it fundimentals Flashcards
A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?
Driver Manager
What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?
800
An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object?
CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program
What is the difference between DropBox and OneDrive?
OneDrive is built into the Windows OS.
A web application contains a form, which users fill out. What is the most likely use for this form?
To manually input data into a database
What does a database dump contain?
SQL statements which can recreate all tables
Which of the following best describes containers and identifiers?
A container is a type of identifier.
Which of the following best describes containers and identifiers?
A container is a type of identifier.
Which of the following types of authentication, if compromised, could potentially impact multiple services?
Single sign-on
After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?
Ensure the integrity of the data
A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?
The enclosure provides ports to connect the drive to the computer.
What do the instructions in this pseudocode do?
declare Animal(9) as String
For i = 0 to 9
If i > 5 Then
Animal(i) = “dog”
Else
Animal(i) = “cat”
End If
Next
Set the first 6 elements of the array Animal to “cat”, and the rest to “dog”.
What problem is Windows’ UAC (User Account Control) designed to solve?
Elevated privileges
Who can view the contents of a text file located in the public profile?
Only users who are granted permission to view the file can access it.
Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?
In-vehicle entertainment
What is the main purpose of NIC (Network Interface Card) expansion card?
To provide additional NICs to servers on a wired business network
A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?
Type II, because VirtualBox is a software application within a host operating system
What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?
100 Mbps
A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?
Settings/Devices
A computer program contains a boolean variable. What are the stored values of this variable?
0, 1
Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?
DROP
How is business software different from productivity software?
Business software is for a particular process, and productivity software is for general office functions.
What indicates that a website has a highly trusted certificate?
Green padlock icon in front of address bar
A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?
Write a company policy and procedure for escorting visitors.
A relational database has a table, Customers, which contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What’s the best way to keep track of customers’ purchases in this database?
Create 2 new tables: Products and Purchases.
When a general language performs scripting, what does it call on as part of the code?
System commands
Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands?
802.11n
What uses the same physical interface as MiniDP (mini DisplayPort format)?
Thunderbolt
When does this pseudocode execute the print command?
If i == 0 XOR i != 0 Then
print “Yes”
End If
Always
Which of the following is NOT part of IoT (Internet of Things) home automation?
Insulin pump
Which of the following poses a higher risk to ensuring business continuity?
A converged network
A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?
IT security training
Which of the following represents the largest amount of storage capacity?
10000 TB
A table contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does this table need, to make sure that the Email field contains the symbols “@” and “.”?
A constraint
If a system goes down, which of these will NOT help recover from data loss due to a natural disaster?
Implementing a Redundant Array of Independent Disks (RAID)
Why is scalability an important consideration when choosing to use a database instead of a flat file?
Nonscalable systems increase their costs at the same rate as the number of users that they support.
Which of the following best describes containers and identifiers?
A container is a type of identifier.
What is the second step in CompTIA’s troubleshooting model?
Research knowledge base/Internet, if applicable.
A web application contains a form, which users fill out. What is the most likely use for this form?
To manually input data into a database
Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?
Internet
Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?
In-vehicle entertainment
How much storage does a character data type use?
1 byte
Convert the hexadecimal number 16 into decimal notation.
22
What does bps measure?
Throughput rate
Which protocol supports interactive mechanisms GET and POST?
HTTP
Which of the following does NOT follow accepted MAC (Media Access Control) address format?
192:168:0.10/100
What is the difference between a password and a passphrase?
A passphrase is longer than a password, and easier to remember.
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record.
An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?
A Denial of Service (DoS)
Which type of OS (Operating System) allows a user to unistall Windows XP and replace it with Linux?
Workstation OS
When does this pseudocode execute the print command?
If i == 0 AND i != 0 Then
print “Yes”
End If
Never
How does an object store its attributes?
As private variables
Which numbers does this pseudocode display?
declare i as Number = 10
Do While i > 0
If i < 7 Then
i = i - 1
End If
print i
i = i - 1
Loop
10, 9, 8, 7, 5, 3, 1
What is a clean uninstall of a program?
Removing files and settings manually
Which of the following is an example of an optical drive?
DVD