expect total privacy? Email messages and attachments Social networking Instant messaging Financial transactions

Financial transactions

Which of the following BEST describes a flowchart? It is a step-by-step procedure that illustrates how a problem is to be solved. It starts at the first line and then executes one line at a time until the end. It does the same thing over and over in exactly the same way. It is a visual representation of the logic in a program.

It is a visual representation of the logic in a program.

Which of the following Application Architecture Model tiers describes office productivity software? One Tier Two Tier Three Tier n-Tier

One Tier

Joe, a user, receives an email from a popular video streaming website urging him to renew his membership. The email appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe? Zero-day attack Phishing Man-in-the-middle Trojan horse

Phishing

Which of the following tools would you use to check connectivity between two computers? TCP/IP Ping DHCP Tracert

Ping

A small business has doubled in size over the past year. The IT consultant for the company is recommending the addition of a computing device that will provide central access to business resources. Which of the following describes the type of device needed? Tablets for each employee Laptops for each employee Network Server Business-class workstations

Network Server

Which of the following is an advantage of using a database over a flat file system? Software upgrades CSV files Imports and exports Processing speed

Processing speed

Jeremy is building an application that needs access to read, write, update, and delete information in a database. Which of the following databases does Jeremy need? Direct access Query builder User interface access Programmatic access

Programmatic access

Which of the following database objects provides a summary of data? Queries Tables Reports Forms

Reports

Which of the following networking interfaces connects a computer to a wired local area network (LAN)? RFID RJ-11 NFC RJ-45

RJ-45

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet? Cable Fiber optic DSL Satellite

Satellite

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) Content Membership fees Selling user-generated data to other companies Usage fees Targeted ads

Selling user-generated data to other companies Targeted ads

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) Bluetooth 802.11g 802.11b 802.1x 802.11a

802.11g 802.11a

Which of the following is the maximum bit length for WPA2 (Wi-Fi Protected Access 2) binary encryption keys? 56 bits 16 bits 256 bits 32 bits

256 bits

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store? 8 megabytes 1,024 kilobytes 3 terabytes 4 gigabytes

3 terabytes

What are the advantages of a switch on an enterprise network over a switch on a SOHO (Small Office Home Office) network? (Select two.) A switch on an enterprise network can both transfer data between networks and transfer data between devices on the network. A switch on an enterprise network provides safer filtering of malicious data entering the network. A switch on an enterprise network can provide 20 or more ports. A switch on an enterprise network can process data into 1s and 0s faster. A switch on an enterprise network can be interconnected to other switches to support hundreds of connections.

A switch on an enterprise network can provide 20 or more ports. A switch on an enterprise network can be interconnected to other switches to support hundreds of connections.

As a system administrator, you are trying to keep track of who does what on the company network. Which of the following describes this access control process? Authentication Surveillance Authorization Accounting

Accounting

Which programming language type is the most basic human-readable and closest to actual machine language? Query Assembly Interpreted Compiled

Assembly

A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value? Single Boolean Char String

Char

Which of the following is the BEST example of using an application that is locally installed without network access? Creating a PowerPoint presentation for a team meeting. Accessing a company folder through a VPN application. Writing a letter using the Google Docs application. Viewing the latest email in your Outlook Inbox.

Creating a PowerPoint presentation for a team meeting.

A restaurant chain maintains a Suppliers relational database that lists all suppliers for the restaurant. Recently, the restaurant ended a contract with CafeFresh in favor of another supplier of organic produce.The database manager wants to use a SQL command to remove CafeFresh from the database. Which of the following commands would remove all CafeFresh records? DELETE supplier_name = 'CafeFresh' FROM Suppliers DELETE * FROM Suppliers WHERE supplier_name = 'CafeFresh' DELETE FROM TABLE Suppliers WHERE supplier_name = 'CafeFresh' DELETE Suppliers WHERE supplier_name = 'CafeFresh'

DELETE * FROM Suppliers WHERE supplier_name = 'CafeFresh'

Which of the following is typically used for large data backups of servers? DLT tape DVD-R CD-R RAID

DLT tape

Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products. Which of the following describes this step of the analytics process? Product design Risk assessment Data query Data correlation

Data correlation

A systems engineer wants to set up an array of hard disks with the same service (and its associated data) stored on each disk. If one disk fails, the service can still be accessed by another hard disk in the array. Which of the following BEST describes this type of fault tolerance strategy? Network redundancy Data redundancy Site redundancy Power redundancy

Data redundancy

A system administrator has a problem with a network server dropping its connection to the network on a regular basis. The administrator decides to list all the probable causes for the issue and then test each one individually to try and isolate what is causing the issue. Which of the follow BEST describes this troubleshooting technique? Divide and conquer. Create an action plan. Identify the problem. Document the process.

Divide and conquer.

Tom has a 7-gigabyte file he wants to put on a 16-gigabyte flash drive. To be able place this large file on the flash drive, what must Tom do to this flash drive first? Format the flash drive to FAT32. Re-partition the flash drive Format the flash drive to NTFS. Format the flash drive to FAT16.

Format the flash drive to NTFS.

Which Internet protocol is used to transmit encrypted data? HTTP FTP DNS HTTPS

HTTPS

What is the number of instructions a CPU can perform per second measured in? Hertz Bytes Bits Ohms

Hertz

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose? String Boolean Float Integer

Integer

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do?color = input('What is your favorite color?\n')print('Your favorite color is %s.' % color) It sends the output to a printer. It sets the font color to the color specified in the input. It sets the system color variable. It gets input and produces output.

It gets input and produces output.

Which of the following file system features uses a change log to track file changes in the file system? Journaling Encryption Compression Permissions

Journaling

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address? MAC address filtering DHCP SSID WEP

MAC address filtering

Modern smartphones are amazing devices. They have more computing power than the computers that put a man on the moon in 1969. Which type of operating system do they run? Workstation OS Server OS Embedded OS Mobile OS

Mobile OS

Which of the following BEST describes the Small Office Home Office (SOHO) hardware component that translates an internet service provider's (ISP) signals into 1s and 0s that can be used by a computer? Switch Modem Firewall Router

Modem

The password policy below incorporates the following:Passwords must include at least one capital letterPasswords must include a mix of letters and numbersPasswords must be different from the past eight passwordsPasswords must contain at least one non-alphanumeric characterWhich of the following password best practices are being used? (Select TWO). Password expiration Password age Password length Password history Password lockout

Password history Password complexity

A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field? Foreign key Primary key Public key Private key

Primary key

Which database object is essentially questions that we can ask the database? Reports Forms Queries Tables

Queries

You are connecting your new 5.1 speaker set to your computer. The speaker set uses coaxial cables to plug into an S/PDIF jack. Which type of connection is MOST likely being used? Serial RJ-45 Fiber optic RCA

RCA

A system administrator needs to update a printer driver on the few remaining Windows 7 company laptops. Microsoft no longer offers support for Windows 7, so the administrator has found a third-party website with the driver available for download.Which of the following should the administrator do before downloading and installing the driver? (Select two.) Search for references from others on the website's validity. Make sure the OS (operating system) is up to date with the latest patches. Run a checksum on the driver package file and compare it against the one provided by the third party. Make sure that the driver is being downloaded over a secure HTTPS connection. Check online forums for others who have tried installing the driver.

Search for references from others on the website's validity. Check online forums for others who have tried installing the driver.

Which of the following contains information that allows the software vendor to collect and store data about software usage? Software subscription Software agreement Software installation instructions Software documentation

Software agreement

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________. Bloatware Spam Cookies Illegal messages

Spam

Which of the following BEST describes what a kilobyte is a measurement of? Storage space Power level CPU speed Data throughput

Storage space

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC? Disk Management Correct Answer: Apps and Features Task Manager Device Manager

Task Manager

The || (or) logical operator only requires one of the two conditions to be true.The && (and) logical operator requires both conditions to be true.The evaluation of else if guess >=1 && guess <= 10 will be true for any input that is greater than or equal to 1 and less than or equal to 10. Therefore, if 4 is entered, the prompt of "Your guess is valid" will be shown.The prompt of "Your guess is not valid" will only be shown if the number is zero or greater than 10, as indicated by the evaluation of if guess <= 1 || guess >= 10.

The || (or) logical operator only requires one of the two conditions to be true.The && (and) logical operator requires both conditions to be true.The evaluation of else if guess >=1 && guess <= 10 will be true for any input that is greater than or equal to 1 and less than or equal to 10. Therefore, if 4 is entered, the prompt of "Your guess is valid" will be shown.The prompt of "Your guess is not valid" will only be shown if the number is zero or greater than 10, as indicated by the evaluation of if guess <= 1 || guess >= 10.

Which of the following exist to help consumers know what products they're buying? Fair Use Copyrights Trademarks Patents

Trademarks

What is junk email? Another name for webmail applications Email applications that don't function well Poorly worded email drafts Unwanted, unsolicited email

Unwanted, unsolicited email

Which of the following is a programming identifier that would be used to define values that change? Vectors Arrays Constants Variables

Variables

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used? WPA WPS WPA2 WEP

WPA2


Set pelajaran terkait

Chemistry 1.6 Kinetics of Nuclear Decay and Nuclear Binding Energy

View Set

BIOS255: The heart: Order of Blood Flow

View Set

Ch 7 - Individual and Group Decision Making learnsmart/smartbook

View Set

American Govt (PLS) Chapter 4 Smartbook

View Set