Testout B.3.1 Blooket Import
Dan is using Search on his web browser to find Clearwater Beach, which could be in Alabama or Florida. Which of the following search phrases would help Dan find the beach location MOST effectively?
"Clearwater Beach" Alabama OR Florida
Mark wants to include a string in his computer program that lets users know they have selected the correct option. He wants to include the option in double quotes. However, the entire string also needs to be delimited by double quotes. Which of the following is the string Mark should use to include the option in double quotes?
"Congratulations! \"Launch Audit\" is the correct option."
Emily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi. Which of the following search phrases will help her find exactly what she needs?
"Mississippi pecan pie"
Which of the following transfer rates is the FASTEST?
1,480 Mbps
A network administrator is following the troubleshooting process to try and resolve a third-party application problem. After researching the issue and backing up the system, what is the next step in the troubleshooting process for the administrator?
Establish a theory of probably cause.
Sharon works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Which of the following is the first step Sharon needs to perform in the analysis process?
Capture the data.
A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value?
Char
Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem?
Check for obvious or common issues.
When you are identifying possible causes of a problem, which of the following are troubleshooting methods you should try? (Select two.)
Check for simple, obvious, and common problems and Consider using multiple approaches.
Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?
Fair Use
A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?
Float
While both the integer data type and float data type can be used for whole numbers, what advantage does the float data type have over integers?
Floats can include decimal places.
Which of the following processing speeds runs at one billion cycles per second?
GHz
Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates currently available to consumers is the FASTEST for network switches?
Gbps
What is the number of instructions a CPU can perform per second measured in?
Hertz
Which of the following notational systems is MOST likely used to represent a MAC address?
Hexadecimal
In the decimal number system, you can think of each digit representing a place (or column) in the number. For example, in the decimal number 652, the two, the five, and the six are all in different places and each place can be expressed as 10 to a specific power. Which power of 10 does 6 in the above example represent?
10 to the second power
Which of the following is the correct binary representation of the number 22?
10110
Which of the following is the binary number equivalent of the hexadecimal number F5C8?
1111010111001000
A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store?
3 terabytes
One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process?
Output
Which of the following accurately describes the characteristics of patents? (Select two.)
Patent holders are required to provide the public with details about how their invention works and Patent holders can prevent other people from making or selling their patented invention for a limited time.
The legal protection of rights to ideas and discoveries is called a copyright. What are the other ways that intellectual property can be legally protected? (Select two.)
Patents and Trademarks
Which of the following is a significant difference between a patent and a trademark?
Patents exist to protect creators, while trademarks exist to protect consumers.
Which of the following tools would you use to check connectivity between two computers?
Ping
You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?
Plug in an external monitor
When Jacob first starts his computer, he hears several warning beeps and nothing else happens. Which of the following is sending out the beeps?
Power-On Self-Test (POST)
Which of the following makes sure that all the computer system hardware is in working order before loading the operating system?
Power-On Self-Test (POST)
A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?
Processing
Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?
Statistical tools and formulas
Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time?
Storage
Which of the following BEST describes what a kilobyte is a measurement of?
Storage space
As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use?
String
A system administrator has completed the entire troubleshooting process. Some employees at the office were plugging their Ethernet cable into the wrong port and not getting access to network resources. Although the administrator tested the solution, a couple weeks later other employees began to help tickets for the same issue. Which of the following BEST describe what the administrator might have missed doing during the troubleshooting process?
Taking preventative actions.
Which of the following throughput transmission units is frequently used when linking data centers, cities, and countries?
Tbps
Which of the following are specifically designed to help protect digital products? (Select two.)
Technological Protection Measures (TPM) and Digital Rights Management (DRM) tools\
The first step in data analytics is to collect raw data and summarize the information. What is the next step in data analytics?
The analysts use statistical tools and formulas to look for trends, patterns, and data correlations.
Which of the following Unicode character encoding standards is MOST commonly used for building web pages?
UTF-8
Which of the following encoding schemes would MOST likely be used to represent an emoji?
Unicode
A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first? (Select two.)
Verify that the volume isn't muted and Verify that speakers are plugged into the correct jack and are powered on.
As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system. What should your plan of action include?
Detailing steps and the resources needed to implement the solution
A system administrator has a problem with a network server dropping its connection to the network on a regular basis. The administrator decides to list all the probable causes for the issue and then test each one individually to try and isolate what is causing the issue. Which of the following BEST describes this troubleshooting technique?
Divide and conquer.
Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?
Document findings/lessons learned, actions, and outcomes
Identifying the problem is the first step in CompTIA's troubleshooting model. Which of the following are tasks associated with this step? (Select three.)
Duplicate the problem, Question users, and Identify symptoms
The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?
Duplicate the problem, if possible
How many bits are in a single byte?
Eight
A system administrator has been troubleshooting a problem with a database server not providing the information necessary to generate reports from a customer application. The administrator has tried testing several theories, but nothing seems to resolve the issue. Which of the following describes the MOST effective action the administrator should take next to try to resolve the problem?
Escalate the problem to the database engineer.
While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?
Establish a plan of action to solve the problem and identify potential effects
Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?
Establish a theory of probable cause
Arrange the following from smallest to largest.
Kilobyte, Megabyte, Gigabyte, Terabyte
Which of the following statements BEST describes a firewall?
A firewall restricts the flow of data between hosts and networks by checking data packets to make sure they are safe.
Which of the following is the best definition of a bit?
A single 1 or 0 in a digital signal
What common method do file systems use to keep track of which users can read, write, move, or delete a file or folder?
Access Control List
A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users. Which of the following is the BEST approach to solving these problems?
Approach each problem separately.
Which of the following are security controls you can use to help protect the data on your network? (Select three.)
Backups, Access controls, and Fault tolerance
When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?
Bar graph
The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.
Big Data
A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?
Boolean
April, a programmer, wants to convert the binary number 1111001101011011 to a hexadecimal number. What is the recommended first step to perform this conversion manually?
Break up the binary number into chunks of four digits.
The basic (and smallest) unit of computer information is the bit (binary digit). Memory and file sizes are commonly measured in multiples of bits. What is the first multiple of a bit called?
Byte
Which of the following lists the throughput rates (bits per second) from slowest to fastest?
Kbps, Mbps, Gbps, Tbps
What is the first step of the data analytics process?
Collecting raw data
Which of the following are features of using an Excel table to store data? (Select two.)
Column sorting and Total row
What is the general purpose and use of software?
Create information from data
A network engineer needs to convert the binary number 1101100110110011 to a hexadecimal number. Which of the following is the correct hexadecimal number?
D9B3
Which of the following describes the process of turning data points into useful information?
Data analytics
A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?
Data and information
Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products. Which of the following describes this step of the analytics process?
Data correlation
Which of the following BEST describes computer data processing?
Data in memory is converted to information.
Which of the following describes using data analytics to inform business operations?
Data-driven business decisions
A network host has an IPv4 address of 192.168.12.155. Which of the following notational systems is used to represent this IP address?
Decimal
Given the numerical value 1010101.11, which of the following number systems is MOST likely represented?
Decimal
Which of the following lists the basic computing and processing steps in order?
Input, processing, output, and storage
A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose?
Integer
When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?
Line graph
An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.)
Make sure the power cord is plugged into the wall and Make sure the surge protector is turned on.
Which of the following is available in Windows to provide usage restrictions for data files?
NTFS Permissions
Which of the following does a computer use to make sure that people, hardware, and software can interface with each other?
OS (operating system)
Mary is a data analyst for a large pharmaceutical company. The company wants to know how their new organic line of over-the-counter cold relief medications is being perceived by customers and what they can do to better promote the product. Mary has collected a significant amount of raw data and has analyzed it to find connections and links between the data points. The insights are significant, and now she needs to inform company management. What is Mary's next step in the data analytics process?
Provide meaningful reporting with a system that includes search features, charts, and graphs.
What is the collective name for creations that are not the intellectual property of anybody?
Public Domain
Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?
Reports
Greg is a network administrator for a medical supply company and has identified a problem with an access control list (ACL) failing to filter out data packets that have been restricted. What is the next step Greg should take to troubleshoot the ACL problem?
Research knowledge bases and the internet for information related to the problem.
Which of the following are exclusively associated with copyright protection? (Select three.)
Right to lend a work, Right to reproduce a work, and Right to make derivatives of a work
You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue?
Search for the error in Microsoft's knowledge base.
Firewalls, data encryption, backups, and passwords are designed to protect computing devices. These technologies are all examples of what?
Security controls
Jonathan has a computer with an older PC bus interface and is getting a fiber optic connection for his home office. Which of the following BEST describes the processing speed environment?
The older PC bus runs at a MHz processing speed, while the fiber optic network equipment runs at a GHz processing speed.
Which of the following are examples of input devices? (Select two.)
Touch Screens and Keyboards
A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?
Trademark
Which of the following exist to help consumers know what products they're buying?
Trademarks