ITF+ Random Questions Flashcards

To familiarize myself with the topics. IT Concepts and Terminology Infrastructure Applications and Software Software Development Concepts Database Fundamentals Security

1
Q

Which connector type is standard for connecting a network cable to a switch or router?

A

RJ-45 connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A new employee at your office is trying to connect a laptop to a projector for a presentation. The employee has only found a cable in the conference room with a connector that supports both video and audio output. Which type of cable should the employee look for to ensure the connection can transmit high-definition video and audio to the projector?

A

HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company’s document management system is set to only allow access to financial reports after regular business hours to users within the finance department who have a managerial role. What type of access control does this scenario exemplify?

A

Rule-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When troubleshooting a computer that is unable to connect to the internet, which of the following approaches BEST aligns with the divide and conquer method?

A

Check the network configuration settings, such as IP address and DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are setting up a new workstation and need to connect a high-definition monitor to the computer. Which of the following connectors would be best suited for this purpose?

A

HDMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which feature of a web browser should be used when you want to visit websites without saving the history, cookies, or temporary files related to your activities during that session?

A

Private browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?

A

Verify if the status visibility feature is enabled in the settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a key benefit of generating meaningful reports from collected data?

A

It helps identify trends and patterns for better decision-making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When defining a disaster recovery plan, which of the following should be given the highest priority for data restoration to ensure the quickest recovery of critical operations?

A

Restoring access to critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which application delivery method is characterized by software that is installed on a user’s device, does not require a network connection to function, and stores files directly on the device?

A

Locally installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your team is working on a program that’s supposed to run with high performance on a user’s computer. You need to choose a programming language that, after writing the code, will be translated into machine code before it’s executed on the computer. Which type of language will you choose?

A

A compiled programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When attempting to solve a problem on a computer, why is it important to establish a theory of probable cause?

A

It allows troubleshooters to focus on specific potential issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of software would you use to create and edit spreadsheets?

A

Spreadsheet software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An employee in your company has received a friend request from someone claiming to be a coworker. The employee views the profile and sees that there are mutual friends from the company and the profile includes work-related posts. What should the employee do to maintain confidentiality best practices before accepting the request?

A

Verify the identity of the individual by other means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A local library is integrating smart technology to optimize energy usage. They have decided to install smart thermostats that can be controlled remotely through the internet. Which type of device is the library incorporating, and why is it suitable for this purpose?

A

IoT smart thermostat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A graphic design company is looking to upgrade their computers to reduce the time it takes to render complex 3D models. The current computers have processors with a speed of 2.5 GHz. Which processor specification would likely result in faster rendering times?

A

You selected this option
A processor with a speed of 3.2 GHz

17
Q

During regular business hours, a primary database server experiences a catastrophic hardware failure. Given that financial transactions rely on uninterrupted database access, which course of action will BEST ensure continued transaction processing with minimal downtime?

A

Activate a failover database server that immediately assumes the operations of the failed server.

18
Q

When defining an identifier in a programming language, which of the following best represents a rule generally applied across many programming languages?

A

Must start with a letter or an underscore

19
Q

When entering sales data into a database, you record the total price of items sold. If an item is sold for $19.99, which data type would be most appropriate to use for accuracy?

A

Floating-point number

20
Q

You are an IT support technician and a user reports that their computer is not connecting to the network. You have verified that the network cable is properly connected and the port is working. What is the next step you should take?

A

Check the network settings on the user’s computer.