it fundimentals Flashcards

1
Q

A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?

A

Driver Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?

A

800

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object?

A

CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between DropBox and OneDrive?

A

OneDrive is built into the Windows OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A web application contains a form, which users fill out. What is the most likely use for this form?

A

To manually input data into a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a database dump contain?

A

SQL statements which can recreate all tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following best describes containers and identifiers?

A

A container is a type of identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes containers and identifiers?

A

A container is a type of identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of authentication, if compromised, could potentially impact multiple services?

A

Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?

A

Ensure the integrity of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?

A

The enclosure provides ports to connect the drive to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do the instructions in this pseudocode do?
declare Animal(9) as String
For i = 0 to 9
If i > 5 Then
Animal(i) = “dog”
Else
Animal(i) = “cat”
End If
Next

A

Set the first 6 elements of the array Animal to “cat”, and the rest to “dog”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What problem is Windows’ UAC (User Account Control) designed to solve?

A

Elevated privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who can view the contents of a text file located in the public profile?

A

Only users who are granted permission to view the file can access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?

A

In-vehicle entertainment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main purpose of NIC (Network Interface Card) expansion card?

A

To provide additional NICs to servers on a wired business network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?

A

Type II, because VirtualBox is a software application within a host operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?

A

Settings/Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A computer program contains a boolean variable. What are the stored values of this variable?

A

0, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?

A

DROP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How is business software different from productivity software?

A

Business software is for a particular process, and productivity software is for general office functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What indicates that a website has a highly trusted certificate?

A

Green padlock icon in front of address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?

A

Write a company policy and procedure for escorting visitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A relational database has a table, Customers, which contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What’s the best way to keep track of customers’ purchases in this database?

A

Create 2 new tables: Products and Purchases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When a general language performs scripting, what does it call on as part of the code?

A

System commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands?

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What uses the same physical interface as MiniDP (mini DisplayPort format)?

A

Thunderbolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When does this pseudocode execute the print command?
If i == 0 XOR i != 0 Then
print “Yes”
End If

A

Always

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is NOT part of IoT (Internet of Things) home automation?

A

Insulin pump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following poses a higher risk to ensuring business continuity?

A

A converged network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?

A

IT security training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following represents the largest amount of storage capacity?

A

10000 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A table contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does this table need, to make sure that the Email field contains the symbols “@” and “.”?

A

A constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

If a system goes down, which of these will NOT help recover from data loss due to a natural disaster?

A

Implementing a Redundant Array of Independent Disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Why is scalability an important consideration when choosing to use a database instead of a flat file?

A

Nonscalable systems increase their costs at the same rate as the number of users that they support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following best describes containers and identifiers?

A

A container is a type of identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the second step in CompTIA’s troubleshooting model?

A

Research knowledge base/Internet, if applicable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A web application contains a form, which users fill out. What is the most likely use for this form?

A

To manually input data into a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?

A

In-vehicle entertainment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How much storage does a character data type use?

A

1 byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Convert the hexadecimal number 16 into decimal notation.

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does bps measure?

A

Throughput rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which protocol supports interactive mechanisms GET and POST?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following does NOT follow accepted MAC (Media Access Control) address format?

A

192:168:0.10/100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the difference between a password and a passphrase?

A

A passphrase is longer than a password, and easier to remember.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following is NOT true about critical data when configuring file backups?

A

Replication allows critical data backup, which protects from accidental deletion of a record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?

A

A Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which type of OS (Operating System) allows a user to unistall Windows XP and replace it with Linux?

A

Workstation OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When does this pseudocode execute the print command?
If i == 0 AND i != 0 Then
print “Yes”
End If

A

Never

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How does an object store its attributes?

A

As private variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which numbers does this pseudocode display?
declare i as Number = 10
Do While i > 0
If i < 7 Then
i = i - 1
End If
print i
i = i - 1
Loop

A

10, 9, 8, 7, 5, 3, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a clean uninstall of a program?

A

Removing files and settings manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following is an example of an optical drive?

A

DVD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?

A

Concurrent license

57
Q

A database administrator needs to extend a table with another column. What method contains the command to do that?

A

DDL (Data Definition Language)

58
Q

Which wireless Internet service does a computer use when it connects by tethering?

A

Cellular radio

59
Q

Which of the following is the most likely example of cross-platform software?

A

Application that runs on a Dell PC and a Samsung smartphone

60
Q

What’s a true statement about variables?

A

A variable can have any data type that the programming language supports.

61
Q

The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?

A

Duplicate the problem; determine if anything has changed.

62
Q

Which of the following represents the largest amount of storage capacity?

A

10000 TB

63
Q

Why is scalability an important consideration when choosing to use a database instead of a flat file?

A

Nonscalable systems increase their costs at the same rate as the number of users that they support.

64
Q

Which of the following best describes containers and identifiers?

A

A container is a type of identifier.

65
Q

A web application contains a form, which users fill out. What is the most likely use for this form?

A

To manually input data into a database

66
Q

What is the second step in CompTIA’s troubleshooting model?

A

Research knowledge base/Internet, if applicable.

67
Q

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?

A

Internet

68
Q

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?

A

In-vehicle entertainment

69
Q

How much storage does a character data type use?

A

1 byte

70
Q

Convert the hexadecimal number 16 into decimal notation.

A

22

71
Q

What does bps measure?

A

Throughput rate

72
Q

Which protocol supports interactive mechanisms GET and POST?

A

HTTP

73
Q

Which of the following does NOT follow accepted MAC (Media Access Control) address format?

A

192:168:0.10/100

74
Q

What is the difference between a password and a passphrase?

A

A passphrase is longer than a password, and easier to remember.

75
Q

Which of the following is NOT true about critical data when configuring file backups?

A

Replication allows critical data backup, which protects from accidental deletion of a record.

76
Q

An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?

A

A Denial of Service (DoS)

77
Q

Which type of OS (Operating System) allows a user to unistall Windows XP and replace it with Linux?

A

Workstation OS

78
Q

When does this pseudocode execute the print command?
If i == 0 AND i != 0 Then
print “Yes”
End If

A

Never

79
Q

How does an object store its attributes?

A

As private variables

80
Q

Which numbers does this pseudocode display?
declare i as Number = 10
Do While i > 0
If i < 7 Then
i = i - 1
End If
print i
i = i - 1
Loop

A

10, 9, 8, 7, 5, 3, 1

81
Q

What is a clean uninstall of a program?

A

Removing files and settings manually

82
Q

Which of the following is an example of an optical drive?

A

DVD

83
Q

A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?

A

Concurrent license

84
Q

A database administrator needs to extend a table with another column. What method contains the command to do that?

A

DDL (Data Definition Language)

85
Q

Which wireless Internet service does a computer use when it connects by tethering?

A

Cellular radio

86
Q

Which of the following is the most likely example of cross-platform software?

A

Application that runs on a Dell PC and a Samsung smartphone

87
Q

What’s a true statement about variables?

A

A variable can have any data type that the programming language supports.

88
Q

The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?

A

Duplicate the problem; determine if anything has changed.

89
Q

Which of the following represents the largest amount of storage capacity?

A

10000 TB

90
Q

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?

A

Internet

91
Q

What kind of computer firmware provides support for mouse operation at boot?

A

UEFI

92
Q

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?

A

Write a company policy and procedure for escorting visitors.

93
Q

How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?

A

128

94
Q

How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?

A

128

95
Q

Convert the hexadecimal number 16 into decimal notation.

A

22

96
Q

Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?

A

One-time purchases do not include full-feature upgrades.

97
Q

A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?

A

As a property of the Customer object

98
Q

An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object?

A

CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program

99
Q

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?

A

IT security training

100
Q

A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?

A

Integrity

101
Q

When a general language performs scripting, what does it call on as part of the code?

A

System commands

102
Q

Which is a true statement about a GPU (Graphics Processing Unit)?

A

GPU works with the CPU to handle complex high-resolution images.

103
Q

Which is a true statement about a GPU (Graphics Processing Unit)?

A

GPU works with the CPU to handle complex high-resolution images.

104
Q

Convert the binary number 1000000 into decimal notation.

A
105
Q

What does this pseudocode do?
declare i as Number = 0
Do While i <= 100
i = i + 1
print i
i = i - 1
Loop

A

Produces an infinite loop

106
Q

Convert the binary number 1000000 into decimal notation.

A

64

107
Q

What is a proper example of a string definition?

A

“It is polite to say "Thank you"”

108
Q

A database administrator needs to extend a table with another column. What method contains the command to do that?

A

DDL (Data Definition Language)

109
Q

Which of the following is NOT true about critical data when configuring file backups?

A

Replication allows critical data backup, which protects from accidental deletion of a record.

110
Q

What’s the difference between scripted and scripting languages?

A

Scripting languages are for configuring an operating system.

111
Q

What is the easiest way to install a standard mouse, and configure it to use basic settings?

A

Use Control Panel/Settings.

112
Q

A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?

A

User interface and programmatic access

113
Q

Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?

A

USB 3.0

114
Q

How do the CPU (Central Processing Unit) and storage devices in a computer process data?

A

As zeros and ones

115
Q

What are the properties of a file “Books/CoverPhoto.js”?

A

It’s an executable file named “CoverPhoto.js” in folder “Books”.

116
Q

After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?

A

Ensure the integrity of the data.

117
Q

The direct database access method is the best method to run which SQL (Structured Query Language) command?

A

GRANT

118
Q

What is the main purpose of NIC (Network Interface Card) expansion card?

A

To provide additional NICs to servers on a wired business network

119
Q

A manager requests to see the information on all of the company’s customers, listed by geographical regions, with the totals of purchases made by each customer. What is the best tool to produce this list?

A

Report

120
Q

What type of programming language has the fastest execution time?

A

Compiled

121
Q

Which of the following uses MHz (Megahertz) to measure their speed?

A

Older PC bus interfaces

122
Q

Why would a locally installed application store data files in a user folder and not the application folder?

A

To prevent users from modifying application folders

123
Q

Which of the following does NOT encrypt web page data?

A

Mobile device encryption

124
Q

In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?

A

The number of rows

125
Q

What is an example of an output device?

A

Loudspeaker

126
Q

Convert the decimal number 35 into binary notation.

A

100011

127
Q

Which of the following measures their data transfer capacity in Mbps (megabits per second)?

A

Wireless networks

128
Q

A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this?

A

Shareware

129
Q

The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?

A

View log files.

130
Q

Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?

A

Network redundancy

131
Q

A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?

A

Driver Manager

132
Q

In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?

A

The number of rows

133
Q

What is the difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards?

A

WPA2 uses Advanced Encryption Standard.

134
Q

In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?

A

Table

135
Q

What’s a true statement about markup languages?

A

Markup languages are not programming languages.

136
Q

A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What’s the best thing to do?

A

Add an exception for this website.

137
Q

What’s a true statement about the assembly language?

A

Only specialists use assembly code.

138
Q

Which file system allows a file with the name “Encyclopedia:Volume 1.txt”?

A

Ext4