Full Transcript

CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br Select the best example of using dual monitors with multiple windows in Extended mode: A. A sales rep uses a PowerPoint presentation at a meeting, with the keyboard, mouse, and one monitor facing him,...

CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br Select the best example of using dual monitors with multiple windows in Extended mode: A. A sales rep uses a PowerPoint presentation at a meeting, with the keyboard, mouse, and one monitor facing him, and the second monitor facing a group of customers. B. A programmer writes HTML code on one monitor and tests the B. A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor. web page changes in a browser on the other monitor. C. An accountant uses both monitors side-by-side to stretch out one Excel spreadsheet so that it can be displayed in its entirety. D. A football coach attaches a second, larger monitor to a laptop, so that the PC screen image can display on the larger monitor instead. What would be considered a downside to producing digital prod- ucts? A. They make global distribution easier. D. They are easy to copy and steal. B. They are 100% safe from pirating. C. They are quick to download. D. They are easy to copy and steal. Which of these is a protocol used to upload and download files between clients and servers? A. FTP A. FTP B. OCR C. HFC D. NFC Which workstation operating system type is best used on a busi- ness network? A. Network Operating System (NOS) C. Enterprise Client B. Mainframe OS C. Enterprise Client D. Home Client What is the purpose of BIOS? A. It is the firmware that drives the bootstrapping process. B. It is the software that allocates memory to applications. C. It is the hardware used to transfer data from the CPU to other A. It is the firmware that drives the bootstrapping process. components on the motherboard. D. It is the instruction set of the CPU that decodes each instruction and decides whether to execute it or send it on. Which of the following enable you to create segments of code that you can reuse? A. Neither procedures nor functions. D. Both procedures and functions. B. Procedures C. Functions D. Both procedures and functions. Select the one UNTRUE statement in regard to system memory. A. RAM is random access memory and is non-volatile storage. B. System memory is much faster than accessing data in a mass storage system, such as a hard disk. A. RAM is random access memory and is non-volatile storage. C. If there isn't enough room in RAM, the memory space can be extended by using virtual memory. D. Memory is the main storage space for programs and data when the computer is running. Which of these is NOT a social engineering attack? A. Dumpster diving B. Impersonation C. Denial-of-service C. Denial-of-service D. Shoulder surfing What are the two interfaces used for configuring input devices? A. File Manager and the Settings app. C. The Settings app and Control Panel. B. Control Panel and File Manager. 1/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br C. The Settings app and Control Panel. D. The vendor's website and File Manager. Which of these is an access control? A. Destruction B. Accounting B. Accounting C. Integrity D. Snooping Software programs that let users do useful things with their com- puter, such as create and edit documents are known as what? A. Random Access Memory (RAM) C. Applications (or Apps) B. Operating System (OS) C. Applications (or Apps) D. Device Drivers Which of the following would NOT be defined as an input device? A. Printer B. Keyboard A. Printer C. Mouse D. Biometric Scanner In the context of programming languages such as JAVA, what does the acronym OOP best represent? A. Obsolete-Object Programming (OOP) B. Object-Oriented Programming (OOP) B. Object-Oriented Programming (OOP) C. Ordered-Operational Programming (OOP) D. Outside-Object Programming (OOP) What is the purpose of a NIC card? A. It increases the speed of video streaming. B. It allows the computer to connect to network. B. It allows the computer to connect to network. C. It sends video signals to a display device. D. It provides extra ports for peripherals. Which of the following is an example of a compressed file format? A. rtf B. exe C. zip C. zip D. png You created a folder called MyFiles under the root in a Windows file system. How would that folder be identified? A. C:/MyFiles C. C:\MyFiles B. C:\root\Myfiles C. C:\MyFiles D. \MyFiles Select the one UNTRUE statement in regard to an expansion bus. A. It's one of two kinds of bus in the PC system: the expansion bus and the system bus. B. It carries four things: data, address information, a timing signal, C. It's also referred to as the Front Side Bus (FSB) or the local bus. and power. C. It's also referred to as the Front Side Bus (FSB) or the local bus. D. Its purpose is to provide the circuitry that connects the various microprocessors and other components on the motherboard. Which of these is the name for a type of an add-on for a web browser? A. USB B. Plug-in B. Plug-in C. HDMI D. Cookie What do we call loss of strength of a wireless signal? A. Long Term Evolution (LTE) B. Interference C. Attenuation C. Attenuation D. 802.11b 2/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br How is data stored on a hard disk drive? A. A layer of foil includes pits to represent digital data. B. It is encoded magnetically on a platter that spins. B. It is encoded magnetically on a platter that spins. C. A layer of photosensitive dye is marked by a laser. D. It is encoded magnetically on a small, light, fixed surface. When troubleshooting a computer for a specific issue, what in- formation do you need when searching the internet for possible solutions? A. You should obtain the computer model in order to find solutions related to your specific computer. D. You should obtain the serial number in order to find solutions B. You should obtain the processor type in order to find solutions related to your specific computer. related to your specific computer. C. You should obtain the manufacturer name in order to find solutions related to your specific computer. D. You should obtain the serial number in order to find solutions related to your specific computer. Which of these is NOT a form of a multitouch gesture? A. Sliding B. Tap D. Poke C. Swiping D. Poke What are the two important components that can be increased to improve video? A. Size of pixels and the number of colors. C. The number of pixels and the refresh speed. B. Software and driver versions. C. The number of pixels and the refresh speed. D. Number of colors and bus size. Which of the following is Task Manager commonly used for? A. To close an application using the "X" in the upper-right corner of the application window. B. To end an unresponsive process that cannot be closed from the B. To end an unresponsive process that cannot be closed from the application window itself. application window itself. C. To shut down the operating system before going home after work. D. To launch a program because the icon is no longer on the desktop. Which of the following is NOT considered to be a measurement of file size? A. MicroByte A. MicroByte B. KiloByte C. MegaByte D. GigaByte Which of the following best represents the way data moves through a computer system? A. Processing, storage, input, and output. D. Input, processing, output, and storage. B. Output, input, processing, and storage. C. Processing, input, output, and storage. D. Input, processing, output, and storage. Which option is an example of an authentication lockout policy? A. The device encrypts data. B. The device deletes its data remotely. D. The device locks for a set period. C. The device locks automatically. D. The device locks for a set period. Which of these is a Confidentiality concern, as defined in the "CIA Triad"? A. Snooping A. Snooping B. Destruction C. Replay D. Impersonation 3/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br In terms of file systems, what benefits does exFAT provide over FAT and NTFS? A. It has a larger maximum file size than its predecessors and can store file sizes up to 2TB. B. It's developed for flash drives and has some of the same B. It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead. extended attributes as NTFS, but with less overhead. C. It introduces a 64-bit addressing scheme, which allows for larger partitions than its predecessors. D. It provides some additional attributes not provided before—for example, file-level security permissions. Why is RAM an example of a volatile storage device? A. Ram is not enclosed in a protective case, and is more easily damaged than a hard drive. B. Ram chips can easily be removed from the motherboard. C. Data stored in RAM is only stored as long as there is a power C. Data stored in RAM is only stored as long as there is a power source sending constant power to the chip. source sending constant power to the chip. D. Ram can easily be upgraded and replaced in most sizes and brands of computer systems. Which best describes an Information Technology (IT) system? A. When a system processes information and stores it. B. When a system is activated and engaged by a user. C. When a system processes, stores, and transfers information. C. When a system processes, stores, and transfers information. D. When a system utilized the TCP/IP model to transfer data across the network. Which of the following is NOT considered a best practice for installing software? A. Verify that the software is compatible with your operating sys- tem. B. Verify the computer hardware meets the application's recom- D. Verify the software was created in the country which you live in. mended system requirements. C. Verify that you have a valid agreement or license to install and use the product. D. Verify the software was created in the country which you live in. Which of these is a NOT a "generation" of cellular Internet ser- vices? A. EV-DO D. ARP B. GPRS/EDGE C. HSPA+ D. ARP Which of these is a typical device hardening policy? A. Disabling passwords B. Patching B. Patching C. Using default passwords D. Using virus software A database administrator is looking to remove a table from a data- base using Data Definition Language (DDL) commands. Which of the following would achieve only this result? A. CREATE C. DROP B. ALTER TABLE C. DROP D. UPDATE Which best defines Access Control on a computing device? A. Using a computer lock to physically secure the device to a permanent structure. B. Installing mantraps and other physical security mechanism to D. Controlling who has the ability to use the device, or information prevent access. stored on the device. C. Requiring biometric access to enter the facility where the device is located. D. Controlling who has the ability to use the device, or information stored on the device. 4/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br Which of these is an Integrity concern? A. Man-in-the-middle B. Social engineering A. Man-in-the-middle C. Wiretapping D. Denial of service Which is an example of a Human Interface Device (HID)? A. A computer programmer uses a network connection to monitor transactions from an application. B. An administrative assistant uses a printer to print a five-page C. A customer uses a keyboard to enter a username and password report, formatted to print on both sides. into a shopping application. C. A customer uses a keyboard to enter a username and password into a shopping application. D. A teenager uses a high-resolution monitor attached to a PC for viewing movies and music videos. When does a new creation become "copyrighted"? A. Copyrights are put in place once the user files the appropriate paperwork. B. Creations are copyrighted immediately upon creation. B. Creations are copyrighted immediately upon creation. C. Copyright is obtained by mailing something to yourself. D. Copyright is granted when you create something similar to another creation. How does a search engine work? A. A search engine usually works by compiling a database of information about web pages. B. A search engine usually works by searching a web cache in A. A search engine usually works by compiling a database of real-time to get the most current results. information about web pages. C. A search engine accesses a collection of web pages and downloads them to your computer for viewing. D. A search engine usually works by compiling a group of web pages and bookmarking them in your local cache for quick access. What is used to prove a program was created by a trustworthy software publisher? A. Operating System (OS) B. Digital certificate B. Digital certificate C. Applications (or Apps) D. Web Applications USB and thumb drives are examples of which type of storage device? A. Hard drive B. Flash memory B. Flash memory C. Optical drive D. Solid state Which of these is an Availability concern? A. Destruction B. Replay A. Destruction C. Snooping D. Impersonation Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage? A. Accessibility C. Integrity B. Confidentiality C. Integrity D. Availability What is the physical address of a network interface called? A. IP address B. MAC address B. MAC address C. URL address D. Postal address 5/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br Of the following, which language is typically used with markup language? A. C++ B. CSS B. CSS C. C# D. COBOL What is the principle that grants users the rights necessary to perform their job and no more? A. Accounting B. Least privilege B. Least privilege C. Identification D. Authorization What is the purpose of Task Scheduler? A. Task Scheduler is used to schedule tasks to run at a specific time. B. Task Scheduler is used to open applications on demand. A. Task Scheduler is used to schedule tasks to run at a specific C. Task Scheduler is used to exit an application that is not re- time. sponding. D. Task Scheduler is used to schedule appointments in the Out- look Calendar. Which best defines ergonomics? A. Ergonomics is the process of completing the same task in a repetitive manner. B. Ergonomics is the study of factors affecting the performance of B. Ergonomics is the study of factors affecting the performance of people at work. people at work. C. Ergonomics is the ability for the mind to process data as quickly as the computer. D. Ergonomics is a strategy used to remain active when at work. Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server? A. HTTP C. IMAP B. ARP C. IMAP D. HID What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements? A. EM64T C. Kinetics B. Device manager C. Kinetics D. App How is open source code used by developers? A. It is code used by developers that they have the rights to modify without requiring permission to meet their project needs. B. It is unique code built from scratch by developers which must then be submitted and approved by a vendor prior to use in a live A. It is code used by developers that they have the rights to modify environment. without requiring permission to meet their project needs. C. It is code used by developers that must be paid for prior to use, and has restrictions in place in regards to modification. D. It is custom code modified by a developer to use in a project that is considered proprietary to a vendor and a license is required. In the area of workplace surveillance, what is monitoring data communications and employee's behavior called? A. Security assurance A. Security assurance B. Monitoring data C. Physical monitoring D. Eavesdropping/wiretapping In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information 6/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br more efficiently? A. Data Persistence B. Creation D. Queries C. Import D. Queries When considering application interaction, an example of pro- grammatic access can be best defined as what? A. A software application that can interact with a database either using SQL commands or using SQL commands stored as proce- dures in the database. A. A software application that can interact with a database either B. Administrators might use an administrative tool, such as php- using SQL commands or using SQL commands stored as proce- MyAdmin, to connect and sign in to an RDBMS dures in the database. C. An application might use a database "in the background" with- out the user really being aware of its presence. D. Providing a GUI for users to select actions to perform on the database, which then converts those selections to the SQL statements that will be executed. Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)? A. C. B. C. D. What do we call an online network where instead of a central server, each client contributes resources to the network? A. Peer-to-Peer A. Peer-to-Peer B. Smartsheet C. FTP D. Telnet Mobile devices detect the device's movement by using ac- celerometers and what other device? A. Gyroscopes A. Gyroscopes B. Stethoscope C. Oscilloscope D. Bathyscope What is the main purpose of the Power-On Self-Test (POST)? A. The computer performs a Power-On Self-Test (POST) to check that monitor display settings are correct. B. The computer performs a Power-On Self-Test (POST) to ensure C. The computer performs a Power-On Self-Test (POST) to check the printer powers up correctly. that the main components work and then loads the Operating C. The computer performs a Power-On Self-Test (POST) to check System. that the main components work and then loads the Operating System. D. The computer performs a Power-On Self-Test (POST) to check that the computer is plugged in and receiving power. With which method could an attacker use sniffing? A. Impersonation B. Destruction D. Eavesdropping C. Availability D. Eavesdropping What functionality can turn off a mobile device's Wi-Fi without shutting off the device? A. Airplane mode A. Airplane mode B. Screen lock C. Forget network D. HPSA+ Which of these is a Business Continuity concern? A. Fault tolerance A. Fault tolerance B. Data restoration 7/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br C. Restoring access D. Prioritization How can you modify your File Explorer options to allow you to view hidden files? A. Use the View tab under the File Explorer Options applet. B. Modify the properties of the File Explorer window by clicking on the Properties button. A. Use the View tab under the File Explorer Options applet. C. Select the hidden files in the File Explorer window, right-click, and select view. D. Use the Change Security and Maintenance Settings in the Control Panel. In an application's properties, which tab is useful for troubleshoot- ing as it will let you know whether you are running a version with the latest patches? A. Security C. Details B. Compatibility C. Details D. General Which best defines throughput rate of a device at any given time? A. The measurement of voltage being input into the power supply. B. The measurement of information stored on an external hard drive. C. The measurement of data transferred between computers over C. The measurement of data transferred between computers over a network. a network. D. The maximum amount of data allowed to be transferred over a network. You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed? A. If the printer is not a plug and play device, it does not require a driver. Just plug in the printer and connect it to the computer to complete the installation. D. Find and install the driver. Check first to see if it has been B. Use a driver that has already been installed on the computer. included with the printer. Otherwise, check the Windows Update A driver from any similar device should work. website. If it isn't there, check the vendor's website. C. Use the File Manager to write a new driver for the printer. Install the driver, then upload it to the Windows Update website. D. Find and install the driver. Check first to see if it has been included with the printer. Otherwise, check the Windows Update website. If it isn't there, check the vendor's website. Where does the Central Processing Unit (CPU) live in a comput- er? A. On the hard disk. B. On the motherboard. B. On the motherboard. C. On the network. D. On the back of the computer. Which of these is a Disaster Recovery concern? A. Contingency Planning B. Fault tolerance C. Prioritization C. Prioritization D. Network Redundancy What three elements are required for a computer to perform useful tasks? A. The hardware, software, and the computer's user. B. The computer, Central Processing unit (CPU), and Random A. The hardware, software, and the computer's user. Access Memory (RAM). C. The Hardware, monitor, and printer. D. A Mouse, keyboard, and the Central Processing Unit (CPU). Why would you virtualize an environment? A. To increase hardware redundancy across multiple physical 8/9 CompTIA IT Fundamentals Study Set Study online at https://quizlet.com/_axr5br workstations. B. To use hardware and software resources effectively, as well as potentially to save time and money. B. To use hardware and software resources effectively, as well as C. To allow remote access through a virtual private network (VPN) potentially to save time and money. for users. D. To implement cloud storage on a system. Which of these is NOT a form of malware? A. Spyware B. Virus D. Software C. Adware D. Software Which of these is a plain text file a website creates when a user visits it? A. Cookie A. Cookie B. URL C. UNC D. Donut Which Redundant Array of Independent Disks (RAID) has only striping with parity? A. RAID 1 C. RAID 5 B. RAID 10 C. RAID 5 D. RAID 6 Which is NOT an example of a Relational Database Management Systems (RDBMS)? A. Oracle Database B. Microsoft Office Excel B. Microsoft Office Excel C. Microsoft Office Access D. MySQL How does Plug-and-Play Installation work? A. A plug-and-play device can be plugged in and used immediately without requiring a device driver. B. When a new device is plugged in, a script plays to instruct the D. When a user connects a new device, Windows identifies it and user on the process of installing a device driver. attempts to install a new device driver. C. When a new device is plugged in, the user inserts/plays a CD on which drivers and instructions are provided. D. When a user connects a new device, Windows identifies it and attempts to install a new device driver. 9/9

Use Quizgecko on...
Browser
Browser