FINAL EXAM CIT

Ace your homework & exams now with Quizwiz!

9) True or false? A standard user cannot change their own password. a) False—ordinary users can change their own password but cannot change anyone else's.

a) False—ordinary users can change their own password but cannot change anyone else's.

1) Which notation system supports presenting the largest numbers using the fewest digits: Binary, Decimal, or Hexadecimal?

a) Hexadecimal. Each hex digit can store 16 bits of information. A single decimal digit stores 4 bits while binary obviously stores 1 bit.

12) What is the advantage of a local network hosted application, in terms of data storage?

a) If data is stored on the server not on the local workstation, it is easier to apply access controls and to back it up.

6) Give an example of unstructured data.

a) Images and text files and other document formats are unstructured data.

8) What part of the process of data analytics is most closely supported by meaningful reporting?

a) Insights are the "end product" of the analytic process. Humans need a suitable reporting format to make best use of insights.

3) Why would Windows prompt you to enter a password if you try to install a software application?

a) Installing an application requires administrator privileges and is an action protected by User Account Control. If you were logged on as an administrator already, you might have to enter the password on a domain; if you were logged on as an ordinary user, you would have to enter the administrator's user name and password.

3) Which data type provides for whole numbers only?

a) Integer.

1) What function of an operating system is performed by the "shell?"

a) Interface between the user and the computer.

2) What is an interpreted language?

a) Interpreted languages do not need to be compiled. They run within the context of an interpreter which converts the code to machine code during runtime.

3) You are setting up a new computer, but it doesn't seem to be working. Should you check anything or contact the manufacturer?

a) It would be best to double-check you have connected the cables correctly (especially power).

7) Give two examples of semi-structured data stores.

a) Key/value pair databases and markup language document stores

3) What is an example of an open source operating system?

a) Linux, Chromium, or Android.

5) You have to open a word processing application but you cannot see an icon on the desktop. What should you do?

a) Look for the shortcut in Start Menu or Start Screen—not all programs add shortcuts on the Desktop.

8) Is an INSERT statement an example of a definition or manipulation language statement?

a) Manipulation language—it depends on the structure of a table (columns, data types, and constraints) being established already.

3) How is a markup language differ from a compiled language?

a) Markup doesn't provide instructions for the CPU to run as such. Markup is a way of using nested tags within a document to describe its structure and contents.

6) What type(s) of IoT appliance are less likely to be controlled via a home automation hub?

a) Modern cars and medical devices are unlikely to interface via a hub. Home automation hubs link to kitchen and domestic appliances, streaming media players, and potentially security systems.

8) What is the difference between freeware and open source software?

a) Open source means that the programming code used to design the software is also made available (and you must make it available in turn if you sell or distribute any part of it). Freeware means the software product costs nothing to use but this does not mean that the code is made available too or that you could modify the software and distribute it yourself.

6) You have to open a file located on a network server. What should be your first step?

a) Open the Network object from Explorer and locate the server (computer) hosting the file.

6) What type of legal protection could be obtained for a novel software algorithm?

a) Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way. Software code is often protected both by patent and by copyright however.

6) Your colleague has to run many applications at the same time and finds it difficult to know which icon to choose when switching between them. What alternative method could you suggest?

a) Press Alt+Tab—this shows previews of the window. Windows can also show previews of the window contents when pointing at the taskbar icon.

9) You need a development environment with a library of database functions. What type of interface are you using?

a) Programmatic access.

4) What are constants and variables examples of?

a) Programming identifiers.

10) What type of software manages tasks, dependencies, and timelines?

a) Project management software.Module 2 / Unit 3 / Programming and App Development

9) What three things define an object?

a) Properties, attributes, and methods.

1) What shows the structure of code without using the specific syntax of any one language?

a) Pseudocode.

2) What term is used to describe selecting and viewing information in a database?

a) Query.

9) What type of software would you use to configure a server by connecting to it over the network?

a) Remote Desktop.

4) What language is usually used to request data from an RDBMS such as Oracle?

a) Structured Query Language (SQL) is used to query RDBMS-based database platforms.

3) Why might you use the Services snap-in to manage background processes rather than Task Manager?

a) Task Manager allows you to start and stop services but the Services snap-in also allows you to configure service properties.

1) What compatibility information should you confirm before installing a software application?

a) That it works with the version of Windows that you have and that your computer meets the system (hardware) requirements.

6) Why might one of your first tasks on receiving a new computer be to remove software applications?

a) The computer may be bundled with pre-installed software that you do not want.

6) What two things are configured on a disk to make storage space on the disk available to the Windows OS?

a) The disk must contain at least one partition, typically allocated a drive letter, and the partition must be formatted with a suitable file system.

5) What crucial piece of information would you need when trying to locate support information about a computer system on the manufacturer's website?

a) The model number or a service code.

1) What is the registry and how does it distinguish Windows and Linux?

a) The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings.

4) Why don't laptops make good servers?

a) There is no room for expansion and you are paying for components and design (maximum portability) you do not need.

10) How can a client-server application architecture be described if there is the potential for the structure of the application platform to be developed further?

a) This could be described as a two-tier application. It could be re- developed as a three-tier application by specifying presentation, application, and data layers.

2) You have asked a senior manager to authorize your plan of action for resolving a fault in a software application. What name is given to the process you are following?

a) This is escalating the problem. You might escalate a problem to more experienced staff or seek help with a solution plan that is beyond your authority to put into action.

2) What term is used to describe terminating a process that is not responding to user input?

a) This is often called "killing" the process.

5) Why isn't a smartphone a good tool for writing a report?

a) Touchscreen or mini keyboards are not optimized for writing lots of text, though it is possible to attach them as peripheral devices.

1) True or false? All types of computers use CPU and system memory.

a) True.

11) True or false? You do not need to install a web application to your computer; it would be accessed via a browser.

a) True.

5) Following installation of an application, another program on your computer has stopped working. What could you do to try to fix it?

a) Try using the Repair option in Programs and Features (if available) or re-installing the program.

5) Which data representation format can encode the widest range of characters?

a) Unicode can represent millions of characters (glyphs). ASCII's 7- bit data structure can only support 128 characters, some of which are non-printable control characters.

7) What is the technical term for a web address?

a) Uniform Resource Locator (URL). In fact, Uniform Resource Identifier (URI) is now preferred in web standards documentation but URL is more widely known and used.

7) You are looking for content on a topic but your search is returning millions of matches that are not particularly helpful. What two methods could you use to get better search results?

a) Use more search keywords (ideally with 'uncommon' words) or search for an exact phrase by enclosing it in quotes.

5) What part of the system memory setup is most user-configurable?

a) Use of virtual memory or a pagefile, where disk space is used to supplement system RAM

4) Windows comes with web server software but it is not enabled by default. How would you install this software?

a) Use the Turn Windows features on or off dialog from Programs and Features.

7) Your colleague is using a laptop and you notice that he laboriously clicks the mouse repeatedly to scroll through the document you are co-editing. What technique could he use to be more productive?

a) Use the mouse scroll wheel (or if it doesn't have one drag the scroll button in the scroll bar).

2) Following installation of a program written for an older version of Windows, you receive an alert that it might not have installed correctly. What feature could you use to make the program run correctly?

a) Use the program's Compatibility tab to use settings for the older Windows version.

8) What protection feature in Windows is designed to prevent a script or software from making unauthorized changes to the OS configuration?

a) User Access Control (UAC). UAC means that the user must input their credentials or click through an authorization prompt before the configuration change can be made.

7) In order to obtain support, the software vendor wants to know the application's product ID. How would you locate this information?

a) Usually via the Help > About menu.

1) What should you do before attempting to set up a new computer system?

a) Verify that the environment is suitable and that the installation will be safe.

4) Your computer locks up periodically and feels hot to the touch. Could these things be related?

a) Yes, many lockup problems are caused by overheating. The first step would be to clean the fan exhaust vents of dust.

4) You have to sign in to Windows—does it matter if the CAPS LOCK light on the keyboard is activated?

a) Yes—passwords are case-sensitive.

8) You want to find something on a particular website, but the site does not have a search tool. Could you use a general search engine, and if so, how?

a) Yes—you use an advanced search form or use the site: operator (for example 'certification site:comptia.org').

2) When setting up a desktop computer, what factor should you consider when deciding on the location of the system case?

a) You do not want to leave trailing wires over walkways so you need to consider the position of power outlet(s) and where peripheral devices will be placed. You also want to ensure adequate air flow around the system unit.

4) The Task Scheduler allows you to run a process automatically in Windows. What is a widely-used Linux equivalent?

a) cron is widely used to run tasks automatically in Linux.

1) You are advising a colleague about best practices when troubleshooting. You have identified the following techniques to use to identify a problem: gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following CompTIA's troubleshooting model, what other piece of advice should you give?

a) Determine if anything has changed—this is one of the most useful troubleshooting techniques.

7) What data protection technology could you implement in order to restrict the type of activity that users could employ on digital products that they have purchased or rented?

a) Digital Rights Management (DRM).

5) What is it that defines the relationship between tables in an RDBMS?

a) Each table contains a primary key whose value is unique for each record in the table. A foreign table can use the value of a primary key as a relation, storing the value in a foreign key field.

1) What are the structural elements of a database table?

a) Each table stores information about records (rows in the table) in fields (columns in the tables).

3) What factors should you consider when positioning input and output devices?

a) Ensure that they can be used without exerting strain, especially on the arms/wrists and back/neck. Ensure that cabling is not a trip hazard. Avoid locations that cause excessive screen glare.

5) True or false? Windows 10 is the first 64-bit edition of Windows.

a) False—Windows 10 is better described as a version than edition and there have been 64-bit editions of Windows versions since Windows XP.

2) What type of computer is most likely to need peripheral devices?

a) Desktop computer—you could also call this a Personal Computer (PC) or a workstation. An All-in-one PC also uses peripheral devices, with the obvious exception of a monitor.

2) What is the decimal number 75 in binary and hexadecimal?

a) 0100 1011 in binary and 4B in hex. Hex notation is often indicated using 0x to precede the hex digits, so you may see this written like 0x4b. To work out the answer without a calculator, write out the place values for each notation system. For binary you'd have columns for 64, 32, 16, 8, 4, 2, and 1 and put a 1 in each column you need to add up to 75 and a 0 in the others. For hex you only need 16 and 1 (75 divided by 16 is 4 remainder 11, which is represented as "B" in hex).

7) What is a CLI?

a) A Command Line Interface allows the user to interact with the OS using typed commands or scripts rather than a GUI.

6) You want to check whether a condition has been met, and if it has, perform one action. Otherwise, you want your program to perform a second action. What sort of programming operation would help achieve this?

a) A conditional branch, such as an If...Then statement.

2) What type of file in an OS is the main means of providing coordination of hardware components?

a) A driver (or device driver).

7) In a program, what does a loop do?

a) A loop performs one or more instructions until (or while) a condition is met.

8) What is the difference between a procedure and a function?

a) A procedure does something while a function does something and then returns a value to the main program.

6) If you do not have a support contract, what is likely to be the best option for obtaining advice about a problem with an application?

a) A product support or community forum.

3) What type of computer is best suited for using in a job where you have to make notes and be able to move around easily?

a) A tablet or smartphone or possibly a hybrid laptop/tablet. Note- taking is supported by a touchscreen-based device.

5) What type of programming concept allows for a variable size container?

a) A vector is a variable size container while an array is a fixed size one.

10) What three scripting options are commonly used in Windows 10 to perform administrative tasks?

a) Batch files, Windows PowerShell scripts, and VBScripts.

4) What is the difference between the char and string data types?

a) Char stores a single textual character in a fixed length field (typically 1 byte). A string is a variable length field for storing a sequence of characters.

8) What key combination can you use to force the browser to ignore any locally cached files when refreshing a page?

a) Ctrl+F5.

4) What type of computing device(s) is macOS designed for installation on?

a) Desktop computers/workstations and laptops.


Related study sets

El Conditional Tense. Realidades 3 pag. 352 "You use the conditional in Spanish to express what a person would do or what a situation would be like"

View Set

CodePath Data Structure Patterns

View Set

Interior Design Chapters 4-6 and 1 Munsell

View Set

Chapter 43: Hematological or Immunological Pediatric

View Set

data analysis chapter 11 study guide

View Set

Biology, Light Independent Reactions in Photosynthesis

View Set

NUTR 251 - Smartbook Ch. 13 - Water-Soluble Vitamins

View Set