Overview Flashcards
A technician overhears a systems administrator mention the term IOPS
. To which of the following operating system functions would the term BEST apply?
A- Disk Management
B- Process Management
C- Application Management
D- Service Management
A-
The term “IOPS” (Input/Output Operations Per Second) is typically associated with disk management. It refers to the measurement of the number of input and output operations that a storage device (such as a hard disk drive or solid-state drive) can perform in one second. Understanding IOPS is essential for assessing the performance and efficiency of storage devices and ensuring that they can handle the required workload for specific applications and processes.
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
A- Array
B- Vector
C- List
D- String
A- Array
Container can be used as a term for a special type of identifier that can reference multiple values (or elements). One example of a container construct is a simple array. For example, say that you want your program to store a list of user names who have logged on to the computer in the last 24 hours. You would declare the array with the data type of the values it will contain and the number of elements or “rows” that the array can contain:
declare Logons(9) as string
One of the limitations of the array container type is that it cannot be resized. Most programming languages support container types called vectors that can grow or shrink in size as elements are added or removed
Which of the following would MOST likely use an ARM processor?
A- Tablet
B- Laptop
C- Workstation
D- Server
A- Tablet
ARM processors are commonly used in tablets and smartphones due to their power efficiency and suitability for mobile devices. They are designed to consume less energy while providing good performance, making them ideal for portable devices like tablets. Laptops, workstations, and servers, on the other hand, often use different types of processors, such as x86 processors, which are better suited for higher performance computing tasks.
Which of the following would indicate the FASTEST processor speed?
A- 3.6 GHz
B- 3.6 MHz
C- 3.6 Mbps
D- 3.6 Gbps
A- 3.6 GHz
Among the options provided, “3.6GHz” indicates the fastest processor speed. The unit “GHz” stands for gigahertz, which represents one billion cycles per second. Higher gigahertz values indicate a faster processor speed, meaning it can handle more instructions and computations in a given amount of time.
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A- Cable modem
B- Wireless Router
C- Access point
D- Network switch
B- Wireless router
A user is most likely to configure a wireless router to allow inbound connectivity for a gaming console’s chat functions on a home network. Wireless routers are equipped with Network Address Translation (NAT) capabilities, which allow devices connected to the local network to communicate with the internet while also providing a level of security by hiding their private IP addresses. By configuring the wireless router to allow inbound connections for the gaming console, the chat functions can work smoothly by allowing external communication to reach the console within the home network.
The computer language that is closest to machine code is:
A- query language
B- scripting language
C- markup language
D- assembly language
D- assembly language
Assembly language is the computer language that is closest to machine code. It is a low-level programming language that uses mnemonics and symbols to represent the individual machine instructions of a specific computer architecture. Each assembly language instruction directly corresponds to a machine instruction, making it easier for programmers to write code that interacts directly with the hardware and perform specific tasks at a low level. Although assembly language is more human-readable compared to machine code, it is still closely tied to the underlying hardware and provides a level of abstraction above machine code.
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
A- Record
B- Report
C- Column
D- Procedure
A- Record
In a database, all of an employee’s information is typically stored in a “record.” A record is a collection of related data fields that are grouped together to represent a single entity, in this case, an individual employee. Each record in the database would contain various data fields, such as the employee’s name, ID, position, department, and other relevant information.
Which of the following filesystems would a Linux computer MOST likely use?
A- HFS
B- NTFS
C- FAT32
D- ext4
D- ext4
A Linux computer would most likely use the ext4 (fourth extended filesystem) filesystem. ext4 is the default and widely used filesystem for Linux distributions. It is a journaling filesystem that provides improved performance, scalability, and reliability over its predecessor, ext3. It offers features suitable for modern Linux systems and is well-supported across various distributions, making it the preferred choice for most Linux installations.
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A- Local application
B- Intranet application
C- Extranet application
D- Internet application
B- Intranet application
An intranet application is a type of application that is accessible within a private network, typically within an organization or company. In this scenario, the employee portal is only accessible to employees when they are at work because it is hosted on the company’s intranet. It is not accessible from outside the company’s network, meaning employees cannot connect to it from home without a VPN (Virtual Private Network) connection.
Which of the following storage types is MOST vulnerable to magnetic damage?
A- Flash
B- Optical
C- SSD
D- HDD
D-HDD
HDD stands for Hard Disk Drive, and it is the storage type that is most vulnerable to magnetic damage. HDDs use magnetic storage to store data on spinning disks, and exposure to strong magnetic fields can corrupt or erase the data stored on them.
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
A- Method
B- Object
C- Property
D- Attribute
A- Method
In programming, a method is a block of code that defines a specific behavior or action that an object can perform. It encapsulates a sequence of instructions to carry out a particular task. In this case, when the developer creates a boss object with the ability to jump, they are defining a method that allows the boss object to execute the action of jumping within the game. This method would contain the necessary logic and instructions to make the boss object perform the jump action whenever it is triggered or called in the game’s code.
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
A- The light switches do no support WPA2
B- The router is operating on a different channel
C- The key does not meet password complexity requirements
D- The SSID in not being broadcasted
B- The router is operating on a different channel
When the administrator replaced the wireless router with a new device, it’s possible that the new router is set to operate on a different Wi-Fi channel than the old one. This change in the Wi-Fi channel could lead to communication issues between the light switches and the router, causing them to no longer communicate properly. Adjusting the new router to operate on the same channel as the old one should resolve this problem.
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A- Backups
B- Prioritization
C- Indexes
D- Failover
D- Failover
Failover is a technique used to increase database availability. It involves the automatic switching of operations to a redundant or standby system in case the primary system fails. This ensures continuity of service and minimizes downtime.
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A- Checking proxy settings
B- Checking the caching is enabled
C- Checking browser add-ons
D- Checking certificate validity
D- Checking certificate validity
Receiving a message that a website may not be secure and being prompted to click a link to continue is often related to an issue with the website’s SSL/TLS certificate. Checking the certificate validity would be the most likely step to identify and address the security concern in this situation.
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A- Antivirus
B- Anti-malware
C- Device manager
D- Host firewall
D- Host firewall
To verify that port 3389 is open for remote desktop on a PC, the user should check the host firewall settings. The host firewall controls incoming and outgoing network traffic on a computer, and it’s the most relevant place to check and configure port openings for services like Remote Desktop Protocol (RDP) on a Windows PC.
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
A- Replace the user’s display
B- Update the PC’s operating system
C- Replace the video cable
D- Install new video drivers
D- Install new video drivers
If the resolution on the display seems very low and the operating system is not allowing the user to adjust it higher after replacing the video card, the most likely solution is to install new video drivers. Sometimes, the default drivers provided by the operating system may not fully support the capabilities of the new video card. Installing updated drivers specific to the new video card can resolve this issue and provide the correct display resolution options.
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
A- Change the SSID
B- Change the default password
C- Change the WEP security
D- Create a guest network
D- Create a guest network
Creating a guest network segregates the corporate network and does not allow for guest devices to see the corporate resources
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
A- Private browsing is being used by some clients visiting the site
B- Client-side scripting has been deactivated on some clients visiting the site
C- Legacy browsers that do not support scripting are being used by some clients
D- Server-side scripting has been deactivated by the server administrator
B- Client-side scripting has been deactivated on some clients visiting the site
If the marketing department is receiving inconsistent values in a newly launched form, the most likely problem is that client-side scripting has been deactivated on some clients visiting the site. Client-side scripting, which is typically done using JavaScript, is responsible for handling form validation and interaction on the user’s device. If it is disabled, the form may not function correctly, leading to inconsistent results when users submit data.
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
A- Eavesdropping
B- Email service outage
C- Man-in-the-middle
D- Denial-of-service
C- Man-in-the-middle
man-in-the-middle attack can intercept the messages between two users, and inject new ones, in this case, the ones that don’t have the attachment.
Which of the following would allow an application to run automatically when a computer is started?
A- Processes
B- Drivers
C- Tasks
D- Journaling
E- Services
E- Services
Services are background processes that run automatically when a computer starts up. They are designed to perform various tasks and provide functionalities for the operating system and other applications without requiring user intervention. By configuring an application to run as a service, it will start automatically when the computer boots up.
An organization exports an inventory database nightly. This is an example of:
A- database query
B- database report
C- database backup
D- database import
C- database backup
The organization exports their inventory database nightly, which means they are creating a copy of the database to be stored separately from the main database. This copy serves as a backup, ensuring that in case of any data loss or corruption in the main database, they can restore the information from the exported copy.
Which of the following language types would a web developer MOST likely use to create a website?
A- Interpreted
B- Query
C- Compiled
D- Assembly
A- Interpreted
A web developer would MOST likely use an interpreted language to create a website.
An interpreted language is a programming language such as javascript, that is executed line-by-line by an interpreter at runtime, rather than being compiled into machine code beforehand. When a web developer writes code in an interpreted language, the code is translated and executed directly by the web browser or server as it is encountered, allowing for more immediate feedback during development.
Which of the following is the closest to machine language?
A- Scripted languages
B- Compiled languages
C- Query languages
D- Assembly languages
D- Assembly languages
Assembly language is the closest to machine language among the options provided.
Machine language is the lowest-level programming language that directly represents the instructions executed by a computer’s central processing unit (CPU). Machine language instructions are written in binary code, which consists of sequences of 1s and 0s representing specific CPU operations.
Assembly language is a low-level programming language that is closely related to machine language. It uses mnemonics and symbols to represent the individual machine language instructions. Each mnemonic corresponds to a specific machine language instruction, and the assembly code is eventually translated into machine code through an assembler.
A function is BEST used for enabling programs to:
A- hold a list of numbers
B- be divided into reusable components
C- define needed constant values
D- define variables to hold different values
B- be divided into reusable components
A function is BEST used for enabling programs to be divided into reusable components.
In programming, a function is a named block of code that performs a specific task or a set of related tasks. It allows programmers to break down a larger program into smaller, manageable, and reusable parts, known as functions. These functions can be called and executed whenever needed, reducing code duplication and improving the program’s organization and maintainability.