fundamentals Flashcards
(136 cards)
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A. Host-based firewall
B. Strong administrator password
C. Anti-malware software
D. Full disk encryption
full disk enecryption
In which of the following situations should there be an expectation of privacy?
A. Posting a comment on a friend’s social media page
B. Submitting personal information on a school enrollment site
C. Posting a comment on a video sharing site
D. Sending email and pictures to a close relative
Submitting personal information on a school enrollment site
Which of the following data types should a developer use when creating a variable to hold a postal code?
A. Integer
B. String
C. Float
D. Boolean
String
Which of the following is the closest to machine language?
A. Scripted languages
B. Compiled languages
C. Query languages
D. Assembly languages
Assembly languages
A function is BEST used for enabling programs to:
A. hold a list of numbers.
B. be divided into reusable components.
C. define needed constant values.
D. define variables to hold different values.
be divided into reusable components.
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A. 1001Kbps
B. 110Mbps
C. 1.22Gbps
D. 123Mbps
1.22Gbps
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A. 127.0.0.1
B. 172.16.2.189
C. 192.168.257.1
D. 255.255.255.0
172.16.2.189
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
A. Flat file
B. Word processor
C. Database
D. Network share
Database
A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. Which of the following statements
BEST represents what the x86.exe means in the installation file?
A. x86 only supports an installation on a 32-bit CPU architecture.
B. x86 supports an installation on a 32-bit and a 64-bit CPU architecture.
C. x86 only supports an installation on a 64-bit CPU architecture.
D. x86 supports an installation on a 16-bit CPU architecture.
x86 only supports an installation on a 32-bit CPU architecture.
Which of the following would be used to send messages using the SMTP protocol?
A. Document sharing software
B. Instant messaging software
C. Conferencing software
D. Email software
Email software
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A. Turn on private browsing
B. Delete browsing history on program close.
C. Notify when downloads are complete.
D. Configure prompting before downloading content.
Configure prompting before downloading content.
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A. Customer date of birth
B. The first and last name of the Chief Executive Officer (CEO)
C. Customer service number
D. Company social media screen name
Customer date of birth
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A. Database software
B. Word processing software
C. Conferencing software
D. Presentation software
Database software
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A. Renew the IP address.
B. Configure the browser proxy settings.
C. Clear the browser cache.
D. Disable the pop-up blocker
Configure the browser proxy settings.
Which of the following is primarily a confidentiality concern?
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Eavesdropping
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
Copyright
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A. Check Knowledge Base.
B. Search local logs.
C. Research possible theories.
D. Question users.
Check Knowledge Base
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
A. Output
B. Storage
C. Input
D. Processing
Input
Which of the following allows wireless devices to communicate to a wired network?
A. Modem
B. Switch
C. Firewall
D. Access point
Access point
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
A. Laptop
B. Workstation
C. Mobile phone
D. Server
Server
For which of the following is a relational database management system MOST commonly used?
A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams
Storing information
Which of the following BEST describes an application running on a typical operating system?
A. Process
B. Thread
C. Function
D. Task
Process
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.
Ensure sources of EMI are removed.
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
A. Establish a plan of action.
B. Gather information
C. Duplicate the problem.
D. Find the root cause.
Duplicate the problem.