Practice Test 1 Flashcards
What’s a true statement about the assembly language?
Each assembly language can run on any platform
Assembly languages are not programming languages
Assembly code is not human-readable
Only specialists use assembly code
An assembly language is any low-level programming language in which there is a very strong correspondence between the program’s statements and the architecture’s machine code instructions. Assembly code is very difficult to follow and is only really used by specialists trying to solve a very particular problem with an application.
The assembly language represents machine code in human-readable text.
Assembly languages are the first generation of programming languages. They rate at slightly higher level than machine code.
An assembly language is typically specific to a particular hardware architecture. Different assembly languages can run on different platforms.
What is an advantage of using a CLI (Command Line Interface) instead of GUI (Graphical User Interface)?
More people use CLI, so there is more help available
Non-technical users can learn how to use CLI faster than GUI
With CLI, it is easier to multitask when working on different things at once
CLI takes up less system resources to run
Running CLI takes a lot less of the computer’s system resources than a GUI, which needs to load things like icons, fonts, and additional drivers for components such as video and a mouse.
CLI requires a lot of knowledge and memorization to operate and navigate around it, making the learning curve a lot steeper than visually intuitive GUI.
Being more user friendly than a command line, especially for new or novice users, a GUI is used by more users.
Command line environments are capable of multitasking, but they do not offer the same ease and ability to view multiple things on one screen. GUI users have windows that enable users to view and control multiple programs and folders at once.
Which device is likely to use ARM(Advanced RISK Machine) CPU?
IBM PC
Laptop
Tablet
iMac
Chipsets for mobile phones/smartphones and tablets are often based on the ARM microarchitecture. RISC stands for Reduced Instruction Set Computing. RISC microarchitectures use simple instructions processed very quickly, which is not sufficient for larger devices.
Most laptops today are powered by an Intel CPU, though there are several models that use AMD processors. Intel’s flagship CPU series is Core, whose earliest models (Core Solo and Core Duo) were laptop-only chips.
IBM PCs require “IBM compatible” CPUs, which are defined by having compatibility with the basic x86 instruction set.
iMac is the Intel-based family of Macintosh desktop computers designed, manufactured, and sold by Apple Inc., and use Intel’s i-series CPUs.
What is the end result of the iterative process of establishing and testing a theory while troubleshooting?
Identify the person resposible for creating the problem
Establish a root cause for the problem
Resolve the problem
Ensure that the problem is never repeated
The end result of the iterative process of establishing and testing a theory (establish a theory, test it, if it doesn’t work, establish another theory) is to establish a root cause for the problem.
The iterative process of establishing and testing a theory is the combination of Steps 3 and 4 of CompTIA’s troubleshooting model. Resolving the problem is part of Step 6: implement the solution or escalate as necessary.
Ensuring that the problem is never repeated is part of Step 7: verify full system functionality and, if applicable, implement preventive measures.
Many technical problems are not caused by a specific person, but by events and circumstances, such as power or equipment failure, hardware or software malfunction, etc.`
What type of language has working with datasets as its primary purpose?
Querry
Compiled
Markup
Assembly
Code written in a query language, such as SQL (Structured Query Language), is designed to retrieve specific records from a dataset.
An assembly language is any low-level programming language, designed to perform many functions.
A markup language is a means of making data in a document accessible to a program, via a series of nested tags that describe the structure and/or meaning of the tag contents. A markup document represents a dataset, and the program that reads it is the one that works with it.
Compiled languages can perform any programming task, including working with datasets, usually via a markup document or embedded queries. That is a small part of their designed functionality.
Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?
NFC
NID
NAS
NIC
Near Field Communications (NFC) is a peer-to-peer version of RFID; that is, an NFC device can work as both tag and reader to exchange information with other NFC devices.
Network Interface Card (NIC) provides the Ethernet port in the computer to connect it to a network.
A Network Attached Storage (NAS) appliance is one or more hard drives housed in an enclosure with basic server firmware, usually running some form of Linux.
Network Interface Device (NID) is a device that serves as the demarcation point between the carrier’s local loop and the customer’s on-premises wiring.
The information layer of data analytics requires software to perform which function?
Data correlation
Data collection
Data storage
Meaningful reporting
-Data Correlation-Data analytics (relationship of data to information) can be thought of in terms of data, information, and insights layers. The information layer requires software to perform data correlation, which means analyzing the whole data set and finding connections and links between data points.
The data layer is the raw values collected by the system, with the help of data capture and collection functions.
As well as collecting the data, it must be stored and secured, which is where data storage comes in.
To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret. This is done through meaningful reporting.
An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee’s personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?
Identify checks
Identity theft
Mishandling personally identifiable information (PII)
Identity fraud
Rigorous identity checks when setting up a new account can help mitigate masquerading, which involves subverting the account creation process.
The rise in consciousness of identity theft as a serious crime is growing. Identity theft is using Personally Identifiable Information (PII) to impersonate an individual.
Staff should be trained to identify PII and to handle personal or sensitive data appropriately, and process Personally Identifiable Information (PII) more sensitively and securely.
Identity fraud can either mean compromising someone’s computer account or masquerading as that person. Strong authentication makes this type of attack much more difficult to perform.
Why are USB (Universal Serial Bus) thumb drives non-volatile?
They are easy to connect to the computer
They retain data without power
They can be inserted and removed while the computer is powered on
They are very small and light
Volatile means that data is only retained in the memory chips while there is a power source, and non-volatile means that it retains data without power. USB thumb drive is a removable flash memory device, and removable flash memory devices do not need power to retain information.
Inserting and removing a device without turning off the computer is not a condition of non-volatility.
The degree of difficulty of connecting to the computer is not a condition of non-volatility.
The size and weight of a device is not related to volatility.
Convert the binary number 1000000 into decimal notation.
64
40
32
128
A quick way to calculate a binary number which consists of a 1 with the rest being 0’s is to count the number of 0’s, and then calculate 2 to the power of that number. In this case, there are six 0’s, and 2 to the power of 6 = 64.
If the task was to convert 1000000 into hexadecimal notation, the answer would be 40.
If this example had one less 0, i.e., 100000, then the answer would be 32.
If this example had one more 0, i.e., 10000000, then the answer would be 128.
What kind of computer firmware provides support for mouse operation at boot?
UEFI
BIOS
DOS
CMOS
Newer motherboards use UEFI (Unified Extensible Firmware Interface), a firmware which provides support for 64-bit CPU operation at boot, as well as a full GUI and mouse operation at boot.
BIOS (Basic Input/Output System) is firmware which provides industry standard program code to get the essential components of the PC running. It does not provide support for mouse operation at boot.
CMOS (Complementary Metal-Oxide Semiconductor) is a semiconductor chip inside computers that stores information, such as the system time and date, but is now obsolete.
DOS (Disk Operating System) is not firmware; it is an operating system that runs from a hard disk drive.
An attacker used hosts compromised with bot malware to launch a coordinated attack against a web service to overload it. Which of the following is the active attack threatening web service availability to your users?
Destruction
Impersonation
Denial of Service (DoS)
Replay
Denial of Service (DoS) is where an attacker targets the availability of a service. A DoS attack might tamper with a system or overload it. A Distributed Denial of Service (DDoS) uses hosts compromised with bot malware to launch a coordinated attack against a web service.
To prevent physical destruction of devices, you can put your servers in a physically secure room and control access to that room.
Replay is an integrity concern where a host captures another host’s response to some server and replays that response in an effort to gain unauthorized access.
Impersonation is an integrity concern where a person will attempt to figure out a password or other credentials to gain access to a host.
What is the main purpose of NIC (Network Interface Card) expansion card?
To replace the outdated NIC on the motherboard
To serva as a faster alternative to the onboard NIC
To provide additional NICs to servers on a wired business network
To allow workstation comptuers to connect to the network
Network Interface Card (NIC) provides the Ethernet port in the computer. Servers with a NIC on the motherboard (onboard card) may have additional NICs supplied on expansion (or add-on) cards.
Almost all workstation computers come with a NIC on the motherboard, allowing for Ethernet connection to the network.
An outdated NIC on the motherboard is not a frequent occurrence.
Both onboard cards and expansion cards operate in the same manner using the same protocols and cable ports. NICs come in many different forms and speeds, but both types come in equal speeds.
What is an advantage of the float data type compared to the integer data type?
The float data type is not limited to whole numbers
The float data type is a more natural way of expressing numbers in computing systems
The float data type requries less processing time for arithmetic operations
The float data type consumes less storage.
The float data type can support decimal fractions, as opposed to integers which are whole numbers.
The float data type does not consume less storage than an integer. An integer data type consumes 1 to 8 bytes of computer storage, while a float consumes between 4 and 8 bytes of storage.
Floating-point operations are slower than integer operations of the same data size, requiring more processing time for arithmetic operations.
An integer exists inside the computer as a true binary value, while a floating-point number needs additional steps to be expressed in binary format for the computer to accurately store its value.
The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant’s desktop computer?
Three Tier
Two tier
One tier
N Tier
If the application front-end, processing logic, and the database engine are hosted on the same computer, the application architecture is described as one-tier or standalone. The accountant’s desktop computer hosts both back-end and front-end layers, making it a standalone application.
A two-tier client-server application separates the database engine, or backend/data layer, from the presentation and application layers. If this system used a remote server to host the data, then it would be a two-tier application.
In a three-tier application, the presentation and application layers are also split, making the entire system more complex.
An n-tier application architecture can be used to mean either a two-tier or three-tier application, or an application with more complex architecture, like having separate access control.
Why is data persistence an important consideration when using a database with an application?
Applications need a way to prevent the loss of information after they terminate
Applications need a way to communicate with a database
Applications need a way to view the data in a variety of formats
Applications need a way to limit users access to some of the data
When an application terminates, it loses the internal variables and other temporary data that it used during processing. A database represents a way for an application to store data persistently and securely.
Applications communicate with databases with the help of a database connection such as ODBC (Open Database Connectivity) or ADO (ActiveX Data Objects).
Applications limit users’ access to the data through security controls such as log-in screens. Databases limit users’ access to the data through tools such as ACL (Access Control Lists).
Applications view data in a variety of formats using queries and reports.
What is a key difference between copyright and a patent?
Patents are registered for a limited time only, but copyright protection is permanent.
Copyright protection happens automatically, but a patent must be applied for and registered.
Copyright is valid for a limited time only, but a patent is granted on a permanent basis
Patents are granted automatically, but a copyright must be applied for and registered
Copyright is automatic legal protection granted to certain types of work. There is no need to apply for copyright or display any copyright notice in order to be protected by it. The creation of the work ensures copyright protection automatically.
A patent must be applied for and registered because there is no automatic protection, as there is for copyright.
Patents are registered for a limited time only.
Copyright lasts for a number of years after the owner’s death. The exact length of time varies between 15 and 70 years depending on the nature of the work. After this time, provided the copyright has not been extended for some reason, the work becomes public domain and may be used freely.
What problem is Windows’ UAC (User Account Control) designed to solve?
Elevated privileges
Inadequate account authentication
Too many guest accounts
Too many administrative accounts
“Least privilege” means that users receive permissions required to perform tasks and no more. Early versions of Windows led to the problem of “elevated privileges”, where all users were given administrative privileges, as otherwise it was difficult to perform typical administrative tasks. UAC was created to solve this problem.
The “Guest” account, used in Windows 7 and 8.1, is a standard, local user account, with very limited permissions. There is typically one such account, but having many of them is not a problem.
UAC enables users to perform common tasks as non-administrators and as administrators without having to switch users. The number of administrative accounts is not relevant to this feature.
Inadequate account authentication is not part of UAC functionality.
An essential part of troubleshooting is to establish a plan of action to eliminate the root cause without destabilizing some other part of the system. What needs to be in the plan of action?
Details outlining every occurrence of the problem.
Recommendations for a workaround
Steps required to implement the solution
Cost analysis of resolving the problem vs. ignoring it
A plan of action should contain the detailed steps and resources required to implement the solution.
In most situations, it is not necessary to provide details outlining every occurrence of the problem, as part of the troubleshooting process. If such details are required, they are not part of the plan of action.
There are typically three solutions to any problem: repair, replace, or ignore. The decision as to whether or not repairing or replacing is cost-effective does not necessarily involve a cost analysis, but a simple judgement call.
If the solution to the problem is to ignore it, then it may help to have recommendations for a workaround.
Which of the following uses MHz (Megahertz) to measure their speed?
Modern computer processors
Bluetooth
Wireless technologies
Older PC bus interfaces
MHz stands for Megahertz, which is 1 million (1,000,000) cycles per second. Older PC bus interfaces work at this slower signaling speed.
Modern computer processors work at much faster speeds of at least 1 GHz (Gigahertz) which is 1 billion (1,000,000,000) cycles per second. The first 1 GHz processors for consumer computers were released in the year 2000.
Wi-Fi (wireless networking) most commonly uses the 2.4 GHz and 5 GHz radio frequencies to provide wireless high-speed Internet and network connections.
To communicate between devices, Bluetooth sends signals over a 2.4 GHz radio frequency.
For enterprise networks with very large amounts of data to backup, which is best to implement?
Tape drives
Use of personally owned devices
Cloud storage only
Peer-to-peer (P2P) network
Enterprise networks with large amounts of data to backup may use more specialized media, such as tape drives.
An online Peer-to-Peer (P2P) network is one where, instead of a central server, each client contributes resources to the network. Most companies discourage use of P2P file sharing software on corporate networks.
Portable devices (e.g., smartphones, USB sticks, and media players) pose a threat to data security; they facilitate file copying. Some companies try to prevent staff from bringing such devices.
It is a good idea to use a combination of backup storage methods for on-site and off-site backups. You could back up often to locally attached storage or network-attached storage (NAS) and then copy backups to a cloud storage off-site.
What is available in software installer packages to select specific feature sets or modules within the software package?
Add-ons and plugins
Additional features
Advanced installation
Advanced Options
Most software installer packages offer a choice between a default installation and a custom (or advanced options) installation. A custom installation allows the user to choose specific settings, such as where to install the software and what icons or startup/autorun options to configure, as well as the selection of specific feature sets or modules within the software package.
Advanced installation can refer to an installation using advanced options, although it is not a widely used term.
Additional features may be part of the advanced options during software installation.
Add-ons and plugins are software components that add a specific feature to an existing computer program. They may be part of the advanced options during installation.
Which is a true statement about a GPU (Graphics Processing Unit)?
GPU uses analog signals
GPU works with the CPU to handle complex high-resolution images
GPU must be on its own graphics card
Computers used primarily for gaming require a GPU in place of a CPU
The GPU is a dedicated processor for display functions. It works with the CPU to handle complex high-resolution images.
Every computer needs a CPU. While the GPU can perform some functions that the CPU cannot, the GPU does not replace the CPU.
CPUs are located on the motherboard in a special mount. GPUs may be part of the CPU or come on a plug-in expansion card.
Early GPUs generated analog signals for Cathode Ray Tube (CRT) monitors but plugged into the motherboard and communicated with the CPU using digital signals.
CompTIA’s troubleshooting model includes having to establish a theory of probable cause. What is one of the components of this step?
Question the internet
Question users
Question the obvious
Question the theory of probable cause
Step 3 in CompTIA’s troubleshooting model is to establish a theory of probable cause. Its three components are: question the obvious, consider multiple approaches, and divide and conquer.
Step 1 in CompTIA’s troubleshooting model is to identify the problem. One of the six components of this step is to question users.
Step 2 in CompTIA’s troubleshooting model is to research knowledge base/Internet, if applicable.
Step 4 in CompTIA’s troubleshooting model is to test the theory to determine cause. Steps 3 and 4 form an iterative process of establishing and testing a theory until something works.
Hello World!
Hello World!
Hello World!
Hello World!
Hello World!
" is properly nested. Nesting code is the process of organizing code based on the proper order defined by HTML standards. For this example, the is considers a block-level element, and the , which is used to emphasize text, is considered a text-level element. Text-level elements must both open and close within the block-level elements. Although failing to do so may not prevent the code from appearing to execute properly, it will fail validation when checking for errors and warnings. "Hello World!
" has a block-level element nested within a text-level element, which is improper syntax. "Hello World!
" has a block-level element over-nesting a text-level element, which is improper syntax and may create a validation error. "Hello World!
" has a block-level element over-nesting a text-level element, which is improper syntax. It is does not properly close the tags, which would create a validation error.
Hello World
Say hello back to CompTIA!
Hello World
Say hello back to CompTIA!
Hello World<\h1>
Say hello back to CompTIA<\a>!<\p> <\body> <\html>
Say hello back to CompTIA<\a>!<\p><\h1> <\body> <\html>
Hello World
Hello World
",is the opening tag,
is the closing tag, and the content between them is displayed using a pre-defined format that corresponds to the tag. In HTML5, tags must be properly nested, meaning that each inside tag must be closed before an outer one is. In this example, the tag is inside thetag, and needs to be closed first. Improperly nested tags will display in browsers, but might produce unexpected results and/or errors. In HTML5, closing tags use forward slashes, not backward slashes. Instead of <\body>, the correct closing tag for
is . In addition to the backward slashes not being the correct closing tags, having thetag close after the
tag will result in the entire content being formatted as a heading, which is not the likely intention of this piece of code.
tag indicates the content is a paragraph-level block. These are typically used for general text on a web page, and do not have any special formatting unless specified otherwise through CSS3. The
tag indicates that the content is a heading level. This is considered the most important heading title of a web page. There are a total of 6 heading tags (H1- H6).
tag indicates that the content is a paragraph block-level element. These are typically used for general text on a web page, and do not have any special formatting unless specified otherwise through CSS3. The
tag indicates that the content is a heading level. This is considered the most important heading title of a web page. There are a total of 6 heading tags (H1 to H6).
tag do?
The tag indicates that the content is a heading level.
The tag is the top-level parent element identifies the type of document.
The tag indicates the content is a paragraph-level block.
The tag indicates that the content links to another resource.
tag is the top-level parent element identifies the type of document.
The tag indicates the content is a paragraph-level block.
The tag indicates that the content links to another resource.
tag indicates that the content links to another resource.
tag indicates that the content is a heading level. This is considered the most important heading title of a web page. There are a total of six heading tags (H1- H6). The tag is the top-level parent element identifies the type of document. This tag is required for an HTML page to execute properly and identify the coding standard being used as multiple variations exist. The
tag indicates the content is a paragraph block-level element. These are typically used for general text on a webpage, and do not have any special formatting unless specified otherwise through CSS3. The tag indicates that the content links to another resource. These are known as anchor tags and are used to represent in internal page link, or to link with an external page.
tag do? The
tag indicates the content is a paragraph-level block. The
tag is the top-level parent element identifies the type of document. The
tag indicates that the content links to another resource. The
tag indicates that the content is a heading level.
tag indicates the content is a paragraph block-level element. These are typically used for general text on a webpage, and do not have any special formatting unless specified otherwise through CSS3.
The tag is the top-level parent element identifies the type of document. This tag is required for an HTML page to execute properly and identify the coding standard being used as multiple variations exist.
The tag indicates that the content links to another resource. These are known as anchor tags and are used to represent in internal page link, or to link with an external page.
The tag indicates that the content is a heading level. This is considered the most important heading title of a webpage, there are a total of six heading tags (H1- H6).