CompTIA ITF+, Chapter-5
Your boss calls you on the phone while he is trying to install software. It is telling him that he needs a product key. Where should you tell him to look for it? (Choose two.) A. On the package the installation CD came in B. In an email from the manufacturer C. On the screen in the Options menu D. In Windows Update
A and B - Software product keys are typically included on the package in which the installation CD-ROM was shipped. If the software was downloaded, then the manufacturer usually sends the software key via email.
You want to visit a web page and make sure that the website does not steal any information about your identity. In that scenario, which of the following should you use? A. Script blocker B. Invalid certificate C. Disabled extensions D. Private browsing
D - Private browsing doesn't guarantee anonymity, but it doesn't use any of your cache or cookies, making it less likely that the site you visit can determine your identity.
Which of the following application delivery methods requires Internet access? A. Cloud hosted B. Locally installed C. Local network hosted D. Three tier
A - Cloud hosted apps require Internet access.
What software is designed to let the OS talk to hardware? A. Driver B. Application C. Patch D. Virtual
A - Drivers are designed to let the OS talk to hardware. Each piece of hardware must have a driver to work with the operating system.
You just installed an antivirus program on your laptop computer. Given a scenario in which you want to maintain proper levels of security, how often should you update the software? A. At least once a week B. At least once a month C. At least once a year D. Only when a new virus is discovered
A - For security software, such as antivirus protection, you should update the definition file at least once per week. Better yet, set the software to update automatically.
Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given this scenario, what is her best course of action to use it more than 16 additional times? A. Activate the software. B. Register the software. C. Uninstall and reinstall the software. D. No longer close the application.
A - If a software product is giving you a limited number of uses, you must activate that software with the manufacturer. This typically requires you to have a software license and a product key.
You visit a website that is supposed to be secure. Your web browser shows the web address in a red font, and you do not see a lock icon. What is the most likely cause of this? A. Invalid certificate B. Deactivated client-side scripting C. Incorrect proxy setting D. Incompatible browser for the application
A - If a website's security certificate is invalid, the web browser will warn you.
Which of the following is not generally included in a two-tier architecture model? A. Business logic layer B. Database layer C. Application layer D. Client-side layer
A - In a two-tier model, the business logic layer is usually omitted. The application layer is the client-side software.
You are trying to enter registration information into a website. When you click the Submit button, nothing happens. You try again and still nothing. What is the most likely cause of this problem? A. Script blocker B. Pop-up blocker C. Disabled browser extension D. Invalid certificate
A - When you click a button on a web page, it activates a script telling the page and the server how to react. If scripts are blocked, then the button will not work properly.
Word processing, spreadsheets, and presentation software are examples of what? A. Productivity software B. Collaboration software C. Utility software D. Operating system add-ins
A - Word processing, spreadsheets, and presentation software are three examples of productivity software. Other software types are email, PDF viewers, desktop publishing, personal information manager, and remote desktop software.
Which of the following does not require users to pay for the software? A. Proprietary software B. Open-source software C. Concurrent license D. Single use
B - Open source software is generally free, and users can modify the application if they so choose.
John purchases a single-use software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true? A. John can use the application on both computers at the same time. B. John can use the application on both computers, but only one at a time. C. John can use the application on only one of the computers. D. John can share the application with his friends to install on their computers.
B - Single-use software licenses typically state that the software can be used on only one computer at a time.
You have just purchased licensed software and want to install it. Which of the following are you required to enter to install this software? A. Your name and contact information B. The product key C. The serial number of your processor D. None of the above
B - The product key will be required to install or use any licensed software product. The manufacturer will include this on the installation media or email it to you.
You need to set up software for five users on a network. They all need to have access to and edit the same Excel files. Which is the best type of software for them to use? A. Project management software B. Online workspace C. Conferencing software D. Document sharing
B - The users need an online workspace, which will allow them to share files and work with them online.
When thinking of software compatibility, which two factors matter most? (Choose two.) A. If the software will work with other software on the computer B. If the software will work with the operating system C. If the minimum hardware requirements are met D. If the software comes with automatic updates
B and C - The two most important things to consider are if the software was written to work with that operating system and if the computer has enough hardware to run the application.
You have just plugged in a new HP printer to your Mac. You can't find a printer driver. What should you do given the circumstances? A. Use the default HP printer driver for macOS. B. Visit Apple's website to download the printer driver. C. Visit HP's website to download the printer driver. D. Run Software Update to install the printer driver automatically.
C - If you're ever missing a driver, go to the manufacturer's website to download it and then install it.
Which of the following types of software licenses requires the user to pay yearly? A. Single use B. Open source C. Subscription D. Recurring
C - Subscriptions require the user to pay yearly. There are no recurring licenses.
You are visiting a website to order a product, but you keep seeing old information that you know is outdated. Which of the following will most likely fix the problem? A. Deactivate client-side scripting. B. Disable browser extensions. C. Clear the cache. D. Configure proxy settings.
C - Web browsers cache information about websites. It's possible that the browser's cache is being read instead of the new data on the site. Clear the cache.
Which of the following is not an example of productivity software? A. Word processing software B. Visual diagramming software C. Web browser D. Conferencing software
D - Conferencing software is collaboration software.
A user calls to tell you that every time he browses the Internet, multiple browser windows keep appearing on his screen even though he has not opened them. In this scenario, what should you do to fix the problem? A. Deactivate client-side scripting. B. Clear the cache. C. Disable browser extensions. D. Configure a pop-up blocker.
D - The browser windows the user is getting are known as pop-up windows. Configure a pop-up blocker, which should resolve the problem. If not, it's possible the computer has malware.