CompTIA ITF+ Medcerts
When configuring a back up solution for your computer, you decide that speed is the most important factor. What storage option should you choose? A.Locally attached storage B. Network attached storage C. Cloud Storage D. Offline storage
A. Locally attached storage Rationale: When choosing a backup solution, know that locally attached storage devices will always be faster than network storage or cloud-based solutions.
While reviewing a database, you notice that a table lists two columns as "PK." Which of the following could be true in this case? Select one: a. This could be an FK erroneously declared as PK b. The table creation is faulty, as one table can have only one column specified as PK c. The second column could be the PK referenced from another table d. This could be a PK constraint applied to a combination of columns
A. This could be a PK constraint applied to a combination of columns. Rationale: When a primary key constraint is applied to a combination of multiple columns (a composite key), each column that is a part of the composite key is individually marked as PK.
You have just created a new logo for your Company. What should you get to protect the intellectual property? A. Trademark B. Copyright C. Patent D. Asset Protection
A. Trademark Rationale: A trademark is used to protect a word, words, or symbol legally registered as representing a company or a product.
You need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement? A. WPA2 B. WPA C. NAT D. WEP
A. WPA2 Rationale: WPA2 is the most secure wireless security protocol in use today.
Which of the following peripherals is considered an input device? A. scanner B. printer C. touchscreen D. flash drive
A. scanner Rationale: Scanners are input devices. Printers produce output. Touchscreen and flash drives are both input and output devices.
Which of the following are considered device-hardening techniques? (choose two) A. Disabling Bluetooth B. Requiring complex passwords C. Enabling single sign-on D. Installing antispyware software
A and D Rational: Device hardening makes it harder for attackers to gain access to your system by reducing the potential areas of attack. Two examples of device hardening are disabling unused or unneeded services and installing anti-malware.
You open your web browser and type in www.google.com, but your computer can't find the website. Your neighbor's computer finds it just fine. What is most likely the cause? A. Incorrect DNS configuration B. Incorrect DHCP configuration C. Incorrect WPA2 configuration D. The website is down
A. Incorrect DNS configuration Rationale: DNS servers resolve host names to IP address. It's possible that your computer has the wrong address for the DNS server. DHCP automatically configures TCP/IP clients, and WPA2 is a security protocol. If the website was down, your neighbor would not be able to access it either.
Executing the command "Delete from <Table name>" leads to which of the following? Select one: a. Deletes table from the database b. Deletes selected records from the table c. Deletes all data from the table
A. Deletes all data from the table
For security purposes, which of the following user accounts are disabled by default? A. Guest B. User C. Power Users D. Administrator
A. Guest Rationale: The guest account is disabled by default, and it should remain disabled if it is not being used.
Which of the following devices are used for persistent user data storage in a computer? A. HDD B. RAM C. ROM D. SSD
A. HDD Rationale: Hard disk drives (HDDs) are used to store user data in a persistent manners, meaning that data is retained after the power is turned off.
Your computer has a 64-bit CPU. Which statement is true regarding which operating systems you can install on it? A. 64-bit operating system only B. 64-bit or 32-bit operating systems C. 32-bit operating systems only D. It depends on how much RAM is in your system
B. 64-bit or 32-bit operating system Rationale: A 64-bit processor can handle 32-bit or 64-bit OS's. It is a waste of power to use a 32-bit OS on it, but it will work.
Which of the following terms best describes an application with separate database, business logic, and application layers? A. N-tier B. Cloud Hosted C. Local network hosted D. Three tier
D. Three tier Rationale: A three-tier application will have separate database, business logic, and application layers. Three tier is a specific type of n-tier application architecture model.
Which of the following is MOST likely used to represent international text data? a. ACII b. Octal c. Hexadecimal d. Unicode
D. Unicode
Which of the following is referred to as the "working memory" of a computer? Select one: a. External memory b. Random Access memory (RAM) c. Read Only Memory (ROM) d. Additional memory
b. Random Access memory (RAM) Rationale: Random Access Memory (RAM) is referred to as the "working memory" of a computer.
What type of security is involved when pairing two Bluetooth devices together? A. SSL certificates are exchanges B. A PIN is provided by the Bluetooth devices C. The Bluetooth security layer negotiates the security mechanism D. There is no security involved
B. A pin is provided by the Bluetooth devices Rationale: When pairing two Bluetooth devices, you need to enter the PIN into your mobile device that allows it to connect to the Bluetooth device.
Which of the following container types has a fixed length? A. Constant B. Array C. Vector D. String
B. Array Rationale: Arrays and vectors are the two containers types. Arrays have fixed length, and vectors can have a dynamically allocated length.
Which data type exists only in true or false states? A. Binary B. Boolean C. Char D. Float
B. Boolean Rationale: The Boolean data type uses only true and false. Oftentimes they are represented with a 1 for True and a 0 for False, but this does not have to be the case.
When using a single Insert statement to add multiple sets of data to a table, how must the input data be specified in the query? Select one: a. All the data is listed inside a single pair of parentheses following the Insert keyword b. Data is segregated into different parentheses following the Value keyword c. Data is segregated into different parentheses following the Insert keyword d. All the data is listed inside a single pair of parentheses following the Value keyword
B. Data is segregated into different parentheses following the Value keyword Rationale: To add multiple sets of data using a single Insert statement, each set of data is listed into different parentheses following the Value keyword.
Which of the following is true about primary key constraint applied to a column? Select one: a. Can be applied only while creating the table b. Can support duplicate values c. Enforces table integrity d. Can be applied to only one column
B. Enforces table integrity Rationale: Primary Key constraints, specified on a single column or on multiple columns, enforces table integrity.
You just installed a new HP printer on your Dell computer and it's not printing. What is the first source to check for information on the problem? A. Dell's webiste B. HP's website C. Google search D. Internet technical community groups
B. HP's website Rationale: Always check the manufacturer's website first. Since it's an Hp printer, check its site and not Dell's.
Your manger read about a replay attack and is worried a hacker will try to use it on your network. What type of concerns is this? A. Confidentiality B. Integrity C. Availability D. Authentication
B. Integrity Rationale: A replay attack is an example of an integrity concern. Other examples are man-in-the-middle attacks, impersonation, and unauthorized information alteration.
Which operating system names its verisons after large cats? A. iOS B. OS X C. Andriod D. Chrome OS
B. OS X Rationale: Apple's OX X was names for large cats. Now versions are named after locations in California.
Angela has an iphone with a biometric scanner enabled. She powered the device off and just turned it back on. What method can she use to unlock her phone? A. Fingerprint only B. Passcode only C. Fingerprint or passcode D. Fingerprint, passcode, or iris scan
B. Passcode only Rationale: With biometrics enables, you can use either or to unlock a device. However, if it was just powered off, the only option is to enter the passcode.
What was the first widely used adapter video connector standard? A. CGA B. VGA C. XGA D. DVI
B. VGA Rationale: VGA was the first widely used video connector standard, and it was released in 1987.
Which of the following can be assigned to a variable that has already been declared? Select one: a. String b. Undefined c. Boolean d. Number
b. Undefined Rationale: An undefined value can be assigned to a variable that has already been declared.
You are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure that it's safe to enter your credit card information? (choose two) A. Security seal of approval B. RSA secure Access symbol C. A lock symbol D. HTTPS://
C A lock symbol and D HTTPS:// Rationale: Secure websites will start with instead of. In addition, there will be a lock symbol near the address in the address bar.
Which of the following optical discs will store the most data? A. CD-ROM B.DVD-ROM DL C. DVD-ROM DS D.RS-ROM
C. DVD-ROM DS Rationale: A double-sided DVD-ROM can store more data than a dual layer DVD-ROM.
Your friend Marcos asks you which of the following are the most secure. What do you tell him? A. 802.11n B. Infrared C. Fiber-optic D. UTP
C. Fiber-Optic Rationale: Wired connections are more secure than wireless ones. Fiber-optic cable is aslo immune to wiretaps, which makes it more secure than UTP.
Which type of operating system allows you to run multiple operating systems at once on one computer? A. Embedded OS B. Server OS C. Hypervisor D. Mobile devices OS
C. Hypervisor Rationale: A hypervisor is a program that allows you to run a virtual operating system within another operating system.
What type of removable storage is often used in digital cameras? A. Flash drive B. NAS C. Memory card D. Mobile media card
C. Memory Card Rationale: Digital cameras use memory cards. The most popular form of memory card on the market today is the SD card.
What of the following is not considered productivity software? A. Spreadsheet software B. Web browser C. Online workspace D. Visual diagramming software
C. Online workspace Rationale: Online workspace is an example of collaboration software.
When creating a relational database, what is the name of the rules and structure? A. Forms B. Tables C. Schema D. Constraints
C. Schema Rationale: The schema is the rule and structure of a relational database.
You have just completed a back up of your PC onto an optical disc. What is the next step you need to take? A. Store the backup in a secure location B. Burn the disc to ensure the data is saved. C. Test the backup to verify it works D. Copy the back up data to a cloud.
C. Test the backup to verify it works Rationale: After completing a backup, you should verify that the back up is working properly.
On an HTML page, which of the following tags declares a JavaScript code? Select one: a. <!DOCTYPE> b. <head> c. <body> d. <html>
c. <body> Rationale: The JavaScript code is always added in the <body> tag.
You are trying to test a sample malware. Testing is to be done on a computer with an anti-virus application installed. However, as soon as the sample malware is copied to the computer, it gets removed immediately. What can you do to avoid this deletion to enable you to proceed with testing? Select one: a. Create an exclusion list that will exclude the operating system folder b. Restart the anti-virus scanning engine immediately after copying the sample malware to the computer c. Turn off real-time protection feature in the anti-malware app d. Log in to the computer as a superuser and create a folder with limited rights applicable to all users except the superuser
C. Turn off real-time protection feature in the anti-malware app Rationale: All anti-malware apps start automatically in the background of the operating system, even before a user logs on to the computer. To enable the testing of sample malware, you must turn off the real-time protection, even if temporarily.
Which of the following is required for a website to show up as a secure website in a browser? A. Private browsing B. Client-side scripting C. Valid certificate D. Compatible browser
C. Valid certificate Rationale: Secure websites are required to have a valid certificate.
You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process? A. Enter wireless password B. Verify Internet connection C. Verify wireless capabilities D .Locate SSID E. Turn on Wi-Fi
C. verify wireless capabilities Rationale: The proper steps in order to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter wireless password, and verify Internet connection.
Windows 10 is running on a computer with a four-core processor that supports Hyper-Threading. How many logical processors are seen by this operating system? Select one: a. 6 b. 10 c. 8 d. 12
c. 8 Rationale: A Windows 10 computer, with a four-core processor that supports Hyper-Threading, will see 4x2=8 logical processors.
What commands can help identify the virtual machine configuration versions that a Hyper-V Host supports? Select one: a. Get-VMHostSupportedVersion b. Get-VMHostSupport c. Get-VMHostSupportVersion d. Get-VMHostSupported
a. Get-VMHostSupportedVersion Rationale: The Get-VMHostSupportedVersion command can help identify the virtual machine configuration versions that a Hyper-V Host supports.
Which notation system presents the largest numbers using the fewest digits? a. Hexadecimal b. Decimal c. Binary d. Octal
a. Hexadecimal
In the context of computers, the Form Factor of a motherboard does not describe which of the following features? Select one: a. Operating system b. Size c. Physical layout d. Shape
a. Operating system Rationale: In the context of computers, the Form Factor of a motherboard describes physical features, including the physical layout, shape, and size of the motherboard.
Which of the following data type has the range 0 to 429497295? Select one: a. Unsigned int b. Short int c. Unsigned short int d. Signed int
a. Unsigned int Rationale: Unsigned int has a range of 0 to 429497295.
When using the Update operator to update data in a table selectively, which of the following clauses do you use to specify the selection criteria? Select one: a. Where clause b. Which clause c. Why clause d. When clause
a. Where Clause Rationale: When using the Update operator to update data in a table selectively, use the Where clause to specify the selection criteria.
Which of the following commands is used to verify the static IP address, netmask, and default gateway on a Linux device? Select one: a. ifconfig -a b. ifconfig -s c. ifconfig eth0 d. ifconfig -v
a. ifconfig -a Rationale: The ifconfig -a command is used to verify the static IP address, netmask, and default gateway on a Linux device.
Which of the following tools enables you to view network connections, network protocol statistics, and routing tables? Select one: a. nbtstat b. nslookup c. tracert d. ping e. ipconfig
a. nbtstat Rationale: nbtstat, short for NetBIOS over TCP/IP, is a Windows TCP/IP utility that enables you to view network connections, network protocol statistics, and routing tables.
Which of the following tools can be used locally to identify the path from your local host to another device on your network or to the internet? Select one: a. tracert b. ipconfig c. ping d. nslookup
a. tracert Rationale: tracert, or trace route command, is a TCP/IP tool that can be used locally to find out the path from your local host to another device on your network or to the internet.
Which of the following tags is the root tag in an HTML document? Select one: a. <!DOCTYPE> b. <html> c. <head> d. <body>
b. <html> Rationale: The <html> tag, the root tag in the HTML document, helps the web browser identify the document as an HTML document.
Code that is not part of the functionality of the program but is intended to be easy for people to read is called what? A. Complied B. Interpreted C. Commented D. Pseudocode
D. Pseudocode Rationale: Pseudocode is used for annotation, and it does not affect the functionality of the program.
Which of the following units of measurement are used to rate a central processing unit (CPU)? (Choose Two) Select one or more: a. Bps b. GHz c. Mbps d. Hz
b. GHz and d. Hz Rationale: CPUs are rated in terms of clock speed or the number of instructions that can be processed per second. Of the listed options, units of measurement for clock speed are Hz and GHz.
How many clustered indexes can you create per table? A. 2 B. As many as required C. 4 D. 1
D. 1 Rationale: You can create only one clustered index per table.
Which of the following on your computer is considered firmware? A. RAM B. SSD C. CMOS D. BIOS
D. BIOS Rationale: The basic input output system (BIOS) is firmware. It's stored on a hardware chip called the CMOS.
When using an Insert statement to add data to a table, you provide the names of the relevant columns to insert the data. The column names are listed within parentheses and separated by a(n) __________. Select one: a. Colon b. Semi-colon c. Full stop d. Comma
D. Comma Rationale: The column names within the parentheses are separated by commas.
A user has been accused of hacking into a server. Which of the following would keep him from denying that he did it? A. Authentication B. Authorization C. Accounting D. Nonrepudiation
D. Nonrepudiation Rationale: The framework for access control is AAA-authentication, authorization, and accounting. Nonrepudiation is added, which makes it so people can't deny that an event tookplace.
Which of the following statements is true regarding a foreign key in a relational database? A. They are required B. There can only one per table C. They are automatically indexed D. Null values are allowed
D. Null values are allowed Rationale: A foreign key is one or more columns in a table that refers to the primary key in another table. Unlike primary keys, null values are allowed. Foreign keys are not required, there can be more than one per table, and they are not automatically indexed.
Which of the following are examples of external certificate authority (CA)? (Choose Three) Select one or more: a. DigiCert b. Microsoft c. IBM d. Comodo e. Symantec
DigiCert, Comodo, Symantec Rationale: Of the listed options, DigiCert, Comodo, and Symantec are external certifying authorities (CA).
A CPU with a clock speed of 1.8 GHz can process 1.0 billion instructions per second. Select one: True False
False Rationale: A CPU with a clock speed of 1.8 GHz can process 1.8 billion instructions per second.
A basic webcam contains memory to store images. Select one: True False
False Rationale: A basic webcam does not contain memory to store images.
When using Microsoft Edge, you can directly import the root certificate from a trusted certification authority in the browser settings. Select one: True False
False Rationale: Google Chrome and Internet Explorer provide settings to directly import a root certificate from a trusted certification authority. Microsoft Edge does not offer that capability.
To use the WM 6.1.4 Windows mobile emulator, you must buy the license from the Microsoft Corporation. True or False.
False Rationale: In the Emulator Properties dialog box, you can select a network adapter on the Network tab.
While setting up the emulated NE2000 adapter, you can assign it any random IRQ level. True or False
False Rationale: While setting up the emulated NE2000 adapter, you cannot assign it any random value, as many IRQs might be pre-assigned to other devices.
What commands do you use to update the Group Policy on a user's system? Select one: a. GPRUN /force b. GPUPDATE /force c. GPResult /force d. GPRESULT
b. GPUPDATE /force Rationale: To update the group policy on a user's system, you use the GPUPDATE /force command.
Which of the following media supports installation of Windows operating system on a guest virtual machine in Hyper-V? (Choose Two) Select one or more: a. Zip image b. CD/DVD media c. ISO image d. ARC image
b. ISO image and c. CD/DVD media Rationale: An ISO image file and CD/DVD media mounted on a physical drive support installation of Windows operating system on a guest virtual machine in Hyper-V.
Which of the following are possible causes of an application hang on a computer? (Choose Two) Select one or more: a. Application launched from a regular user account b. Insufficient system memory on the computer c. Improperly configured virtual memory d. Insufficient disk space on the computer
b. Insufficient disk space on the computer and D. Insufficient system memory on the computer Applications utilize disk space and memory when they run on a system. Insufficient disk space and memory can cause the applications to hang.
Raspberry Pi OS, the primary OS for the Raspberry Pi microcomputers, is based on which of the following OS? Select one: a. Apple iOS b. Linux c. Android d. Windows
b. Linux Rationale: Raspberry Pi OS, the primary OS for the Raspberry Pi microcomputers, is based on Linux.
A proxy server can minimize the threat of attacks from a public network, as a proxy server can function as a web application firewall. Select one: True False
True Rationale: A proxy server can minimize the threat of attacks from a public network, as a proxy server can function as a web application firewall.
When installing Windows 10, it is possible to skip the network configuration. Select one: True or False
True Rationale: During the installation of Windows 10, it is possible to skip the network configuration. You can configure the network after the installation is complete.
It is possible to add more than one keyboard layout during the Windows 10 installation. True or False
True Rationale: It is possible to add more than one keyboard layout during the Windows 10 installation.
It is possible to install then uninstall an update. True or False
True Rationale: It is possible to install then uninstall an update.
Shared folders rely on the File and Printer Sharing feature to manage network shares. Select one: True or False
True Rationale: Shared folders rely on the File and Printer Sharing feature to manage network shares.
The WM 6.1.4 Professional windows mobile emulator displays various options when it is ready to operate. True or False
True Rationale: The WM 6.1.4 Professional windows mobile emulator displays various options when it is ready to operate.
The operating system manages the hardware, the software, and the applications installed on a computer. Select one: True or False
True Rationale: The operating system manages the hardware, the software, and the applications installed on a computer.
When a parent folder is shared from a Windows computer, the child folders within it are accessible over a network. Select one: True or False
True Rationale: When a folder is shared in a Windows computer, it means that the folder, including its subfolders and files, is accessible over the network.
When a folder is shared in a Windows computer, the default share permission grants the "Everyone" users group the "Allow Read" permission. Select one: True or False
True Rationale: When a folder is shared in a Windows computer, the default share permission grants "Everyone" the "Allow Read" permission. Therefore, to secure the shared folder, the "Everyone" group is removed from the permissions list.
Normalizing data in a database arranges data into tables governed by data rules. True or False
True Rationale: Normalizing data in a database arranges data into tables governed by data rules.
Which of the following tags acts as container for all other tags defined in an HTML document? Select one: a. <html> b. <!DOCTYPE> c. <body> d. <head>
a. <html> Rationale: The <html> tag acts as a container for all the other tags. Opened immediately after the <!DOCTYPE html> declaration in the HTML document, the closing <html> tag is placed at the end of the HTML document.
How many active partitions can exist on a single hard drive? Select one: a. 1 b. 3 c. 4 d. 2
a. 1 Rationale: Every hard disk can contain only one active partition.
An MP4 file with a size of 1,024 MB is equivalent to which of the following sizes? Select one: a. 1 GB b. 1000 GB c. 10 GB d. 100 GB
a. 1 GB Rationale: Of the listed options, a 1,024 MB file is equivalent to 1 GB.
What minimum number of physical hard drives are needed to create a mirrored volume on a system? Select one: a. 2 b. 6 c. 8 d. 4
a. 2 Rationale: You need two physical hard drives to create a mirrored volume on a system.
David, a database administrator, needs to remove a column from an existing database. What command should he use? A. Alter B. Delete C. Drop D. Remove
a. Alter Rationale: The ATLER command is used to add, remove, or modify columns in a database. DROP is used to remove a table or database. DELETE is used to delete a record, and there is no REMOVE command.
You are testing a custom application developed by inhouse programmers. The application installs successfully on Windows. However, within a few minutes of running the application, the application crashes. The application behaves the same way in multiple retries. What should be your next step to get the issue resolved? Select one: a. Ask the inhouse programmers for the necessary fixes and updates b. Check the Event Viewer > Application log to look for the cause of the application crash c. Use the Run as administrator option to run the application d. Run Windows Update to install the latest updates on Windows
a. Ask the inhouse programmers for the necessary fixes and updates Rationale: Your next step should be to approach the inhouse programmers for the necessary fixes and updates. The developers can debug and decompile the application and perform tests to ensure that the application crash does not recur.
Where in a webpage do you define the <!DOCTYPE html>; declaration? Select one: a. At the beginning of the webpage b. At the end of the webpage c. Anywhere near the end of the webpage
a. At the beginning of the webpage Rationale: The <!DOCTYPE html>; declaration specifies the document type and helps in the correct display of web pages. You must include this declaration once, only at the beginning of the document.
You have a shared folder. You want to enable users to create their own subfolders and files and modify them as required. Which of the following special entity must be added to the Permissions list of the folder to meet this requirement? Select one: a. Creator Owner b. Interactive c. Everyone d. System
a. Creator Owner Rationale: In Windows, to enable users to create their own subfolders and files and modify them as required, the Creator Owner special entity is added to the Permissions list of the folder.
If Windows Update center on Windows 10 is taking time to collect updates, what is the alternative to quickly install a specific update? Select one: a. Download the specific update and perform a manual install b. Configure Windows Update service to use a managed account c. Order the Feature pack installation media from Microsoft d. Configure Windows Update service to start in Manual mode
a. Download the specific update and perform a manual install Rationale: Windows update center automatically collects and downloads the updates while Windows is running. Collecting the updates might take some time. To install a specific update quickly, you can download the update and install it manually.
When using an Insert statement to add data to a table, you do not list the relevant columns to enter the data. What will be the result once the query is executed? Select one: a. Data will be entered into the relevant columns by matching the data type b. The query will ask for the relevant columns to enter the data c. Data will be entered into the relevant columns based on the order of input data listing d. Data will be entered into the relevant columns by matching the length of the data
c. Data will be entered into the relevant columns based on the order of input data listing Rationale: When the column list of the relevant columns is not mentioned in the query, the data is entered into the columns based on the order in which the data is listed in the query.
Which of the following techniques do you use to delete a specific record from a table? Select one: a. Delete keyword followed by a star b. Delete keyword followed only by the name of the table c. Delete keyword followed by the name of the table, as well as the Where clause d. None of the above
c. Delete keyword followed by the name of the table, as well as the Where clause Rationale: To delete a specific record from a table, use the Delete keyword followed by the name of the table and the Where clause.
What is not required to run Hyper-V on a Windows Server 2019 device? Select one: a. A 64-bit processor b. BIOS-level virtualization support c. Minimum of 12 GB RAM d. Processor support for Second Level Address Translation (SLAT)
c. Minimum of 12 GB RAM Rationale: To run Hyper-V on a Windows Server 2019 device, you must have a 64-bit processor that supports Second Level Address Translation (SLAT), at least 8 GB of RAM, and BIOS-level virtualization support.
Which of the following PowerShell cmdlets is used to create share of a folder on a Windows computer? Select one: a. New-SmbDirectory b. New-SharedFolder c. New-SMBShare d. New-SMBFolder e. New-SMBSharedFolder
c. New-SMBShare Rationale: New-SMBShare PowerShell cmdlet is used to create an SMB share of a folder on a Windows computer.
Which of the following are features of device emulators? (Choose Two) Select one or more: a. Represents enhanced features of real systems b. Imitates only software systems c. Software imitation of the real systems d. Used to test apps for real systems
c. Software imitation of the real systems, d. Used to test apps for real systems Rationale: An emulator is a software imitation of the features of hardware/software systems. The simulator represents the same features as the real system and are used to test apps for real systems.
If you open a web page, you see many symbols: capital letters, lowercase letters, numbers, punctuation marks, dollar signs, and more. What character set is most likely being used? a. ACSII b. ACSII Advance c. UTF-8 d. UTF-16 e. UFT-32
c. UTF- 8 Rationale: UTF-8 is one of the several versions of Unicode. UTF-8 is the most used Unicode character set.
Which of the following TCP/IP utility is used for verifying the reachability of a host or network by sending packets that measure the round-trip time from the source to the destination and back? Select one: a. tracert b. nslookup c. ping d. ipconfig
c. ping Rationale: Packet Internet Groper (ping), a TCP/IP utility, is used to verify the reachability of a host or network by sending packets that measure the round-trip time from the source to the destination and back.
Which of the following data types in JavaScript can store numerals with or without decimals? Select one: a. Undefined b. Boolean c. String d. Number
d number Rationale: The number data type in JavaScript can store numerals with or without decimals.
Which of the following tags do you use to display the document name on the browser tab? Select one: a. <head> b. <!DOCTYPE html> c. <html> d. <title>
d. <title> Rationale: You use the <title> tag to display the document name on the browser tab.
Which of the following partitions can contain the operating system on a hard drive? Select one: a. Any partition on the hard drive b. Logical partition c. Extended partition d. Active partition
d. Active partition Rationale: An active partition is a bootable partition that contains the operating system.
Where, in an HTML document, would you place the <html> tag? Select one: a. Before the <!DOCTYPE> tag b. After the <body> tag c. After the <head> tag d. After the <!DOCTYPE> tag
d. After the <!DOCTYPE> tag Rationale: Opened immediately after the <!DOCTYPE html> declaration in the HTML document, the closing <html> tag is placed at the end of the HTML document.
Which of the following terms describes the technology by Intel where a single physical CPU core appears as two logical CPUs to an operating system? Select one: a. NHT b. VTT c. MHT d. HTT e. CTT
d. HTT Rationale: HTT, short for Hyper-Threading Technology (by Intel), virtualizes a processor such that the operating system sees each physical CPU as two logical CPUs.
When configuring a proxy server in the emulator, which of the following information must be defined? Select one: a. Domain controller name b. Subnet mask c. Gateway address d. IP address
d. IP address Rationale: Of the listed options, the IP address of the proxy server must be specified to configure the server in the emulator.
On which tab of the Emulator Properties dialog box will you select a network adapter? Select one: a. Peripherals b. Display c. General d. Network
d. Network Rationale: In the Emulator Properties dialog box, you can select a network adapter on the Network tab.
When does the nbtstat command display the NetBIOS name of the current local machine? Select one: a. When executed with the -RR switch b. When executed with the -c switch c. When executed with no switches d. When executed with the -n switch
d. When executed with the -n switch Rationale: The nbtstat command, when executed with the -n switch, displays the NetBIOS name of the current local machine.
Which of the following administrative shares is meant for the operating system directory? Select one: a. C$ b. IPC$ c. D$ d. admin$
d. admin$ Rationale: Of the listed administrative shares, admin$ is meant for the operating system directory.
Which of the following hardware parts is common among smartphones, tablets, laptops, and desktops? Select one: a. Central processing Unit (CPU) b. Display Unit c. Input Unit d. Memory e. All of the above
e. All of the above Rationale: Smartphones, tablets, laptops, and desktops all contain a central processing unit (CPU), a display unit, an input unit, and a memory.
