it fundimentals Flashcards

1
Q

A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?

A

Driver Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?

A

800

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object?

A

CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between DropBox and OneDrive?

A

OneDrive is built into the Windows OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A web application contains a form, which users fill out. What is the most likely use for this form?

A

To manually input data into a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a database dump contain?

A

SQL statements which can recreate all tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following best describes containers and identifiers?

A

A container is a type of identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes containers and identifiers?

A

A container is a type of identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of authentication, if compromised, could potentially impact multiple services?

A

Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?

A

Ensure the integrity of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?

A

The enclosure provides ports to connect the drive to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do the instructions in this pseudocode do?
declare Animal(9) as String
For i = 0 to 9
If i > 5 Then
Animal(i) = “dog”
Else
Animal(i) = “cat”
End If
Next

A

Set the first 6 elements of the array Animal to “cat”, and the rest to “dog”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What problem is Windows’ UAC (User Account Control) designed to solve?

A

Elevated privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who can view the contents of a text file located in the public profile?

A

Only users who are granted permission to view the file can access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?

A

In-vehicle entertainment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main purpose of NIC (Network Interface Card) expansion card?

A

To provide additional NICs to servers on a wired business network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?

A

Type II, because VirtualBox is a software application within a host operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?

A

Settings/Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A computer program contains a boolean variable. What are the stored values of this variable?

A

0, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?

A

DROP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How is business software different from productivity software?

A

Business software is for a particular process, and productivity software is for general office functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What indicates that a website has a highly trusted certificate?

A

Green padlock icon in front of address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?

A

Write a company policy and procedure for escorting visitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customers' purchases in this database?
Create 2 new tables: Products and Purchases.
26
When a general language performs scripting, what does it call on as part of the code?
System commands
27
Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands?
802.11n
28
What uses the same physical interface as MiniDP (mini DisplayPort format)?
Thunderbolt
29
When does this pseudocode execute the print command? If i == 0 XOR i != 0 Then print "Yes" End If
Always
30
Which of the following is NOT part of IoT (Internet of Things) home automation?
Insulin pump
31
Which of the following poses a higher risk to ensuring business continuity?
A converged network
32
A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?
IT security training
33
Which of the following represents the largest amount of storage capacity?
10000 TB
34
A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does this table need, to make sure that the Email field contains the symbols "@" and "."?
A constraint
35
If a system goes down, which of these will NOT help recover from data loss due to a natural disaster?
Implementing a Redundant Array of Independent Disks (RAID)
36
Why is scalability an important consideration when choosing to use a database instead of a flat file?
Nonscalable systems increase their costs at the same rate as the number of users that they support.
37
Which of the following best describes containers and identifiers?
A container is a type of identifier.
38
What is the second step in CompTIA's troubleshooting model?
Research knowledge base/Internet, if applicable.
39
A web application contains a form, which users fill out. What is the most likely use for this form?
To manually input data into a database
40
Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?
Internet
41
Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?
In-vehicle entertainment
42
How much storage does a character data type use?
1 byte
43
Convert the hexadecimal number 16 into decimal notation.
22
44
What does bps measure?
Throughput rate
45
Which protocol supports interactive mechanisms GET and POST?
HTTP
46
Which of the following does NOT follow accepted MAC (Media Access Control) address format?
192:168:0.10/100
47
What is the difference between a password and a passphrase?
A passphrase is longer than a password, and easier to remember.
48
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record.
49
An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?
A Denial of Service (DoS)
50
Which type of OS (Operating System) allows a user to unistall Windows XP and replace it with Linux?
Workstation OS
51
When does this pseudocode execute the print command? If i == 0 AND i != 0 Then print "Yes" End If
Never
52
How does an object store its attributes?
As private variables
53
Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop
10, 9, 8, 7, 5, 3, 1
54
What is a clean uninstall of a program?
Removing files and settings manually
55
Which of the following is an example of an optical drive?
DVD
56
A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?
Concurrent license
57
A database administrator needs to extend a table with another column. What method contains the command to do that?
DDL (Data Definition Language)
58
Which wireless Internet service does a computer use when it connects by tethering?
Cellular radio
59
Which of the following is the most likely example of cross-platform software?
Application that runs on a Dell PC and a Samsung smartphone
60
What's a true statement about variables?
A variable can have any data type that the programming language supports.
61
The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?
Duplicate the problem; determine if anything has changed.
62
Which of the following represents the largest amount of storage capacity?
10000 TB
63
Why is scalability an important consideration when choosing to use a database instead of a flat file?
Nonscalable systems increase their costs at the same rate as the number of users that they support.
64
Which of the following best describes containers and identifiers?
A container is a type of identifier.
65
A web application contains a form, which users fill out. What is the most likely use for this form?
To manually input data into a database
66
What is the second step in CompTIA's troubleshooting model?
Research knowledge base/Internet, if applicable.
67
Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?
Internet
68
Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?
In-vehicle entertainment
69
How much storage does a character data type use?
1 byte
70
Convert the hexadecimal number 16 into decimal notation.
22
71
What does bps measure?
Throughput rate
72
Which protocol supports interactive mechanisms GET and POST?
HTTP
73
Which of the following does NOT follow accepted MAC (Media Access Control) address format?
192:168:0.10/100
74
What is the difference between a password and a passphrase?
A passphrase is longer than a password, and easier to remember.
75
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record.
76
An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?
A Denial of Service (DoS)
77
Which type of OS (Operating System) allows a user to unistall Windows XP and replace it with Linux?
Workstation OS
78
When does this pseudocode execute the print command? If i == 0 AND i != 0 Then print "Yes" End If
Never
79
How does an object store its attributes?
As private variables
80
Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop
10, 9, 8, 7, 5, 3, 1
81
What is a clean uninstall of a program?
Removing files and settings manually
82
Which of the following is an example of an optical drive?
DVD
83
A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?
Concurrent license
84
A database administrator needs to extend a table with another column. What method contains the command to do that?
DDL (Data Definition Language)
85
Which wireless Internet service does a computer use when it connects by tethering?
Cellular radio
86
Which of the following is the most likely example of cross-platform software?
Application that runs on a Dell PC and a Samsung smartphone
87
What's a true statement about variables?
A variable can have any data type that the programming language supports.
88
The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?
Duplicate the problem; determine if anything has changed.
89
Which of the following represents the largest amount of storage capacity?
10000 TB
90
Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?
Internet
91
What kind of computer firmware provides support for mouse operation at boot?
UEFI
92
A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?
Write a company policy and procedure for escorting visitors.
93
How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?
128
94
How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?
128
95
Convert the hexadecimal number 16 into decimal notation.
22
96
Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?
One-time purchases do not include full-feature upgrades.
97
A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?
As a property of the Customer object
98
An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object?
CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program
99
A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?
IT security training
100
A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?
Integrity
101
When a general language performs scripting, what does it call on as part of the code?
System commands
102
Which is a true statement about a GPU (Graphics Processing Unit)?
GPU works with the CPU to handle complex high-resolution images.
103
Which is a true statement about a GPU (Graphics Processing Unit)?
GPU works with the CPU to handle complex high-resolution images.
104
Convert the binary number 1000000 into decimal notation.
105
What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop
Produces an infinite loop
106
Convert the binary number 1000000 into decimal notation.
64
107
What is a proper example of a string definition?
"It is polite to say \"Thank you\""
108
A database administrator needs to extend a table with another column. What method contains the command to do that?
DDL (Data Definition Language)
109
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record.
110
What's the difference between scripted and scripting languages?
Scripting languages are for configuring an operating system.
111
What is the easiest way to install a standard mouse, and configure it to use basic settings?
Use Control Panel/Settings.
112
A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?
User interface and programmatic access
113
Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?
USB 3.0
114
How do the CPU (Central Processing Unit) and storage devices in a computer process data?
As zeros and ones
115
What are the properties of a file "Books/CoverPhoto.js"?
It's an executable file named "CoverPhoto.js" in folder "Books".
116
After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?
Ensure the integrity of the data.
117
The direct database access method is the best method to run which SQL (Structured Query Language) command?
GRANT
118
What is the main purpose of NIC (Network Interface Card) expansion card?
To provide additional NICs to servers on a wired business network
119
A manager requests to see the information on all of the company's customers, listed by geographical regions, with the totals of purchases made by each customer. What is the best tool to produce this list?
Report
120
What type of programming language has the fastest execution time?
Compiled
121
Which of the following uses MHz (Megahertz) to measure their speed?
Older PC bus interfaces
122
Why would a locally installed application store data files in a user folder and not the application folder?
To prevent users from modifying application folders
123
Which of the following does NOT encrypt web page data?
Mobile device encryption
124
In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?
The number of rows
125
What is an example of an output device?
Loudspeaker
126
Convert the decimal number 35 into binary notation.
100011
127
Which of the following measures their data transfer capacity in Mbps (megabits per second)?
Wireless networks
128
A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this?
Shareware
129
The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?
View log files.
130
Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?
Network redundancy
131
A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?
Driver Manager
132
In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?
The number of rows
133
What is the difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards?
WPA2 uses Advanced Encryption Standard.
134
In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?
Table
135
What's a true statement about markup languages?
Markup languages are not programming languages.
136
A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What's the best thing to do?
Add an exception for this website.
137
What's a true statement about the assembly language?
Only specialists use assembly code.
138
Which file system allows a file with the name "Encyclopedia:Volume 1.txt"?
Ext4