itf+ test Q's Flashcards
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
D. Copyright
Which of the following database concepts would MOST likely use a CSV file?
A. Data querying
B. Data reports
C. Data importing
D. Data persistence
C. Data importing
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A. Check Knowledge Base.
B. Search local logs.
C. Research possible theories.
D. Question users.
A. Check Knowledge Base.
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
A. Output
B. Storage
C. Input
D. Processing
C. Input
Which of the following allows wireless devices to communicate to a wired network?
A. Modem
B. Switch
C. Firewall
D. Access point
D. Access point
Which of the following describes something in a database that refers to the unique identifier in the parent table?
A. Attribute
B. Constraint
C. Foreign key
D. Schema
A. Foreign Key
For which of the following is a relational database management system MOST commonly used?
A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams
B. Storing information
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.
B. Ensure sources of EMI are removed.
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A. Schema
B. Permissions
C. Constraint
D. Column
C. Constraint
A. Perl
B. JScript
C. Java
D. PowerShell
C. Java
Which of the following is a value that uniquely identifies a database record?
A. Foreign key
B. Public key
C. Primary key
D. Private key
C. Primary key
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
A. SELECT
B. INSERT
C. DELETE
D. UPDATE
A. SELECT
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A. The quality of the computer used to connect
B. A security method of allowing connections
C. The employees’ home ISP speeds
D. The geographical location of the employees
B. A security method of allowing connections
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A. Variable
B. If
C. Datatype
D. Comment
B. If