it fundamentals practice test 1
Your birthday, Social Security number, home address, and passport numbers are all examples of which of the following?
PII
Which best describes the function of a computer bios?
Performs a POST, loads drivers, and launches the bootstrap file
A user connects a mouse to a laptop and the mouse immediately starts working without the need for the user to install a driver. Which of the following installation types does this describe?
Plug and Play
Which of the following data storage components as volatile?
RAM
In most programming languages, which of the following data types must usually surrounded by quotes?
String
The user wants to set up a printer and has available several connectors types which of the following connector types provides the fastest connection to a printer?
USB
Which of the following connectorTypes will allow her to use her to attach are there and external mouse or keyboard to a laptop?
USB
in a relational database structure, each table should have Only one of which of the following?
primary key
A user purchases an operating system of online for only 10% of the full retail price. I was trying to activate the new OS, they use it receives a pop-up warning that the software is not genuine. Which security threat has happened?
product key theft
which of the following organizational programming techniques is a readable description of what a computer program or algorithm must do, written in a natural language rather than in a programming language?
pseudocode
Which of the following describes one or more methods used to extract information from a database?
queries and reports
Which of the following programming languages is used to extract information from a database?
query
which of the following is a benefit of single sign on (SSO)
stronger security
What is the purpose of a database?
to store, organize and manage large amounts of information
In programming, which of the following is an identifier that is a side of value?
variable
Which communication is represented by the 802.11 A/B/J/N/AC standards?
wireless
Which of the following file types is used to consolidate a folder of files so you can email them or upload them as a single unit?
.zip
A storage unit of 1TB is equivalent to which of the following?
1000 KB
What is the decimal equivalent to the binary number 11110000?
240
Which of the following is the faster processing speed?
3.1 GHz
Which of the following notational systems was developed from telegraph code?
ASCII
What is the purpose of a digital certificate?
Authenticates connections between browsers and web servers?
Given the following computing devices, which is generally the most expandable?
Desktop computer
Which data type uses expressions containing the operators AND, OR and NOT to compare values and return a true or false result?
Boolean
When setting up a router for a small office or home office, what is one configuration changes should make immediately?
Change administrator password
What is the general purpose of most software?
Convert data into useful information
What are the benefits of private mode browsing?
No history, cookies, passwords, or temporary files are recorded on the computer
What is the primary advantage of a locally installed software application compared to a cloud hosted application?
No internet connection required
Which of the following Internet service runs on telephone wires?
DSL
Which of the following strategies help a business validate a course of action before committing to it?
Data-Driven Decision-Making
Which of the following is the last step when troubleshooting an issue?
Document findings
What do WEP, WPA, and WPA2 represent?
Encryption standards
Which of the following common laptop interfaces will connect a laptop to a wired network?
Ethernet
what is the hexadecimal representation of the decimal number 16
F
Which items are included in database back up?
Operational stage, architecture, and stored data
Music playing through a pair of speakers on a laptop is an example of which of the following type of device?
Output
Which is the best interface to connect a laptop to a TV for the purpose of playing movies?
HDMI
Which of the following languages is most commonly used to build websites?
HTML
Which of the following protocol secures browsing a website
HTTPS
Which of the following is the first step when troubleshooting an issue?
Identify the Problem
What category of devices include smart TVs, thermostats, home security systems, and appliances?
IoT (internet of things)
which of the following passwords is most secure
L00kin@You21
Which of the following computer parts interconnects the video, Audio, and networking components of a computer device?
Motherboard
an older desktop is operating with 4GBRAM. A user wants to boost its performance. There is an available memory slot, so the user installs more RAM; however, the computer is not utilizing the new memory. What is the most probable cause of this issue?
Must also install a 64 bit OS
What is the difference between an N-tier and Three Tier software architecture design?
N-tier distributes the application layer
A group of users in a small publishing office want to share a large image files in a common folder with her availability. Which of the following devices with bass meet this need?
Networked storage appliance
which of the following is not an example of non repudiation?
password
Which of the following is a Common Way tthinkint data a remote workers
VPN
Which of the following are examples of productivity software?
Web browser, word processing, spreadsheet, and CAD software
Which of the following multi user software licenses allows an unlimited number of users to use a fixed number of computers?
per sear
A user works for a company that prohibits the use of personal computers for a company business. Each employee is required to sign an agreement to these rules. this agreemenr is an example of which type of policy?
acceptable use
If a user wants to keep an operating system or application secured by allowing the van door to control the installation of minor updates, which of the following should be enabled?
automatic updates
A user wants to install major update onto a computer. What should I use a day before installing the update?
backup all important folders
Why is it important to use lengthy passwords of the combination of letters, numbers, and symbols?
complex passwords are more difficult to track
Which of the following types of programming languages is most commonly used to write complex computer games?
compuled
A employee travels with a laptop containing sensitive company information. Before connecting the laptop to a non-company not work, what should the employee do to prevent files from being copy it from the laptop?
disable file and print sharing on the laptop
what should the user do
do not click the link, just delete the email
What term describes the security concern of gathering information on a user?
dumpster diving
Which of the following is an example of fault tolerance
duplexes solid state drives SSD
What Musta use her due to fully activate the software package?
enter a product license key
What is the purpose of a CPU?
executes instructions
Which of the following is an exception that may allow you to use creative works without permission from the creator?
fair use
Which of the following connections or typically provide faster Internet speeds?
fiber optic
In a database table relationship, the primary key table number one is associated with which type of item and table number two?
foreign key
In a relational database, which of the following describes a record?
grouping of one or more fields
Cable locks address which of the following security threats
hardware theft
Which feature on the browser should the user configure to prevent tracking?
history
Which type of file has the extension .png
image
A microphone, camera and keyboard are all examples of which type of peripheral device?
input
And programming, which of the following is a logical component the repeats a sequence of steps until a defined outcome is reached?
loop
Which of the following is one of the main purposes of an operating system on a computing device?
manage the processor, memory, applications applications
Which type of database structure uses either keyvalue stores, graph stores, column stores, or document stores?
non relational
In programming, which of the following and I have properties in attributes?
object
When making multiple back ups of critical data, where should one of the back ups be stored?
off site