it fundamentals practice test 1

Ace your homework & exams now with Quizwiz!

Your birthday, Social Security number, home address, and passport numbers are all examples of which of the following?

PII

Which best describes the function of a computer bios?

Performs a POST, loads drivers, and launches the bootstrap file

A user connects a mouse to a laptop and the mouse immediately starts working without the need for the user to install a driver. Which of the following installation types does this describe?

Plug and Play

Which of the following data storage components as volatile?

RAM

In most programming languages, which of the following data types must usually surrounded by quotes?

String

The user wants to set up a printer and has available several connectors types which of the following connector types provides the fastest connection to a printer?

USB

Which of the following connectorTypes will allow her to use her to attach are there and external mouse or keyboard to a laptop?

USB

in a relational database structure, each table should have Only one of which of the following?

primary key

A user purchases an operating system of online for only 10% of the full retail price. I was trying to activate the new OS, they use it receives a pop-up warning that the software is not genuine. Which security threat has happened?

product key theft

which of the following organizational programming techniques is a readable description of what a computer program or algorithm must do, written in a natural language rather than in a programming language?

pseudocode

Which of the following describes one or more methods used to extract information from a database?

queries and reports

Which of the following programming languages is used to extract information from a database?

query

which of the following is a benefit of single sign on (SSO)

stronger security

What is the purpose of a database?

to store, organize and manage large amounts of information

In programming, which of the following is an identifier that is a side of value?

variable

Which communication is represented by the 802.11 A/B/J/N/AC standards?

wireless

Which of the following file types is used to consolidate a folder of files so you can email them or upload them as a single unit?

.zip

A storage unit of 1TB is equivalent to which of the following?

1000 KB

What is the decimal equivalent to the binary number 11110000?

240

Which of the following is the faster processing speed?

3.1 GHz

Which of the following notational systems was developed from telegraph code?

ASCII

What is the purpose of a digital certificate?

Authenticates connections between browsers and web servers?

Given the following computing devices, which is generally the most expandable?

Desktop computer

Which data type uses expressions containing the operators AND, OR and NOT to compare values and return a true or false result?

Boolean

When setting up a router for a small office or home office, what is one configuration changes should make immediately?

Change administrator password

What is the general purpose of most software?

Convert data into useful information

What are the benefits of private mode browsing?

No history, cookies, passwords, or temporary files are recorded on the computer

What is the primary advantage of a locally installed software application compared to a cloud hosted application?

No internet connection required

Which of the following Internet service runs on telephone wires?

DSL

Which of the following strategies help a business validate a course of action before committing to it?

Data-Driven Decision-Making

Which of the following is the last step when troubleshooting an issue?

Document findings

What do WEP, WPA, and WPA2 represent?

Encryption standards

Which of the following common laptop interfaces will connect a laptop to a wired network?

Ethernet

what is the hexadecimal representation of the decimal number 16

F

Which items are included in database back up?

Operational stage, architecture, and stored data

Music playing through a pair of speakers on a laptop is an example of which of the following type of device?

Output

Which is the best interface to connect a laptop to a TV for the purpose of playing movies?

HDMI

Which of the following languages is most commonly used to build websites?

HTML

Which of the following protocol secures browsing a website

HTTPS

Which of the following is the first step when troubleshooting an issue?

Identify the Problem

What category of devices include smart TVs, thermostats, home security systems, and appliances?

IoT (internet of things)

which of the following passwords is most secure

L00kin@You21

Which of the following computer parts interconnects the video, Audio, and networking components of a computer device?

Motherboard

an older desktop is operating with 4GBRAM. A user wants to boost its performance. There is an available memory slot, so the user installs more RAM; however, the computer is not utilizing the new memory. What is the most probable cause of this issue?

Must also install a 64 bit OS

What is the difference between an N-tier and Three Tier software architecture design?

N-tier distributes the application layer

A group of users in a small publishing office want to share a large image files in a common folder with her availability. Which of the following devices with bass meet this need?

Networked storage appliance

which of the following is not an example of non repudiation?

password

Which of the following is a Common Way tthinkint data a remote workers

VPN

Which of the following are examples of productivity software?

Web browser, word processing, spreadsheet, and CAD software

Which of the following multi user software licenses allows an unlimited number of users to use a fixed number of computers?

per sear

A user works for a company that prohibits the use of personal computers for a company business. Each employee is required to sign an agreement to these rules. this agreemenr is an example of which type of policy?

acceptable use

If a user wants to keep an operating system or application secured by allowing the van door to control the installation of minor updates, which of the following should be enabled?

automatic updates

A user wants to install major update onto a computer. What should I use a day before installing the update?

backup all important folders

Why is it important to use lengthy passwords of the combination of letters, numbers, and symbols?

complex passwords are more difficult to track

Which of the following types of programming languages is most commonly used to write complex computer games?

compuled

A employee travels with a laptop containing sensitive company information. Before connecting the laptop to a non-company not work, what should the employee do to prevent files from being copy it from the laptop?

disable file and print sharing on the laptop

what should the user do

do not click the link, just delete the email

What term describes the security concern of gathering information on a user?

dumpster diving

Which of the following is an example of fault tolerance

duplexes solid state drives SSD

What Musta use her due to fully activate the software package?

enter a product license key

What is the purpose of a CPU?

executes instructions

Which of the following is an exception that may allow you to use creative works without permission from the creator?

fair use

Which of the following connections or typically provide faster Internet speeds?

fiber optic

In a database table relationship, the primary key table number one is associated with which type of item and table number two?

foreign key

In a relational database, which of the following describes a record?

grouping of one or more fields

Cable locks address which of the following security threats

hardware theft

Which feature on the browser should the user configure to prevent tracking?

history

Which type of file has the extension .png

image

A microphone, camera and keyboard are all examples of which type of peripheral device?

input

And programming, which of the following is a logical component the repeats a sequence of steps until a defined outcome is reached?

loop

Which of the following is one of the main purposes of an operating system on a computing device?

manage the processor, memory, applications applications

Which type of database structure uses either keyvalue stores, graph stores, column stores, or document stores?

non relational

In programming, which of the following and I have properties in attributes?

object

When making multiple back ups of critical data, where should one of the back ups be stored?

off site


Related study sets

Money and Banking Chapter 15, Money & Banking Chapter 7, M&B Chapter 17, M&B Chapter 16, Money and Banking Chapter 10, Money and Banking Chapter 12, Money and Banking Chapter 14

View Set

Az első felelős és független magyar kormány tagjai

View Set

Ethics ACNT 1370 Final All Chapters MC

View Set

MA Real Estate Law and Regulations Q&A

View Set