TestOut IT Fundamentals Pro: All Section Quizzes (Chapters 1 - 11)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In which of the following careers does one usually work together in teams to create software programs? (8.6.4) Web developer Database programmer Quality assurance engineer Application developer

Application developer

Which component gets things running until the operating system takes over? (4.3.18)

BIOS

Which of the following should an electrical engineer be proficient in using? (3.7.4)

CAD software

What is the general term for software that creates and manages databases? (7.2.8) Microsoft Access MySQL Tables DBMS

DBMS

Which SQL command is used to give a user permission to a specific database object? (7.4.16) UPDATE REVOKE VALUES GRANT

GRANT

Which Internet protocol is used to transmit encrypted data? (10.4.9) FTP DNS HTTP HTTPS

HTTPS

Which Information Systems (IS) career oversees integrating different technologies and systems within an organization? (9.6.4) Project manager IT technician IS manager Systems analyst

IS manager

Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others? Introversion Resourcefulness Interpersonal skills Integrity

Integrity

Which of the following would be the MOST difficult to troubleshoot? (3.6.15)

Intermittent problem

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task? (8.4.8) CSS C++ HTML JavaScript

JavaScript

What type of file system is NTFS? (4.4.17)

Journaling

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals? (9.3.10) Pie chart Line graph Bar chart Excel table

Line graph

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones? (6.2.12) VPN Infrared transmitters Bluetooth transmitters NFC chips

NFC chips

Which of the following are common risks of using social media? (Select two.) (5.5.8) You can be added to a group without your permission. Personal information can be used without your permission Privacy settings are virtually non-existent. Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process? (10.6.20) Perform a backup. Create an action plan. Implement the solution. Verify system functionality.

Perform a backup.

In most operating systems, what is a running application called? (4.2.13)

Process

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? (5.3.14) Proxy settings Private browsing Invalid certificate Browser cache

Proxy settings

What is the collective name for creations that are not the intellectual property of anybody? (9.5.6) Federal Reserve Unclaimed Works Royalty Free Public Domain

Public Domain

Which of the following are exclusively associated with copyright protection? (Select three.) (9.5.6) Right to apply for a patent Right to make derivatives of a work Right to use a trademark Right to lend a work Right to reproduce small excerpts of a work Right for anyone to display a work Right to reproduce a work

Right to make derivatives of a work Right to lend a work Right to reproduce a work

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure? (10.4.9) IMAP Hotspot VPN Bluetooth

VPN

Which of the following components is NOT required to create a network? (6.2.12) Computer systems Network interfaces Network media Wireless adapter

Wireless adapter

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? (5.2.8) Wide Area Network Internet Intranet World Wide Web

World Wide Web

Which of the following commands is used to navigate to different folders in Command Prompt? (4.4.17)

cd

A NOT NULL __________ is a rule that prevents certain fields in a database from being left blank. (7.3.12) constraint schema scalability query builder

constraint

How many bits are in a single byte? (2.3.7) four eight twelve sixteen

eight

Mary needs to rename her report.txt file to final_report.txt. Which command will allow her to do this? (4.4.17)

ren report.txt final_report.txt

Which of the following is a valid email address? (5.6.10) [email protected] support#testout.com support@testout support#testout

[email protected]

Which of the following would be the BEST answer to the question, "What is your greatest weakness"? "I am very unorganized." "I don't think I have any weaknesses." "I'm a perfectionist." "I lack patience but this is something I'm working on."

"I lack patience but this is something I'm working on."

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) (8.3.18) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%. Query 8% 7% Branching Looping

8% Branching

A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following? (8.6.4) A full-stack web developer A database programmer A quality assurance engineer An application developer

A full-stack web developer

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose? [3.2.4]

Desktop

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs? (3.5.17)

Hard disk

What is the computer language that makes relational databases work? (7.4.16) Java SQL C++ Python

SQL

Which digital assistant is native on Apple devices like the iPad or Mac computers? (5.7.6) Siri Google Assistant Cortana Alexa

Siri

Which of the following is considered part of a smart home? (5.7.6) Telephone Laptop Thermostat TV

Thermostat

What kind of connector is pictured here? (3.4.16)

USB

Which type of connector is commonly used for keyboards and mice? (3.4.16)

USB

Which connector on the back of a computer is used to attach a mouse to a modern PC system? (3.4.16)

USB A

What is the best countermeasure against social engineering? (10.2.17) Acceptable use policy Access auditing Strong passwords User awareness training

User awareness training

Which of the following computer components is the MOST important part of any modern computer? [3.3.15]

CPU

Which of the following Application Architecture Model tiers describes office productivity software? (6.6.13) n-Tier One Tier Two Tier Three Tier

One Tier

Which of the following is a way for programmers and others to make sense of complex business flows? (7.2.8) Database management system Microsoft Access Data modeling Primary keys

Data modeling

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics? (7.6.4) Data scientist Data analyst Database administrator Database developer

Data scientist

Which of the following are advantages of cloud computing? (Select two.) (5.4.9) Lower speeds Local software Data security Easier collaboration Greater costs

Data security Easier collaboration

Which of the following careers is responsible for backing up and securing an organization's databases? (7.6.4) Data scientist Data analyst Database administrator Database developer

Database administrator

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems? (7.6.4) Database developer Database administrator Data analyst Data scientist

Database developer

Which invention made it possible to have an entire computer on a single circuit board? (2.2.7) Vacuum tubes Microchip Transistors Silicon

Microchip

Which of the following is NOT an example of an operating system? (4.2.13)

Microsoft

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer? (6.2.12) Switch Server Router Modem

Modem

Which of the following is a type of input device? (2.2.7) Hard drive Touchscreen Monitor Speakers

Touchscreen

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use? (6.7.8) Tracert Ipconfig Route Ping

Tracert

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet? (6.4.13) Fiber optic Cable DSL Satellite

Satellite

Which type of digital picture can be scaled to any size without losing quality? (2.4.12) Transparent Vector Raster High-res

Vector

What do cloud services provide to help with privacy and security concerns? (5.4.9) Backups Encryption Accessibility Collaboration

Encryption

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email? (10.4.9) Plain text Host-based firewall File level encryption Cipher text

Cipher text

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive? (6.5.11) Client error Server error Informational Redirection Success

Client error

Which of the following components of a successful access control framework is the process of proving that you are who you say you are? (10.5.19) Accounting Authentication Authorization Access control

Authentication

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver? (4.3.18)

Device Manager

Which of the following utilities would you use to automatically assign IP addresses on a network? (6.7.8) DHCP HTTP TCP/IP DNS

DHCP

On a flowchart, which of the following represents a decision? (8.3.18) Rectangle Parallelogram Arrow Diamond

Diamond

What is one of the things that has set Siri apart from other digital assistants? (5.7.6) Easter eggs Playing music Reminders Voice command

Easter eggs

Which single digit has the highest value in the hexadecimal number system? (2.3.7) G 0 H F 9

F

Which of the following is often the hardest part of troubleshooting? (3.6.15)

Reproducing the problem

Which of the following would a PC repair technician work on? (3.7.4)

Laptop

Which type of analytical data can help you make investment decisions? (7.2.8) Sensor Transactional Market Machine

Market

Which of the following is primarily operated by a touchscreen? [3.2.4]

Mobile Device

What are non-relational databases that deal with Big Data often referred to as? (7.5.6) SQL CRUD NoSQL RDBMS

NoSQL

When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole? (9.3.10) Bar graph Excel table Line graph Pie chart

Pie chart

Which of the following is a top cause of motherboard failure? (3.6.15)

Physical damage

Which of the following Scrum artifacts is a central list of work that needs to be done? (9.4.5) Sprint backlog Sprint goal Product backlog Project evaluation

Product backlog

Which of the following Artificial Intelligence (AI) concepts includes self-driving cars? (9.2.9) Gaming Robotics Neural networks Expert systems

Robotics

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used? (10.4.9) IMEI POP3 S/MIME IMAP

S/MIME

Which of the following digital communication media does NOT require a connection to the Internet? (4.5.16) Discussion board Video conference Social network SMS

SMS

What protocol is used to send email messages from a mail client to a mail server? (6.5.11) IMAP FTP SMTP SNMP POP3

SMTP

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? (6.4.13) Satellite ISDN DSL Dial Up Cable modem

Satellite

Which of the following terms is used to describe a lightweight development process with very little overhead? (9.4.5) SDLC Iterative Waterfall Scrum

Scrum

You submitted the same paper from high school for a college class. Which form of plagiarism is this? (5.8.8) Direct Self Accidental Mosaic

Self

Which type of data have elements in common but do not fit into rigid rows and columns in a table? (7.5.6) Non-relational Semi-structured Non-structured Structured

Semi-structured

Which of the following flow chart concepts is depicted below? (8.3.18) [Insert Visual lol] Methods Vectors Sequence Arrays

Sequence

Which of the following provides services to hosts on its network? (6.2.12) Storage Client Email Server

Server

Which of the following describes the strategy that defines a businesses social media goals and objectives? (5.5.8) Social channels Social media marketing Search Engine Optimization (SEO) Social Media Optimization (SMO)

Social Media Optimization (SMO)

Software that requires a monthly subscription fee is often called _______________. (6.6.13) Software as a service Online-only software Temporary software Web applications

Software as a service

Which of the following is something a computer scientist would do? (1.2.5) Help organizations know how to generate information Create and maintain computer networks Help people with their technological needs Solve problems in areas like robotics

Solve problems in areas like robotics

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________. (10.5.19) Bloatware Spam Cookies Illegal messages

Spam

What is the name of the menu in the bottom left corner of the Windows environment? (4.5.16) Command Prompt Main Menu Start Menu Windows Menu

Start Menu

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations? (9.3.10) Databases Data-driven business decisions Statistical tools and formulas Data points

Statistical tools and formulas

The flow of goods and services from the producer to the consumer is known as which of the following? (9.2.9) Supply and demand Order management Information System Supply chain

Supply chain

Which of the following is a methodology used by systems analysts? (9.4.5) Business Process Management (BPM) Assess, Design, Develop, Implement, Evaluate (ADDIE) Total Quality Management (TQM) System Development Life Cycle (SDLC)

System Development Life Cycle (SDLC)

Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened? (4.7.7) Program force-close System crash Software crash System slowdown

System crash

What is the name of the protocol suite used on the Internet? (6.5.11) HTTP/DNS TCP/IP HTTP UDP/IP

TCP/IP

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice? (7.5.6) Relational database Text-based flat file Binary flat file Database Management System

Text-based flat file

Which of the following are primary sources? (Select two.) (5.8.8) Encyclopedia entry on wolves Documentary about the Great Depression Newspaper article about new legislation The United States Constitution Jane Austen's Pride and Prejudice

The United States Constitution Jane Austen's Pride and Prejudice

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause? (5.6.10) The video must be constantly restarted. The video may become glitchy. The video may cause your system to crash. A copy of the video file must first be saved to your computer.

The video may become glitchy.

What is the biggest benefit to using a DHCP server in a large network? (6.5.11) DHCP servers use DNS. They save time for the network administrator. DHCP servers can assign MAC addresses. There is no benefit to using a DHCP server.

They save time for the network administrator.

Which of the following utilities would you use to find the path between two computers? (6.7.8) DNS Tracert HTTP Ping

Tracert

Which of the following exist to help consumers know what products they're buying? (9.5.6) Fair Use Trademarks Copyrights Patents

Trademarks

Which of the following is used to identify specific hypertext resources on the World Wide Web? (5.2.8) Hyperlink Transmission Control Protocol Uniform Resource Locator Internet Protocol

Uniform Resource Locator

Which type of college would you attend to earn a bachelor's degree? (11.2.5) High school University Technical college Community college

University

What is junk email? (4.5.16) Email applications that don't function well Poorly worded email drafts Another name for webmail applications Unwanted, unsolicited email

Unwanted, unsolicited email

A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take? (4.2.13)

Use Task Manager to end task

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used? (10.4.9) WPA WEP WPS WPA2

WPA2

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created? (8.3.18) Software Flowchart Algorithm Pseudocode

Algorithm

Which of the following should be done to protect your identity when creating a social media profile? (5.5.8) Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.

Always review and set privacy settings.

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? (5.3.14) Change browser settings to prevent pop-up windows. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to block third-party cookies.

Change browser settings to notify before downloading.

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router? (10.5.19) Change the router's default password Press the WPS button Disable SSID broadcast Adjust the radio power levels

Change the router's default password

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform? (4.3.18)

Check the vendor's website for an updated driver.

To be a proper HTML document, there are a few tags that every web page needs. Put these tags in the proper order. (8.5.16) <body> <html> </head> </html> </body> <head>

<html> <head> </head> <body> </body> </html>

Which of the following is most likely to have peer-reviewed material written by an expert in the field? (5.8.8) Library book Academic journal Cable news channel Newspaper

Academic journal

Which data type uses historical data to make decisions in the present? (7.2.8) Operational Conceptual Analytical Logical

Analytical

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this? (8.4.8) The C# programming language Integrated development environment (IDE) Cascading Style Sheets (CSS) Application programming interface (API)

Application programming interface (API)

Which programming language type is the most basic human-readable and closest to actual machine language? (8.2.7) Assembly Query Compiled Interpreted

Assembly

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________. (7.5.6) Big Data Metadata Omni Data Business Data

Big Data

Drag the system component on the left to the device or program that fits with the system component. (4.3.18) Utility Software Device drivers Firmware Backup software Printer Camera Television Games console Antivirus software Disk cleaner Video card

Backup software (Firmware) Printer (Device drivers) Camera (Firmware) Television (Firmware) Games console (Firmware) Antivirus software (Utility Software) Disk cleaner (Utility Software) Video card (Device drivers)

Which hardware component processes data? [3.3.15]

CPU

Which of the following is the most common type of resume? Functional Targeted Chronological Combination

Chronological

What is the first step of the data analytics process? (9.3.10) Using statistical tools to analyze data Collecting raw data Generating information Creating a data report

Collecting raw data

Which of the following are features of using an Excel table to store data? (Select two.) (9.3.10) Column sorting Total row Graphing Range Data correlation

Column sorting Total row

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? (5.3.14) Configure the browser proxy settings. Disable the pop-up blocker. Apply a firmware update. Clear the browser cache.

Configure the browser proxy settings.

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications? (4.5.16) Background Home Screen Window Desktop

Desktop

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner? (4.3.18)

Device drivers

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) (5.4.9) Adobe Photoshop Adobe Acrobat Reader Dropbox Google Drive Microsoft Word

Dropbox Google Drive

Which of the following careers consists of designing tiny microchips? (3.7.4)

Electrical engineer

Which of the following describes the firmware in gaming consoles, TVs, and smart cars? (4.2.13)

Embedded OS

In a relational database table, columns are better known as ________________. (7.3.12) Fields Categories Records Instances

Fields

Designations at the end of file names such as .docx and .html are called _____________. (4.4.17)

File extensions

Marty, a database administrator, has added a foreign key to a table in a database. Which of the following describes the purpose of a foreign key? (7.3.12) To provide a way to distinguish records within a table. For one database to reference another database. To allow the storage of unstructured data. For one table to reference records in another table.

For one table to reference records in another table.

Which of the following BEST describes a back-end developer? (8.5.16) He or she needs to make the website as user-friendly as possible. He or she controls what you see visually in your web browser when you visit a site. He or she accesses information from databases and prevents unauthorized access. He or she uses HTML, CSS, and JavaScript to determine the way a website looks.

He or she accesses information from databases and prevents unauthorized access.

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server? (6.5.11) SMTP NTP POP3 IMAP

IMAP

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take? (10.6.20) Tell your fellow PC technicians about what you saw and let them decide what to do with the information. Give your friend a heads up about what you found, but don't disclose from where you heard the information. Ignore the paper and tell no one of its contents. Tell your friend about the report you saw and whose desk it was on.

Ignore the paper and tell no one of its contents.

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade? (6.3.16) More overlapping channels 802.11g uses older technology Improved performance Less attenuation

Improved performance

Which of the following BEST describes a flowchart? (8.3.18) It starts at the first line and then executes one line at a time until the end. It does the same thing over and over in exactly the same way. It is a step-by-step procedure that illustrates how a problem is to be solved. It is a visual representation of the logic in a program.

It is a visual representation of the logic in a program.

If you select a file on your desktop and delete it, what happens to the file? (4.4.17)

It is moved to the Recycle bin.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model? (6.6.13) Enterprise Personal Proprietary Persistent Open-source

Open-source

What is the term for software that anyone can use or modify for free? (6.6.13) Linux software Proprietary software Read-write software Open-source software

Open-source software

Which category of system software provides a platform for application software to run on? (4.3.18)

Operating System

Which of the following is used to force-close a program on an Apple computer? (4.7.7) Option, Command, Escape CTRL, Command, Delete Option, Command, Delete CTRL, Command, Escape

Option, Command, Escape

Which database object is essentially questions that we can ask the database? (7.2.8) Queries Forms Tables Reports

Queries

Which of the following database features would provide a formatted, easy-to-read listing of the results of a query? (7.3.12) SQL command Form Record Report

Report

Which of the following is used on a wireless network to identify the network name? (6.3.16) WEP key WPA2 passphrase MAC address SSID

SSID

Which of the following protocols can be enabled so email is encrypted on a mobile device? (10.4.9) IMAP SSL POP3 SMTP

SSL

What is the term for delivering an application over the internet called? (5.4.9) FaaS IaaS SaaS PaaS

SaaS

Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit? (9.5.6) Safe Harbor Safe Haven Public domain Fair Use

Safe Harbor

Which of the following is the BEST reason to search for articles in an online academic database? (5.8.8) The sources are more likely to be peer reviewed The sources generally provide better background information on topics The sources are more likely to include streaming video content The sources contain a wider range of practical knowledge

The sources are more likely to be peer reviewed

Which process exports a database into a format that can be read by another program like a spreadsheet? (7.4.16) CSV Database backup Database dump CRUD

Database dump

Which of the following is a good general rule to go by when deciding what to wear to an interview? Dress one step above what the position requires. Always wear a business suit. Wear whatever you are comfortable in. Dress one step below what the position requires.

Dress one step above what the position requires.

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which of the following policies are BEST to configure? (Select TWO). (10.5.19) Password complexity Enforce password history Minimum password age Minimum password length Maximum password age

Enforce password history Minimum password age

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet? (5.8.8) Enter a package tracking number to find out a package status. Enter a MAC address to find out which device it is assigned to. Enter the filename of a file on your local hard drive to view the file. Enter one or more search terms for a topic.

Enter one or more search terms for a topic.

Which of the following Internet technologies provides the FASTEST speeds? (6.4.13) Cable Fiber optic DSL Cellular

Fiber optic

Which of the following would best prevent an unauthorized person from remotely accessing your computer? (10.5.19) Lockdown device Anti-spam software Anti-malware software Firewall

Firewall

Which of the following should not be used as a primary key in a table? (7.3.12) Social Security number Username Employee ID First name

First name

Which of the following uses persistent memory chips to store data? (3.5.17)

Flash drive

Files that you send along with an email message are called __________. (5.6.10) Attachments MMS E-files Extras

Attachments

Which of the following components stores values in short-term memory? [3.3.15]

RAM

How long should a good elevator pitch be? 5 minutes 2 minutes 30 seconds 1 minute

30 seconds

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this? (6.3.16) 2.4 GHz 802.11b 5 GHz 802.11g

5 GHz

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band? (6.3.16) 802.11b 802.11n 802.11a 802.11g

802.11n

You want to have a hyperlink to testout.com on your web page. What is the correct HTML syntax to accomplish this? (8.5.16) <a href=>Link to the TestOut.com homepage</a> <a href="www.testout.com"></a> <a href="www.testout.com">Link to the TestOut homepage</a> <a href=www.testout.com>

<a href="www.testout.com">Link to the TestOut homepage</a>

Which command is used to add, change, or remove fields on an existing table? (7.4.16) CREATE TABLE ALTER TABLE DROP TABLE INSERT INTO

ALTER TABLE

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity? (6.2.12) Router Firewall Switch Access point

Access point

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements? (9.3.10) Bar graph Excel table Pie chart Line graph

Bar graph

Which of the following are optical storage devices? (Select three.) (3.5.17)

CD, BD, DVD

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue? (11.2.5) CEH CompTIA A+ Cisco CCNA PMP

CEH

A computer has power, but there are no beeps and the computer does not boot. Which of the following would be the MOST LIKELY cause? (3.6.15)

CPU failure

Which network type uses a coaxial cable to receive its signal? (6.4.13) Satellite Cable Cellular Fiber-optic

Cable

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated? (1.3.4) Civility Property rights Confidentiality Human dignity

Confidentiality

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the BEST solutions for securing Joe's workstation? (Select two). (4.2.13)

Configure the screen lock to be applied after a short period of non-use. Configure the screen saver to require a password.

Small files that a website saves on your computer to remember your preferences are called ______________. (5.3.14) Reminders Malware Fingerprints Cookies

Cookies

Patricia, a database system manager for a large hotel chain, is setting up a relational database to track customer hotel registrations for each hotel. The table in the database currently includes fields (columns) for First Name, Last Name, Phone, Email, License Plate #, and Check-in Date. What can Patricia do to make sure that each record (row) in the database is unique? (7.3.12) Designate the Phone field as the primary key. Designate the License Plate # field as the primary key. Combine the Email field and the Phone field to use as the primary key. Create an additional Check-in ID field.

Create an additional Check-in ID field.

Why is it better to use a credit card than a debit card for online purchases? (10.5.19) Credit cards keep track of all your transactions Credit cards have better fraud protection Debit cards require you to pay additional fees Credit cards have better interest rates

Credit cards have better fraud protection

Which of the following describes the process of turning data points into useful information? (9.3.10) Data-driven business decisions Market analysis Data analytics Raw data collection

Data analytics

What is the technology that aggregates structured data from one or more sources called? (7.5.6) Data warehousing Non-relational Relational Big Data

Data warehousing

Given the numerical value 1010101.71, which of the following number systems is MOST likely represented? (2.3.7) Hexadecimal Decimal Octal Binary

Decimal

Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?(4.7.7) Task Manager Safe Mode Program force-close Defragmentation

Defragmentation

Tina has accepted a position as a graphic designer. She wants a powerful device that she can connect multiple large screens to. Which device would be the BEST option for her? [3.2.4]

Desktop computer

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer? (6.7.8) Device Manager Windows Update Ping Tracert

Device Manager

Mary needs someone to make sure her podcast is high quality and sounds polished. Which of the following professionals should she hire? (2.5.4) Game designer Graphic designer Digital audio producer Video production specialist

Digital audio producer

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this? (10.3.12) Directory permission Data loss prevention Multifactor authentication Antivirus software

Directory permission

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue? (3.4.16)

Download and install the latest driver from the manufacturer's website.

Which type of Information System (IS) is used to help doctors diagnose diseases? (9.2.9) Decision support system Customer relationship management Transaction processing system Expert systems

Expert systems

A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this? (9.5.6) Public domain Safe Harbor Safe Haven Fair Use

Fair Use

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting? (9.5.6) Fair Use The Ninth Amendment Beck's Defense General Welfare

Fair Use

A value that's used to identify a record from a linked table is called a ________________. (7.3.12) Linked Key Foreign Key Primary Key Borrowed Key

Foreign Key

Which of the following are web browsers? (Select two.) (4.5.16) Google Chrome Bing Microsoft Visio Google Mozilla Firefox

Google Chrome Mozilla Firefox

Which of the following charges resources used, such as bandwidth and processing power, by the second? (5.4.9) OneDrive Microsoft Azure Amazon Web Services (AWS) Google Cloud

Google Cloud

Which of the following should be done before working on hardware in a computer system? [3.3.15]

Ground yourself using an ESD wrist strap

Which of the following has the ability to store user data even if the power to the computer is off? (3.5.17)

Hard drive

Which of the following would be the MOST LIKELY cause for a computer to perform sluggishly? (3.6.15)

Hard drive

Which of the following makes videos appear smoother and more fluid? (2.4.12) Lower frame rate Lower resolution Higher frame rate Higher resolution

Higher frame rate

Mike decides to humiliate a former friend by posting embarrassing photos on social media. Which ethical standard did he violate? (1.3.4) Human dignity Civility Confidentiality Property rights

Human dignity

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media? (10.6.20) In a locked room. On a shelf next to the backup device. In a locked fireproof safe. In a drawer in your office.

In a locked fireproof safe.

Which of the following terms is used to describe a cycle or version that is repeated over and over? (9.4.5) Agile SDLC Waterfall Iterative

Iterative

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.) (10.2.17) Avoid anti-virus apps Lock the screen with some form of authentication Keep your device always in your possession Keep the operating system up to date Turn off location services Keep an up-to-date remote backup

Lock the screen with some form of authentication Keep the operating system up to date

You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work. Which of the following troubleshooting steps is the BEST to try first? (3.4.16)

Make sure the USB device is plugged in properly.

What does JavaScript do? (8.5.16) Links digital objects to each other. Makes web pages interactive. Contains the title of the web page. Makes websites look good.

Makes web pages interactive.

Match each language to its general purpose in a website. (8.2.7) Makes website elements interactive Adds colors, fonts, and other design elements to website Creates website structure and content =========================================== CSS JavaScript HTML

Makes website elements interactive (JavaScript) Adds colors, fonts, and other design elements to website (CSS) Creates website structure and content (HTML)

Which of the following is data temporarily stored on? (2.2.7) Printed page Memory chips Hard drive Keyboard

Memory chips

Which of the following is the system administrator's MOST important task? (10.7.4) Investigating cyberattacks Monitoring and maintaining system security Designing and implementing security methods Installing firewalls and anti-malware protection

Monitoring and maintaining system security

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use? (6.7.8) Network Properties Windows Update Device Manager Network & Internet

Network & Internet

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters? (6.8.4) Programmer Network Architect Security Analyst Database Administrator Support Specialist

Network Architect

Which of the following programming models are built from class templates that have properties, attributes, and methods? (8.2.7) Objects Functions Encapsulation Vector

Objects

Where is the BEST place to obtain the latest printer driver? (4.6.8) Manufacturer's website Printer reseller Windows Update Microsoft's website

Manufacturer's website

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of? (11.2.5) Extended Reality (XR) Internet of Things (IoT) Edge computing Blockchain technology

Internet of Things (IoT)

Where would you go to cancel a print job? (4.6.8) Print driver Print queue Print Spooler Print Manager

Print queue

Which of the following is not a form of biometrics? (10.3.12) Fingerprint Smart card Retina scan Face recognition

Smart card

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) (5.5.8) Membership fees Targeted ads Content Usage fees Selling user-generated data to other companies

Targeted ads Selling user-generated data to other companies

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use? (9.5.6) Copyright Patent Trademark Intellectual property

Trademark

Which invention allowed computers to become smaller in size? (2.2.7) Vacuum tubes Laptops Transistors Silicon

Transistors

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers? (10.6.20) Reformat the hard drives Include the original operating system discs and product keys with the computers Use data wiping software to clear the hard drives Delete user data and applications from the hard drives

Use data wiping software to clear the hard drives

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions? (10.4.9) Multifactor authentication Single sign-on VPN Mandatory Access Control (MAC)

VPN

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access? (10.4.9) WEP 128 WPA2 and AES WPA and AES WPA2 and TKIP WPA and TKIP

WPA2 and AES

Which of the following terms is most often used to describe a sequential or linear process of systems analysis and design? (9.4.5) Agile Waterfall Iterative Real-world

Waterfall

Which software is Microsoft's anti-malware product that is preinstalled on most new computers? (10.5.19) McAfee VirusScan Norton Antivirus Windows Defender ESET NOD32

Windows Defender

Which of the following DBMS programs is open source? (7.2.8) MySQL Microsoft Access Oracle Database SQL Server

MySQL

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for? (10.2.17) Denial-of-service Power outage Wiretapping Data redundancy

Power outage

Which of the following is found in one or more columns of data and contains a unique identifier for the row? (7.2.8) Relationship Primary key Foreign key Attribute

Primary key

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated? (10.3.12) Strong password policy Principle of least privilege Multifactor authentication Entry control roster

Principle of least privilege

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use? (7.4.16) User interface access Query builder Programmatic access Direct access

Programmatic access

Andy is a very detail-oriented person. Which of the following Information Systems careers would likely be the BEST option for him? (9.6.4) Systems analyst IS manager IT technician Project manager

Project manager

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission? (6.6.13) Read-only Software Microsoft Software Open-source Software Proprietary Software

Proprietary Software

Which method should be used to search for an exact phrase? (5.8.8) Put the search terms in [brackets] Put the search terms in (parentheses) Put the search terms in <angle brackets> Put the search terms in "quotes"

Put the search terms in "quotes"

Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application. Which of the following database features would work BEST to accomplish this? (7.3.12) Report Form Query Table

Query

Which of the following is the first step in verifying that a problem has been fixed? (4.7.7) Running a virus scan Opening the program Running the computer for an extended time period Rebooting the system

Rebooting the system

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device? (5.7.6) Smartphone TV Smart door lock Siri

Smart door lock

Web services that help people meet, interact, and share content with other people online are called ____________. (5.5.8) Social Media Web Servers Internetworks Facebooks

Social Media

Speaking in front of a mirror can help to improve which of the following traits? Troubleshooting Integrity Resourcefulness Social skills

Social skills

Which of the following refers to digital content that is delivered over the internet? (6.5.11) TCP/IP suite ISP World wide web Network

World wide web

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.) (6.6.13) The software will eventually stop working properly for the 10 extra updates you installed. You risk losing your job. The software company will never detect the violation so negative consequences are unlikely. Your company is exposed to litigation by violating the software license agreement. There are no consequences. By law, you are allowed 1 to 3 activations per user.

You risk losing your job. Your company is exposed to litigation by violating the software license agreement.

Which of the following lines will initiate an Internet search from the address bar of a web browser? (5.3.14) testout.com microsoft gov microsoft.com microsoft.org

microsoft gov

On a Linux system which directory contains applications and files used by users? (4.4.17)

/usr

How many pages should a resume be for someone looking for their first job? 1 4 2 3

1

Which of the following transfer rates is the FASTEST? (2.3.7) 181 Mbps 1.24 Gbps 1,480 Mbps 1,282 Kbps

1,480 Mbps

After running the following pseudocode, what will the value of VARIABLE be? (8.3.18) Set value of VARIABLE to 5 Increase the value of VARIABLE by 3 If the value of VARIABLE is odd, increase its value by 1 If the value of VARIABLE is even, increase its value by 1 If the value of VARIABLE is odd, increase its value by 1 8 9 10 11

10

Which cellular network type was the first kind of network to use encryption? (6.4.13) 1G 5G 3G 4G 2G

2G

Which cellular network type was the first to have gigabit-per-second speeds? (6.4.13) 5G 2G 3G 1G 4G

4G

How many heading tags are available for heading and subheading when using HTML? (8.5.16) 6 8 2 4

6

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) (6.3.16) 802.1x 802.11g 802.11b Bluetooth 802.11a

802.11g 802.11a

Match each term on the left to its definition on the right. (5.2.8) A service or software application that relies on shared resources over the Internet A software application that accesses web applications and websites A company that provides access to the Internet Internet Service Provider An interconnected global public computer network An information system that connects documents to each other by hypertext links ====== Cloud computing Internet Service Provider World Wide Web Internet Browser

A service or software application that relies on shared resources over the Internet (Cloud computing) A software application that accesses web applications and websites (Browser) A company that provides access to the Internet (Internet Service Provider) An interconnected global public computer network (Internet) An information system that connects documents to each other by hypertext links (World Wide Web)

Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database? (7.5.6) CRUD DBA ACID SQL

ACID

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series? (5.7.6) Cortana Alexa Google Assistant Siri

Alexa

Which of the following is cryptocurrency? (9.2.9) Cash App Venmo PayPal Bitcoin

Bitcoin

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used? (11.2.5) Edge computing Internet of Things (IoT) Extended Reality (XR) Blockchain technology

Blockchain technology

A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability? (8.2.7) Ruby C++ PowerShell Perl

C++

_____________ computing refers to services and applications that run remotely over the Internet. (5.4.9) Remote Global Cloud Virtual

Cloud

A service that lets you store data in a remote location over the Internet is called _____________. (5.4.9) Database Online repository Internet backup Cloud storage

Cloud storage

Microsoft OneDrive is a cloud solution that is designed to provide which of the following? (5.4.9) Resource pooling Cloud storage Cloud hosting Cloud computing

Cloud storage

Which data model focuses on high-level concepts? (7.2.8) Conceptual Physical Logical Operational

Conceptual

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster? (10.6.20) Don't put important information on your mobile device. Configure your device to backup important data to your personal computer. Configure your device to remotely backup important data to the Cloud. Only use apps, such as email apps, that store data on the app provider's servers.

Configure your device to remotely backup important data to the Cloud.

Which of the following is a programming identifier that would be used to define values that don't change? (8.2.7) Constants Arrays Variables Vectors

Constants

Which of the following is a benefit of 3D printing over traditional manufacturing? (4.6.8) Wider variety of materials can be used Consumes less material More precise angles Larger items can be produced

Consumes less material

Which digital assistant was named after an artificial intelligence in an Xbox video game? (5.7.6) Google Assistant Siri Cortana Alexa

Cortana

Which of the following are the four general tasks a user needs to perform for a database to function properly? (7.4.16) Create, Reuse, Unleash, Delete Create, Read, Update, Delete Create, Read, Unleash, Deny Configure, Read, Update, Deny

Create, Read, Update, Delete

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? (5.5.8) Crowdsourcing media Crowdsourcing platform Crowdsourcing campaign Crowdsourcing website

Crowdsourcing platform

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do? (10.2.17) Open the attachment because he has anti-virus software installed. Delete the email without opening the attachment. Forward the email to a friend and ask for advice. Reply to the sender and ask if the attachment is safe.

Delete the email without opening the attachment.

What should a level 1 technician do when they are unable to solve an issue? (4.8.4) Close the ticket and let someone else handle it. Escalate to a higher level of support. Contact Microsoft support. Keep working at it until they resolve it.

Escalate to a higher level of support.

Which of the following keys is used to enter Safe Mode on a Windows computer? (4.7.7) CTRL F8 F5 Shift

F8

Which network type uses light pulses to transmit data? (6.4.13) Fiber optic Satellite Wireless Cable

Fiber optic

In addition to good design sense, what else do web designers need to be proficient in? (5.9.4) Search Engine Optimization (SEO) Editing content for social media platforms Front-end coding languages Communication skills

Front-end coding languages

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________. (8.6.4) Frontend Backend Full stack Protocols

Frontend

Which of the following BEST describes a front-end developer? (8.5.16) He or she services the website and manages user accounts. He or she is concerned with the aesthetics of a website. He or she may use query languages like SQL. He or she may use Ruby, Java, PHP, and Python.

He or she is concerned with the aesthetics of a website.

Which of the following lists the basic computing and processing steps in order? (2.2.7) Input, retrieval, output, and storage Input, retrieval, processing, and storage Input/output, processing, and storage Input, processing, output, and storage

Input, processing, output, and storage

A security analyst does which of the following? (10.7.4) Works closely with law enforcement officials to investigate security breaches, cyberattacks, and other crimes. Is typically responsible for securing networks and responding to intrusions in smaller organizations. Inspects the company's network for security breaches and recommends measures to prevent future attacks. Installs and configures access controls, monitors network performance, and detects unauthorized access.

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

Alan, a programmer, needs to create an interactive web page. Which of the following programming languages types would he MOST likely use? (8.2.7) Interpreted Assembly Query Compiled

Interpreted

A _________ is a private network that utilizes the same technologies as the Internet. (5.2.8) World Wide Web Wide Area Network Local Area Network Intranet

Intranet

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality? (8.3.18) Looping Case statement Branching Scripting

Looping

What is the main difference between a regular technical support specialist and a managed service provider technician? (4.8.4) Managed service provider's services are outsourced as a third party. Technical support specialist's services are outsourced as a third party. Managed service providers do not need certifications or a degree. Technical support specialists do not need certifications or a degree.

Managed service provider's services are outsourced as a third party.

If your network does not have a DHCP server, what must you do to access the internet? (6.7.8) Right-click the network adapter and select Update driver. Manually change the TCP/IP properties to match your network's settings. Open PowerShell, enter the ipconfig command, and press the Enter key. Open Command Prompt, enter the tracert command, and press the Enter key

Manually change the TCP/IP properties to match your network's settings.

Owners of internet-enabled cars can use their phones to do which of the following? (5.7.6) Monitor fuel usage Change traffic lights Adjust tire pressure Control their speed

Monitor fuel usage

Which of the following job tasks would be something a QA specialist would do? (8.6.4) Monitor software development in order to maintain a high-quality product. Create applications for computers and mobile devices. Use Ruby, Java, PHP, Python, and query languages like SQL. Write code to design, create, implement, and maintain databases.

Monitor software development in order to maintain a high-quality product.

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used? (10.3.12) Smart card Multifactor authentication Firewall DLP

Multifactor authentication

Which of the following IT jobs includes installing and configuring network media? (6.8.4) Network administrator Support specialist Database administrator Network architect

Network administrator

Which of the following IT jobs typically do not require as much education or on-the-job experience? (6.8.4) Network technician Network engineer Network architect Network administrator

Network technician

Making real and authentic connections with people is known as which of the following? Professionalism Troubleshooting Networking Interviewing

Networking

Which Creative Commons license type states that a work can be distributed as long as it is not changed? (9.5.6) Non-Commercial Attribution Share Alike No Derivative Works

No Derivative Works

Which of the following is a category of SaaS applications? (5.4.9) Web hosting Disaster recovery Office tools Virtual machines

Office tools

Which of the following typically does NOT save a conversation after it has taken place? (5.6.10) Online chat Email Message board SMS/MMS

Online chat

Which of the following divides a single physical disk into multiple logical drives called volumes? (3.5.17)

Partitioning

Match each security policy on the left with the appropriate description on the right. (10.6.20) Provides a high-level overview of the organization's security program. Specifies that user accounts should be locked after a certain number of failed login attempts. Sets expectations for user privacy when using company resources. Identifies a set of rules or standards that define personal behaviors. ================================ Code of Ethics Password Policy Organizational Security Policy Acceptable Use Policy

Provides a high-level overview of the organization's security program. (Organizational Security Policy) Specifies that user accounts should be locked after a certain number of failed login attempts. (Password Policy) Sets expectations for user privacy when using company resources. (Acceptable Use Policy) Identifies a set of rules or standards that define personal behaviors. (Code of Ethics)

Which permission option lets a user view files but not change them? (4.4.17)

Read

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times? (10.6.20) Backup Cloud storage Redundancy Replication

Redundancy

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time? (2.2.7) Processing Transistor Storage Microchip

Storage

Which of the following is a disadvantage of notebook systems? [3.2.4]

They are more expensive

Which of the following BEST describes expert systems? (9.2.9) They use machine learning algorithms that discover patterns. They are programs designed to solve complex problems in specific domains. They mimic the physical connections of the human brain. They are programmed to learn from their mistakes.

They are programs designed to solve complex problems in specific domains.

When composing an email message, why might you want to use the Bcc field? (4.5.16) To include email addresses of newly hired employees To clarify the overall purpose of the message To copy the email confidentially To include extra-long email addresses

To copy the email confidentially

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier? (8.4.8) Increase the timeline to allow for the additional work. Expand the development team to handle the additional work. Use the same programming language for both operating systems. Use the APIs for each operating system.

Use the APIs for each operating system.

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software? (4.3.18)

Utility Software

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first? (Select two.) (3.4.16)

Verify that speakers are plugged into the correct jack and powered on Verify that the volume isn't muted

Which of the following careers typically requires at least a bachelor's degree in telecommunications? (2.5.4) Graphic designer Digital audio producer Game designer Video production specialist

Video production specialist

When might it be MOST helpful to clear your browser's cache of temporary Internet files? (5.3.14) When a website is not functioning as it should After every Internet search Immediately after opening a new Microsoft Office document When you switch to a different web browser

When a website is not functioning as it should

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe? (10.2.17) Man-in-the-middle Phishing Zombie/botnet Spoofing

Zombie/botnet

Which of the following is a proper path name to a shared network printer? (4.6.8) \network_name\\printer_name \\computer_name\printer_name \computer_name\\printer_name \\network_name\printer_name

\\computer_name\printer_name

Which of the following database objects provides a summary of data? (7.2.8) Queries Reports Forms Tables

Reports

Which of the following technologies can be used to make a phone call over an Internet connection? (5.2.8) UDP VoIP TCP IoT

VoIP

Which of the following components converts AC to DC? [3.3.15]

Power supply

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data? (11.2.5) Edge computing Blockchain technology Predictive healthcare Hyper-automation

Predictive healthcare

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report? (7.4.16) Query builder Programmatic access Direct access User interface access

Query builder

Which medium does Wi-Fi use to send data between networks and devices? (5.2.8) Radio waves Ultraviolet light Cellular signals Bluetooth

Radio waves

Which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components? [3.3.15]

100 volts

Which of the following is the correct binary representation of the number 22? (2.3.7) 11000 10101 10111 10110

10110

How many years of prior experience in tech support do most MSP positions require?(4.8.4) 2 1 5 3

2

Which of the following are characteristics of Bluetooth? (Select two.) (6.3.16) 2.4 GHz radio wireless Ad hoc connections Red spectrum light waves 5.75 GHz radio wireless Line-of-sight transmission

2.4 GHz radio wireless Ad hoc connections

How many possible values would an 8-bit audio sample have? (2.4.12) 16 256 65,000 256,000

256

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store? (2.3.7) 1,024 kilobytes 4 gigabytes 8 megabytes 3 terabytes

3 terabytes

Which of the following tags contains all the elements that will be presented on the visual portion of a website? (8.5.16) <head></head> <div></div> <body></body> <p></p>

<body></body>

Select the tags you MUST use to have a proper HTML document. (Select three.) (8.5.16) <h1> <div> <html> <head> <body> <a> <p>

<html> <head> <body>

Which of the following are the proper HTML tags used to create a numbered list? (8.5.16) <ol> <i>Item 1</i> <i>Item 2</i> <i>Item 3</i> </ol> <ol> <li>Item 1</li> <li>Item 2</li> <li>Item 3</li> </ol> <ol> <ol>Item 1</ol> <ol>Item 2</ol> <ol>Item 3</ol> </ol> <ol> <a>Item 1</a> <a>Item 2</a> <a>Item 3</a> </ol>

<ol> <li>Item 1</li> <li>Item 2</li> <li>Item 3</li> </ol>

Which of the following statements is true regarding a VPN? (6.4.13) You can hide your browsing history from the VPN company. A VPN masks a user's IP address in order to make their actions untraceable. Sometimes a VPN can increase your browsing speed. With a VPN, other sites can use your IP address to determine your physical location.

A VPN masks a user's IP address in order to make their actions untraceable.

Match each source on the left to its source type on the right. (5.8.8) A catalog of all the mayor's speeches and news articles about them The transcript of a speech by the mayor A news article about the mayor's speech ============ Primary source Secondary source Tertiary source

A catalog of all the mayor's speeches and news articles about them (Tertiary source) The transcript of a speech by the mayor (Primary source) A news article about the mayor's speech (Secondary source)

Which of the following is the best definition for a LAN? (6.2.12) An extension of a private network over a shared or public network, such as the Internet. The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less). A network whose computers and servers are separated geographically but still connected. A network in a small geographic area, like in an office.

A network in a small geographic area, like in an office.

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly? (3.4.16)

A peripheral

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? (5.3.14) A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. Port triggering is redirecting traffic to the wrong IP address. The router has not been configured to perform port forwarding.

A proxy server is filtering access to websites.

Which of the following describes a Man-in-the-Middle attack? (10.2.17) An IP packet is constructed which is larger than the valid size. An attacker intercepts communications between two network hosts by impersonating each host. Malicious code is planted on a system where it waits for a triggering event before activating. A person over the phone convinces an employee to reveal their logon credentials.

An attacker intercepts communications between two network hosts by impersonating each host.

In object-oriented programming, which of the following concepts is used to describe properties? (8.2.7) Attributes Polymorphism Methods Encapsulation

Attributes

Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used? (9.5.6) Attribution Non-Commercial No Derivative Works Share Alike

Attribution

Match each feature to whether it influences audio or video quality. (2.4.12) Audio or Video Color Depth Frame Rate Sampling Rate Bit Depth Resolution

Audio Bit Depth Sampling Rate Video Frame Rate Color Depth Resolution

Databases, authentication, and user accounts are all part of a website's ______________. (8.6.4) Backend Protocols Frontend Full stack

Backend

Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as? (7.5.6) Data analytics Big Data Data mining Data extraction

Big Data

What do biometrics use to perform authentication of identity? (10.3.12) Possession of a device Knowledge of passwords Biological attributes Ability to perform tasks

Biological attributes

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this? (8.2.7) Float Integer Boolean String

Boolean

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used? (8.3.18) Looping Branching Programming array Encapsulation

Branching

Which of the following is something that an Information Technology (IT) professional would do? (1.2.5) Manage grades and enrollments Create and improve software Collect and utilize data Build and repair computers

Build and repair computers

Which of the following key combinations lets you open Task Manager? (4.7.7) CTRL, Shift, Enter CTRL, ALT, Enter CTRL, ALT, DELETE CTRL, Shift, Delete

CTRL, ALT, DELETE

Web browsers save website information in their _________, which helps the site load faster on future visits. (5.3.14) Memory Cache Storage Repository

Cache

Which of the following would be the BEST option to help you narrow down choices when identifying a career in IT? (11.2.5) Listening to podcasts Friend's opinion Pick one that looks fun Career Assessment Tests

Career Assessment Tests

Which of the following certifications would you pursue to help you land a job as a network administrator? (11.2.5) PMP CEH CompTIA A+ Cisco CCNA

Cisco CCNA

What is a disadvantage of using the cloud for data storage? (10.6.20) Cloud storage backups require a reliable internet connection. You can access files from any computer with an internet connection. Cloud storage can fulfill the requirements for offsite backups. Cloud storage allows you to save files to the internet.

Cloud storage backups require a reliable internet connection.

Social media marketers need the ability to do what? (5.9.4) Code in JavaScript Make a website useful Collaborate across teams Communicate with customers

Collaborate across teams

Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations? (4.2.13)

Command line interface (CLI)

April is a database manager who wants to insert some new records (rows) into the company's customer contact database. Instead of using a database client to insert the records, she wants to use a command. Which of the following languages provides a command for inserting records into a database? (7.4.16) HTML (HyperText Markup Language) DDL (Data Definition Language) DCL (Data Control Language) DML (Data Manipulation Language)

DML (Data Manipulation Language)

Which of the following is not an example of wireless networking communications? (6.4.13) Infrared Bluetooth 802.11n DSL

DSL

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data? (7.6.4) Data scientist Data analyst Database administrator Database developer

Data analyst

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes? (7.6.4) Database administrator Data analyst Data scientist Database developer

Data analyst

What is asking specific questions to interpret Big Data called? (7.5.6) Data analytics Data ethics Data extraction Data mining

Data analytics

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect? (9.3.10) Servers Trademarks Data and information Facilities

Data and information

Forensics experts need to be thoroughly familiar with which of the following? (10.7.4) Data encryption methods, operating systems, and programming languages Firewalls, anti-malware, threats, vulnerabilities, security breaches, and attacks Ethical hacking techniques such as penetration testing and vulnerability assessment Access control, backups, firewalls, network performance, and unauthorized access

Data encryption methods, operating systems, and programming languages

The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept? (7.5.6) Data ethics Data analytics Data mining Data extraction

Data ethics

Which of the following needs to be done before Big Data can be analyzed and interpreted? (7.5.6) Data extraction Securing data Data mining Data analytics

Data extraction

Which of the following describes using data analytics to inform business operations? (9.3.10) Market analysis Data-driven business decisions Research analysis Raw data analysis

Data-driven business decisions

Which of the following applications can be used for storing, modifying, extracting, and searching data? (4.5.16) Presentation software Database software Word processing software Conferencing software

Database software

Which of the following devices would be easiest to repair? [3.2.4]

Desktop computer

Which of the following devices would be the BEST option for a gamer? [3.2.4]

Desktop computer

The password policy below incorporates the following: Passwords must include at least one capital letter Passwords must include a mix of letters and numbers Passwords must be different from the past eight passwords Passwords must contain at least one non-alphanumeric character Which of the following password best practices are being used? (Select TWO). (10.5.19) Password length Password history Password lockout Password complexity Password expiration Password age

Password history Password complexity

In which of the following should you expect some privacy? (10.2.17) Sharing a photo through a mobile phone app Personally identifiable information entered into a human resource database Emailing an important document to a friend using an employer email system Metadata stored by a web browser

Personally identifiable information entered into a human resource database

When protecting your online identity, which of the following is an internet security threat you need to be aware of? (5.5.8) USB keyloggers Using personal information Using a different password for each social media platform Phishing attempts

Phishing attempts

Which of the following commands makes an application shortcut appear on the taskbar?(4.5.16) Show on taskbar Pin to taskbar Stick to taskbar Keep on taskbar

Pin to taskbar

Which of the following tools would you use to check connectivity between two computers? (6.7.8) Tracert DHCP Ping TCP/IP

Ping

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver? (10.4.9) Cipher text Plain text WPA2 encryption AES encrypted message

Plain text

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.) (6.3.16) Disable SSID broadcast. Upgrade to an 802.11g wireless network. Implement omnidirectional access points. Configure the wireless network to use WPA with TKIP security. Change the SSID to something other than the default.

Disable SSID broadcast. Change the SSID to something other than the default.

Which digital communication medium consists of top-level posts with threads of response posts? (5.4.9) Email client Discussion board Social network Chat room

Discussion board

What does the following JavaScript code snippet do when the code is loaded in a browser? (8.4.8) [Insert Visual lol] Displays a pop-up window with the message "You are coding with JavaScript!" Displays the text "My JavaScript Button" and a button labeled "Click me!" Nothing, this code will not load in a browser Displays a button labeled "Click me!"

Displays the text "My JavaScript Button" and a button labeled "Click me!"

Which of the following is NOT an example of an information system? (9.2.9) Customer relationship management Transaction processing Expert system Electrical system

Electrical system

Which of the following are considered asynchronous technologies? (Select two.) (5.6.10) Video conferencing Voice over Internet Protocol (VoIP) Email Message boards Live streaming

Email Message boards

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented? (6.5.11) Firewall Antivirus Multifactor authentication Email filtering

Email filterin

Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.) (5.5.8) Like, share, and comment on the bullying posts. Post the bully's physical address on social media. Create a public group on social media (such a Facebook group) to confront the bully. Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

Which of the following features is supplied by WPA2 on a wireless network? (Select two.) (6.3.16) Refusal of client connections based on MAC address Filtering of traffic based on packet characteristics Identification of the network Centralized access for clients Encryption Authentication

Encryption Authentication

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? (6.2.12) Bluetooth ArcNet 802.11n Ethernet Token Ring

Ethernet

In which of the following situations should you expect total privacy? (10.2.17) Social networking Financial transactions Email messages and attachments Instant messaging

Financial transactions

Which of the following security measures is a form of biometrics? (10.3.12) BIOS password Chassis intrusion detection TPM Fingerprint scanner

Fingerprint scanner

Which of the following is the best device to deploy to protect your private network from an untrusted public network? (6.2.12) Router Firewall Hub Gateway

Firewall

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions? (4.3.18)

Firmware

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values? (8.2.7) Boolean String Float Integer

Float

Which of the following is the BEST way to handle a program that is unresponsive? (4.7.7) Reboot the computer Run a virus scan Uninstall and reinstall the program Force-close the program

Force-close the program

Match each database object on the left to its description on the right. (7.3.12) Formatted summary of information from a database. User-friendly interface for adding to or retrieving information from a database. Stores raw data in a relational database. Retrieves specific information from a database. Can also be used to update, edit, and delete information. ==================== Report Form Table Query

Formatted summary of information from a database. (Report) User-friendly interface for adding to or retrieving information from a database. (Form) Stores raw data in a relational database. (Table) Retrieves specific information from a database. Can also be used to update, edit, and delete information. (Query)

Which of the following makes it easier for users to enter data into their tables? (7.2.8) Queries Tables Reports Forms

Forms

Which option should you choose to send an email you've received to a new person? (5.6.10) Forward CC Reply All Reply

Forward

How many ping packets are sent by default in a successful ping request? (6.7.8) One Four Six Two

Four

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen? (10.4.9) Anti-theft lock Complex password Full disk encryption Anti-malware

Full disk encryption

Which of the following BEST describes a system administrator? (10.7.4) He or she is in charge of designing and implementing security methods to protect an organization's computer systems. He or she understands and uses ethical hacking techniques such as penetration testing and vulnerability assessment. He or she is typically responsible for securing networks and responding to intrusions in smaller organizations. He or she works closely with law enforcement officials to investigate security breaches and other crimes.

He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.

Which of the following is a common form of social engineering attack? (10.2.17) Using a sniffer to capture network traffic. Hoax virus information emails. Distributing false information about your organization's financial status. Stealing the key card of an employee and using that to enter a secured building.

Hoax virus information emails.

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible? (11.2.5) Edge computing Hyper-automation Internet of Things (IoT) Blockchain technology

Hyper-automation

Clickable text or images that take you to different sites on the World Wide Web are called __________. (5.3.14) Shortcuts Navigation buttons Hyperlinks Attachments

Hyperlinks

Which of the following is NOT one of the essential components of an information system? (9.4.5) Procedures Hyperlinks Technology People

Hyperlinks

You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using? (4.2.13)

Hypervisor Type 1

Which of the following is used to change traffic lights for emergency vehicles? (5.7.6) ITCS IoT car IoT sensor Smart car

ITCS

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do? (4.6.8) Restart Windows Power cycle the printer Install the latest driver Reset the USB cable

Install the latest driver

Carrol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do next to be able to send print jobs to the printer? (4.3.18)

Install the latest printer driver

Which of the following are considered private technologies? (Select two.) (5.6.10) Social media posts Instant messaging Video conferencing Live streaming Chat rooms

Instant messaging Video conferencing

Which of the following can be used by a programmer to debug code? (8.4.8) Application programming interface (API) Integrated development environment (IDE) Text editor Word processor

Integrated development environment (IDE)

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? (5.2.8) Local Area Network Internet of Things Intranet Internet

Internet

Which of the following terms describes an organization that connects users to the Internet? (5.2.8) Network Server Web Server Internet Service Provider Data Center

Internet Service Provider

Which installation method is most likely to put your computer at risk of downloading a virus? (6.6.13) Internet installation App store installation CD or DVD installation Software subscription

Internet installation

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels? (5.9.4) Customer service representative Social media marketer Internet service technician Web designer

Internet service technician

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do? (8.4.8) color = input('What is your favorite color?\n')print('Your favorite color is %s.' % color) It sets the system color variable. It sends the output to a printer. It gets input and produces output. It sets the font color to the color specified in the input.

It gets input and produces output.

Which of the following BEST describes the ipconfig utility? (6.7.8) It is a utility that gives you a huge amount of control over your system. It is a utility that shows the exact path a packet takes between two hosts on different networks. It is a utility that verifies connectivity between two nodes on a network. It is a utility that displays all current TCP/IP network configuration values.

It is a utility that displays all current TCP/IP network configuration values.

Which of the following BEST describes a customer relationship management (CRM) system? (9.2.9) It is record-keeping technology that was originally developed for the Bitcoin cryptocurrency. It organizes notes, activities, and metrics into one system that works altogether. It is designed to record, process, store, modify, and cancel transactions. It is a computer program or set of instructions given to hardware telling it what to do.

It organizes notes, activities, and metrics into one system that works altogether.

Which of the following BEST describes the ping utility? (6.7.8) It shows the exact path a packet takes between two hosts on different networks. It displays and modifies the entries in the local IP routing table. It displays all current TCP/IP network configuration values. It sends a single packet to a specified network address and then waits for a reply.

It sends a single packet to a specified network address and then waits for a reply.

Which of the following describes the declarative programming paradigm? (8.4.8) It uses local and global variables as data types. It uses a linear, top-down approach to solving problems. It uses detailed steps to provide instructions to a computer. It uses a domain-specific language (DSL) to instruct the program what needs to be done.

It uses a domain-specific language (DSL) to instruct the program what needs to be done.

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm? (8.4.8) It uses a domain-specific language (DSL) to instruct the program what needs to be done. It uses high-level instructions instead of detailed steps. It uses a non-linear approach to solving problems. It uses a linear, top-down approach to solving problems.

It uses a linear, top-down approach to solving problems.

Janice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding. Which of the following would be the MOST LIKELY reason for this? (4.6.8) Janice is not connected to the network Incorrect printer driver Janice has turned off her computer Steve is not connected to the network

Janice has turned off her computer

Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all. (5.5.8) Largest social media platform in the world Most popular microblogging platform Messaging platform that includes built-in photo editing tools Social network focused on images Provides live video streaming ===== Facebook Twitter Instagram

Largest social media platform in the world (Facebook) Most popular microblogging platform (Twitter) Messaging platform that includes built-in photo editing tools (Instagram) Social network focused on images (Instagram) Provides live video streaming (Facebook)

Which of the following would be responsible for resetting a user's password? (4.8.4) Level 1 support technician Level 2 support technician Office manager Network administrator

Level 1 support technician

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO). (10.5.19) Minimum password length Enforce password history Account lockout threshold Account lockout duration Maximum password age Password complexity

Minimum password length Account lockout threshold

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? (6.4.13) Mobile data 2G DSL 1G

Mobile data

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used? (4.4.17)

Modify

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in? (5.8.8) Mosaic Self Accidental Direct

Mosaic

Multiple computers configured to be able to communicate and share information with each other form a ____________. (6.2.12) Family Network Group Commune

Network

Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating? (9.5.6) Intellectual Property Non-Commercial Attribution No Derivative Works

Non-Commercial

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle? (10.3.12) Non-repudiation Authentication Authorization Integrity

Non-repudiation

Which areas of Information System (IS) technology can lead to better communication with customers? (Select two.) (9.2.9) Inventory Order management Supply and demand Equipment monitoring Automation

Order management Automation

Your company wants to use multifactor authentication. Which of the following would you most likely suggest? (10.3.12) Fingerprint and retinal scan PIN and smart card Token and smartphone Password and passphrase

PIN and smart card

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server? (6.5.11) HTTPS SMTP IMAP POP3

POP3

Which of the following would you do as a computer forensics expert? (10.7.4) Understand and use ethical hacking techniques such as penetration testing and vulnerability assessment. Research new threats and vulnerabilities and recommend measures to prevent future attacks. Recover digital evidence, some of which may have been damaged or deleted from storage devices. Install and configure access controls, backups, and firewalls as well as monitor network performance.

Recover digital evidence, some of which may have been damaged or deleted from storage devices.

Even if you perform regular backups, what must be done to ensure that you are protected against data loss? (10.6.20) Regularly test restoration procedures. Restrict restoration privileges to system administrators. Configure System Maintenance to automatically defragment system hard drives every night. Write-protect all backup media.

Regularly test restoration procedures.

Which of the following is a disadvantage of a VoIP system? (5.6.10) The costs associated with the initial setup Users communicate using VoIP from PC to PC Relies fully on a stable internet connection One account for internet and phone

Relies fully on a stable internet connection

Which option should you use to respond to the sender of an email but not all the recipients? (5.6.10) Reply All CC Forward Reply

Reply

Which option should you use to respond to every single person included on an email? (5.6.10) CC Reply All Forward Reply

Reply All

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis? (9.3.10) Reports Forms Queries Tables

Reports

Which of the following should you do before going to an interview? Send a gift to the interviewer Research the company history and culture Send an introduction email to the interviewer Send a friend request to the interviewer

Research the company history and culture

Which of the following access controls gives only backup administrators access to all servers on the network? (10.3.12) Role-based Discretionary Mandatory Authorization

Role-based

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available? (8.4.8) import random set num = random() export random load random

import random

A pop-up blocker is a web browser feature that _________________. (5.3.14) keeps the window in a minimized state prevents unwanted advertisements censors Internet searches prevents color images from being displayed

prevents unwanted advertisements

You've just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. Based on the email message, which of the following are the next BEST actions to complete? (Select two.) (10.5.19) Perform a complete system backup. Distribute the message to everyone in your address book. Reboot the system. Run a full anti-malware scan. Delete the indicated files if present. Verify the information on well-known malicious code threat management Web sites.

Run a full anti-malware scan. Verify the information on well-known malicious code threat management Web sites.

Mary needs to view all records from the Clients table. Which command should she use? (7.4.16) WHERE * FROM Clients SELECT * FROM Clients SELECT ^ FROM Clients WHERE ^ FROM Clients

SELECT * FROM Clients

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use? (7.4.16) SELECT Travis FROM Clients UPDATE * FROM Clients WHERE name = Travis SELECT * FROM Clients WHERE name = Travis SELECT ^ FROM Clients WHERE name = Travis

SELECT * FROM Clients WHERE name = Travis

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.) (6.5.11) SMTP HTTP SSL WPA IMAP DNS WEP POP3

SMTP IMAP POP3

Which of the following would be the BEST thing to do following an interview? Sit back and wait for a response Call and ask if a decision has been made Send a gift basket to the interviewer Send a thank you note

Send a thank you note

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career? (Select two.) (11.2.5) Set clearly defined goals Take a career exploration test Compare your current experience with job qualifications Take a course that surveys a wide variety of IT fields

Set clearly defined goals Compare your current experience with job qualifications

On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment? (4.2.13)

Settings

Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this? (4.6.8) Control Panel > Printers and scanners Settings > Devices > Printers & scanners Control Panel > Devices > Printers & scanners Settings > Printers & scanners

Settings > Devices > Printers & scanners

Which digital assistant was one of the earliest? (5.7.6) Cortana Alexa Siri Google Assistant

Siri

Match each collaboration tool on the left to its description on the right. (4.5.16) A: Software that keeps track of progress and assignments for large projects Software that allows multiple users to work on a document at the same time Online forum where discussions consist of threads in response to an original post Software that keeps track of multiple people's schedules Broadcasting one user's screen to other users Resource management Collaborative editing Discussion board Calendaring Screen sharing

Software that keeps track of progress and assignments for large projects (Resource management) Software that allows multiple users to work on a document at the same time (Collaborative editing) Online forum where discussions consist of threads in response to an original post (Discussion board) Software that keeps track of multiple people's schedules (Calendaring) Broadcasting one user's screen to other users (Screen sharing)

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? (5.5.8) Idea Brainstorming Startup Financial hardship

Startup

Which tab in Task Manager can be used to manage programs that load with Windows? (4.7.7) Performance Services Startup Processes

Startup

Which of the following BEST describes what a kilobyte is a measurement of? (2.3.7) CPU speed Storage space Power level Data throughput

Storage space

Which Information Systems career analyzes and assesses the performance of existing systems in order to suggest how a business can operate more efficiently? (9.6.4) IS manager Systems analyst Project manager IT technician

Systems analyst

Which Information Systems career would MOST LIKELY provide user training for new or modified systems? (9.6.4) Project manager Systems analyst IT technician IS manager

Systems analyst

In Windows PowerShell, which key can be used to autocomplete a command? (4.4.17)

Tab

Which Windows tool shows currently running programs and can be used to end a process? (4.7.7) Control Panel Apps & features Services Task Manager

Task Manager

What is the name of the narrow strip along the bottom of the Windows environment? (4.5.16) Navigation bar Toolbar Shortcuts menu Taskbar

Taskbar

Which of the following schools allows students to receive dedicated training for a specific career? (11.2.5) Technical college Community college Junior college High school

Technical college

An information system is made up of which of the following general components? (9.2.9) Computers, smartphones, and radio waves Input, processing, and output Software, hardware, and firmware Technology, people, and procedures

Technology, people, and procedures

Wikipedia is considered which of the following sources? (5.8.8) Tertiary Academic Primary Consumer-level

Tertiary

Which of the following is the MOST important skill an internet service technician can possess? (5.9.4) The ability to quickly troubleshoot and fix any issues that may arise from customers Proficiency in front-end coding languages like HTML, CSS, and JavaScript A well-developed sense of color, font, layout, and images Excellent communication skills and the ability to collaborate across teams

The ability to quickly troubleshoot and fix any issues that may arise from customers

A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database? (7.3.12) The data can be saved as a flat file. The data can be stored as unstructured data. The data can be organized into separate tables that are related to each other. The data is stored as a single file for quick retrieval.

The data can be organized into separate tables that are related to each other.

What is a web designer responsible for? (5.9.4) The look and feel of a website The content on social media The latest trends in design Web traffic metrics

The look and feel of a website

Which of the following is both an advantage and disadvantage of using cryptocurrencies? (9.2.9) They allow for complete privacy. They eliminate third-party processing costs. They are based solely on supply and demand. There is no central repository.

They allow for complete privacy.

Which of the following statements is true regarding a network technician? (6.8.4) They troubleshoot reported problems and assist users in resolving network-connection issues. They design intranets, cloud infrastructure, and information security based on the needs of an organization. They are familiar with network protocols, network adapters, data formats, and project management. They manage an organization's email system, configure network printers, and maintain internet connectivity.

They troubleshoot reported problems and assist users in resolving network-connection issues.

Which of the following statements is true regarding a network architect? (6.8.4) They work closely with network administrators to ensure uninterrupted access to the company network. They have a broad range of responsibilities, including creating and managing user accounts. They perform regular backups of files saved on the network and train users in accessing network resources. They typically require an industry certification in network design and implementation.

They typically require an industry certification in network design and implementation.

Which of the following would be a reason a company would outsource their IT support? (4.8.4) For faster support To have their own IT administrator To keep a closer eye on data security To cut costs

To cut costs

What is the main purpose of agile methodologies? (9.4.5) To control the costs of IT projects To divide large IT projects into smaller, more manageable projects as part of an iterative process To incorporate artificial intelligence into the IT design and development process To make sure the entire IT project follows a series of sequential phases, from preliminary analysis to implementation

To divide large IT projects into smaller, more manageable projects as part of an iterative process

A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value? (8.2.7) Constant Object Variable Array

Variable

Match each protocol on the left to its description on the right. (6.5.11) Verifies that each packet has been transmitted and received correctly Encrypts and transfers hypertext pages on the World Wide Web Matches unique IP addresses with easy-to-read URLs Transfers hypertext pages on the World Wide Divides files into packets and routes them through the Internet to their destination Transmits packets in a continuous stream but doesn't verify packets ============ TCP HTTPS DNS HTTP Internet Protocol UDP

Verifies that each packet has been transmitted and received correctly (TCP) Encrypts and transfers hypertext pages on the World Wide Web (HTTPS) Matches unique IP addresses with easy-to-read URLs (DNS) Transfers hypertext pages on the World Wide (HTTP) Divides files into packets and routes them through the Internet to their destination (Internet Protocol) Transmits packets in a continuous stream but doesn't verify packets (UDP)

You need to test a version of macOS but only have a Windows computer. What technology could you use? (4.3.18)

Virtualization

Which of the following provides security for wireless networks? (6.3.16) CSMA/CD WAP 802.3u WPA2 802.11a

WPA2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? (6.3.16) WPA2 Kerberos WPA WEP

WPA2

Which of the following is NOT an element of effective cost control in IT project management? (9.4.5) Cost forecasting Regular budget reviews Waterfall methods Detailed record-keeping

Waterfall methods

Which of the following is a disadvantage of web applications? (5.2.8) Web applications can require a significant amount of disk space. Web applications can carry a monthly or yearly fee. Web applications can be limited by the hardware they run on. Web applications can connect people in different locations.

Web applications can carry a monthly or yearly fee.

What is the term for code that keeps running as long as a certain condition is met? (8.3.18) For loop Branch While loop Decision

While loop

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? (5.2.8) Blogs RSS feeds Podcasts Wikis

Wikis

Which of the following operating systems require a file extension to execute a program? (4.4.17)

Windows

Every Windows system has a database that stores setting changes such as switching the home page of your web browser. What is this called? (4.2.13)

Windows Registry

Which application makes sure your computer has the most recent versions of its system software? (6.6.13) Windows Defender Backup and Restore Disk Cleaner Windows Update

Windows Update

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? (6.6.13) Windows updates Scheduled backups Scheduled disk maintenance Antivirus updates

Windows updates

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.) (8.4.8) An IDE has a library of built-in functions. An IDE allows projects to be kept organized in folders. An IDE can autocomplete key words. An IDE provides standard text-editing features. An IDE allows for saving code with filename extensions.

An IDE has a library of built-in functions. An IDE can autocomplete key words.

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use? (8.3.18) A variable A float A constant An array

An array

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in? (5.8.8) Accidental Mosaic Self Direct

Accidental

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did? (10.3.12) Access control Authorization Accounting Authentication

Accounting

Which of the following processes does 3D printing use? (4.6.8) Digital Manual Additive Subtractive

Additive

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform? (10.2.17) Contain the problem. Hire a forensic team to gather evidence. Prevent such an incident from occurring again. Investigate how the attack occurred.

Contain the problem.

Drag the correct HTML tag on the left to its description on the right. (8.5.16) Contains the title of the web page, links to stylesheets, and metadata to help search engines find the page. Lets the browser know that it should interpret the document as HTML. Contains all the elements that will be presented on the screen. ================================ <html> <body <head>

Contains the title of the web page, links to stylesheets, and metadata to help search engines find the page. (<head>) Lets the browser know that it should interpret the document as HTML. (<html>) Contains all the elements that will be presented on the screen.(<body>)

A major capability of Alexa is its ability to do what? (5.7.6) Set alarms Control smart devices Speak a variety of languages Play audio books

Control smart devices

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose? (6.6.13) Local installation Network hosting Cloud hosting n-tier application

Local installation

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address? (6.2.12) WEP MAC address filtering DHCP SSID

MAC address filtering

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.) (3.6.15)

Make sure the power cord is plugged into the wall. Make sure the surge protector is turned on.

Rita is a network administrator at a small office supplies company. She has been asked to design and implement a major upgrade of the company's network infrastructure. Which of the following activities will best help Rita to successfully manage this project? (Choose TWO.) (9.4.5) Eliminate every possible risk before proceeding with the project Organize the project into a series of linear or sequential phases Make sure the project requirements are clear and comprehensive Perform a thorough needs assessment for the company

Make sure the project requirements are clear and comprehensive Perform a thorough needs assessment for the company

Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause? (4.7.7) System slowdown Malware infection System crash Software crash

Malware infection

A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field? (7.3.12) Foreign key Public key Primary key Private key

Primary key

Which component is responsible for reformatting print jobs so that the printer can understand and process them? (4.6.8) Print queue Print Spooler Print Manager Print driver

Print driver

Windows stores print jobs in a temporary file on the hard drive. What is this file called? (4.6.8) Print queue Print Manager Print Spooler Print driver

Print queue

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what? (10.6.20) Business Plan Cloud backups Prioritization Fault tolerance

Prioritization

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.) (4.2.13)

Processes Details

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process? (2.2.7) Processing Output Input Storage

Processing

What is the person called on an Agile team who gets to decide what goes on the sprint backlog and whether a task is done or not? (9.4.5) Team leader Marathon runner Product owner Manager

Product owner

Which Information Systems (IS) career can work in other fields such as construction management and engineering? (9.6.4) IT technician IS manager Systems analyst Project manager

Project manager

Which of the following stores data using microscopic light and dark spots? (3.5.17)

Compact disc

Which of the following is the MOST important skill for a PC technician? (3.7.4)

Customer service

Which of the following BEST describes a code of ethics? (1.3.4) Your personal adherence to your own values and principles A set of rules or standards you adopt that dictate how you act Laws that regulate how computers are used The fundamental truths or rules that undergird your personal values Ideals that guide your actions as you work with computers

A set of rules or standards you adopt that dictate how you act

Which kind of file would be hurt most by a lossy compression algorithm? (2.4.12) An audio file containing music A digital photograph A text document An audio file containing speech

A text document

Match the storage device types on the left with the description and benefits on the right. (3.5.17) Hard disk drive (HDD), Solid state drive (SSD), or Optical disc drive A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters. A flash device with storage capacity similar to a small hard drive. Uses lasers to read and write information stored in the form of pits in their reflective coating. Up to several TB in storage capacity and cost per MB is cheap. Faster than other devices. No moving parts. Last longer than other storage devices. Ideal for music and video. Portable and cheap with a long shelf life.

A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters. (HDD) A flash device with storage capacity similar to a small hard drive. (SSD) Uses lasers to read and write information stored in the form of pits in their reflective coating. (Optical disc drive) Up to several TB in storage capacity and cost per MB is cheap. (HDD) Faster than other devices. No moving parts. Last longer than other storage devices. (SSD) Ideal for music and video. Portable and cheap with a long shelf life. (Optical disc drive)

Which CPU type would MOST LIKELY be found in a smartphone? [3.3.15]

ARM

Jeff has been asked to replace a monitor on a workstation. Which of the following device interfaces could he use to connect the new monitor? (3.4.16)

DVI

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed? (3.6.15)

Document findings/lessons learned, actions, and outcomes

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step? (3.6.15)

Duplicate the problem, if possible

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform? (3.6.15)

Establish a plan of action to solve the problem and identify potential effects

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology? (3.6.15)

Establish a theory of probable cause

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder? (3.5.17)

Full Control

The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which career? (2.5.4) Game designer Video production specialist Graphic designer Digital audio producer

Graphic designer

Which of the following professionals would be MOST likely to create a poster? (2.5.4) Digital audio producer Game designer Graphic designer Video production specialist

Graphic designer

Match each item on the left to its appropriate category on the right. (3.4.16) Hardware Or Software Monitor Internet Browser Touchscreen Video Game Power cable RAM Operating system Video Game Controller

Hardware: Monitor Touchscreen Power cable RAM Video game controller Software: Internet browser Operating system Video game

Put the following events from computer history in the order they happened: Drag events here with oldest at top (2.2.7) The World Wide Web becomes available to the public The Apple II is released for home consumers International Business Machines, or IBM, is formed Scientists at Bell Laboratories invent the transistor Herman Hollerith develops electronic tabulating machine Apple releases the iPhone Jack Kilby invents the microchip

Herman Hollerith develops electronic tabulating machine International Business Machines, or IBM, is formed Scientists at Bell Laboratories invent the transistor Jack Kilby invents the microchip The Apple II is released for home consumers The World Wide Web becomes available to the public Apple releases the iPhone

An example of a MAC address is 00-B0-D0-63-C2-26. Which of the following notational systems is MOST likely used to represent a MAC address? (2.3.7) Binary Octal Hexadecimal Decimal

Hexadecimal

Which of the following BEST describes personal responsibility? (1.3.4) Rules that support your personal values How you act even if no one is watching Obeying laws that regulate how computers are used Provides the basis for your code of ethics

How you act even if no one is watching

Which of the following BEST describes Information Technology (IT)? (1.2.5) IT deals with how to turn information into meaningful decisions. IT refers to designing, creating, and improving software. IT has to do with collecting and utilizing data. IT refers to everything that involves computers.

IT refers to everything that involves computers.

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored? [3.3.15]

In memory

Which of the following would be the MINIMUM qualification for a PC technician job? (3.7.4)

Industry certification

Which of the following is not an advantage of SSDs over HDDs? (3.5.17)

Inexpensive

Which of the following companies is a manufacturer of CPUs? [3.3.15]

Intel

Which of the following BEST describes Computer Science (CS)? (1.2.5) It has to do with collecting and utilizing data. It refers to everything that involves computers. It is the study of computers and computing concepts. It refers to meeting the technological needs of businesses.

It is the study of computers and computing concepts.

Arrange the following from smallest to largest. (2.3.7) Smallest Terabyte Megabyte Kilobyte Gigabyte

Kilobyte Megabyte Gigabyte Terabyte

Abby needs a device that she can take to a client's location and show presentations from. Which of the following devices would be the BEST option for her? [3.2.4]

Laptop

Which of the following is an example of computer hardware? [3.2.4]

Microchip

Where are values the computer is directly working with at a particular moment in time stored? [3.3.15]

On the CPU register

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?(3.4.16)

Plug in an external monitor

Which of the following is NOT a long-term storage device? (3.5.17)

RAM

A typical computer monitor is which type of display? (2.4.12) Vector RGB Raster White

RGB

Which type of digital picture is made by storing individual pixel values? (2.4.12) Raster Pixel map Vector High-res

Raster

Match each ethical principle on the left to its definition on the right. (1.3.4) Respecting and honoring the inherent worth and right to privacy of other people Recognizing and respecting the legal claims of others to online data, creative works, and other digital assets Observing rules of "netiquette" that promote courtesy and respect in online settings Protecting data and information we're not authorized to share ============================================= Confidentiality Human Dignity Civility Digital Property Rights

Recognizing and respecting the legal claims of others to online data, creative works, and other digital assets Digital Property Rights Protecting data and information we're not authorized to share Confidentiality Respecting and honoring the inherent worth and right to privacy of other people Human Dignity Observing rules of "netiquette" that promote courtesy and respect in online settings Civility

Which of the following is a lossless compression algorithm? (2.4.12) PNG Compression artifact MP4 Run-length encoding

Run-length encoding

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is that value called? (2.4.12) Bit depth Sample height Sampling rate Resolution

Sample height

Which of the following devices generally include a variety of integrated hardware such as a camera? (Select two.) [3.2.4]

Smartphone, Laptop

Which of the following devices make use of a battery as its main power source? (Select two.) [3.2.4]

Smartphone, Laptop

Which of the following played vital roles in the advancement of national defense, science, and social change? (2.2.7) Microchip Smartphones Hollerith's Tabulating Machine Supercomputers

Supercomputers

What are pixels that are the exact same between multiple frames called? (2.4.12) Run-length encoding Temporal redundancy Lossless compression Compression artifact

Temporal redundancy

Which of the following is something that an Information Systems (IS) professional would do? (1.2.5) Create and maintain computer networks Turn information into meaningful decisions Help people with their technology needs Devise new ways to use computers

Turn information into meaningful decisions

Which of the following encoding schemes would MOST likely be used to represent an emoji? (2.3.7) Hexadecimal ASCII Binary Unicode

Unicode

Jessica is currently editing a commercial she helped create. Which of the following is MOST LIKELY her profession? (2.5.4) Graphic designer Game designer Video production specialist Digital audio producer

Video production specialist

Which of the following was the most widely used personal computer application until the mid-90s? (2.2.7) United States census Games Word processing Internet

Word processing


Set pelajaran terkait

HEALTH ONLY- Federal Tax Considerations for Health Insurance

View Set

NUR 125 PrepU Chapter 20: Management of Patients with Chronic Pulmonary Disease

View Set

Real Estate U NYS - Chapter 3A: Activity 1 and 2

View Set

Psychosocial Alterations NCLEX Questions

View Set

GS ECO 2302 CH 6 Elasticity: The Responsiveness of Demand and Supply

View Set

Chapter 2: Chemical Bonds and Reactions

View Set

ECE Fund of Cybersecurity and Info Security: Ch 10 and 11

View Set