1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the best reason to use a flat file instead of a database?
To exchange information between systems
Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?
USB 3.0
Which of the following poses a higher risk to ensuring business continuity?
A converged network
In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?
The number of rows
Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?
One-time purchases do not include full-feature upgrades.
What's a true statement about variables?
A variable can have any data type that the programming language supports.
An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?
HDMI
What is the easiest way to install a standard mouse, and configure it to use basic settings?
Use Control Panel/Settings.
A programmer's task is to analyze a colleague's pseudocode and make it better. What will the programmer try to do?
Make it more compact and efficient.
Which of the following encrypts data at rest?
File-level encryption
What is the advantage of DAS (Direct Attached Storage) over NAS (Network Attached Storage)?
DAS is less expensive.
What is an example of "processing" in a computer system?
Data is written to memory and manipulated by the CPU.
Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?
Internet
An office building is using a Wi-Fi access point. The computer used to configure the access point's device options is located on the other side of the building. What does a technician need to make it work?
IP address of the web configuration page
What is a downside to digital products?
Digital products are easy to copy and steal.
Which statement holds true about a desktop/workstation when comparing it to a server?
Servers use the same type of components as a desktop.
What storage technology do SSDs (Solid State Drives) use?
Flash memory
Why would a programmer create a function instead of a procedure?
The process which calls the function needs to receive back a return value.
What is a true statement about interpreters and interpreted programming languages?
An interpreter converts the program into machine code at runtime.
What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system?
5120 MB
A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under?
Process management
What is an example of a cloud hosted application?
Google mail
When using web search engines, why should privacy considerations affect a user's decisions?
A user's web searches can reveal very valuable information.
The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant's desktop computer?
One-tier
A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?
User interface and programmatic access
What is a clean uninstall of a program?
Removing files and settings manually
Which of the following does NOT encrypt web page data?
Mobile device encryption
Why would a locally installed application store data files in a user folder and not the application folder?
To prevent users from modifying application folders
Which notation is a more efficient method to express large numbers?
Hexadecimal
Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)?
Requiring a fob
What problem is Windows' UAC (User Account Control) designed to solve?
Elevated privileges
How do the CPU (Central Processing Unit) and storage devices in a computer process data?
As zeros and ones
A user wants the easiest and most secure way to prevent websites from discovering the IP (Internet Protocol) address of the computer. What should the user do?
Use a Virtual Private Network.
What is a proper example of a string definition?
"It is polite to say \"Thank you\""
In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?
Table
What do the instructions in this pseudocode do?
declare Animal(9) as String
For i = 0 to 9
If i > 5 Then
Animal(i) = "dog"
Else
Animal(i) = "cat"
End If
Next
Set the first 6 elements of the array Animal to "cat", and the rest to "dog".
What is the second step in CompTIA's troubleshooting model?
Research knowledge base/Internet, if applicable.
Which of these practices is unsecure as your security becomes dependent on other organizations' security measures?
Reusing across sites
Why is it important to write data to a storage device, such as a hard disk?
Data stored in system memory is only preserved while the computer is powered on.
Convert the decimal number 35 into binary notation.
100011
Which of the following measures their data transfer capacity in Mbps (megabits per second)?
Wireless networks
Which document contains the information about how the software vendor will use any data that the software gathers and processes?
Software agreement
What indicates that a website has a highly trusted certificate?
Green padlock icon in front of address bar
What is the term for the processing speed of 1 billion cycles per second?
GHz
What does bps measure?
Throughput rate
A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database?
Create a table called Customers, with fields called Name, Address, Phone, and Email.
How much storage does a character data type use?
1 byte
Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?
DROP
A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customers' purchases in this database?
Create 2 new tables: Products and Purchases.
What is true about firewalls?
A firewall provides a way to restrict access to a computer or network.
A user's Windows 8 laptop has the latest version of the Safari browser. The user tries to use a web application and receives a message that the browser does not support all features. What is the best course of action?
Install the browser which is fully supported by the application.
A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?
Concurrent license
Which of the following is the best example of variety of data in a database?
A table with a string, number, and date fields
What type of language has working with datasets as its primary purpose?
Query
Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?
NFC
What is the difference between a software product key and a product ID?
The product key activates the software, and the product ID is for technical support.
A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?
Write a company policy and procedure for escorting visitors.
Which of the following ways best defeats social engineering?
Training end-users how to identify and report suspicious activity on the network or workstation
What is an authorization policy that would help a systems administrator grant rights to users to perform their job and no more?
Least privilege
What does a programmer use to visualize a program sequence?
Flow chart
When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?
Password managers
An employer fires an end-user for hijacking another employee's user account. Which of the following does NOT provide non-repudiation to the employer?
A guest user account
What's the difference between scripted and scripting languages?
Scripting languages are for configuring an operating system.
declare MinutesPerHour as Number = 60
A constant
Which of the following authentication factors is an example of something you have?
A software token
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record.
How can a user belong to a group account and inherit security permissions in a workgroup?
Through privileges allocated to the groups
What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?
800
What is the main cause of memory leaks?
Programming errors
Which protocol supports interactive mechanisms GET and POST?
HTTP
Which of the following helps protect against dangerous unsolicited email file attachment threats?
Using anti-malware
A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?
The enclosure provides ports to connect the drive to the computer.
What is the difference between DropBox and OneDrive?
OneDrive is built into the Windows OS.
Why would a business choose satellite service instead of DSL (Digital Subscriber Line)?
Satellite systems provide bigger areas of coverage.
Which of the following is NOT part of IoT (Internet of Things) home automation?
Insulin pump