



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A collection of multiple-choice questions and answers related to computer fundamentals and networking concepts. It covers topics such as computer hardware, software, operating systems, networking technologies, data storage, security, and programming. The questions are designed to test understanding of basic it concepts and are suitable for individuals preparing for the testout certification exam.
Typology: Exams
1 / 6
This page cannot be seen from the preview
Don't miss anything!
Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose? - ✔✔Desktop Which type of digital picture can be scaled to any size without losing quality? - ✔✔vector Which of the following lists the basic computing and processing steps in order? - ✔✔Input, processing, output, and storage Which of the following is the correct binary representation of the number - ✔✔ 10 Which of the following encoding schemes would MOST likely be used to represent an emoji? - ✔✔unicode Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology? - ✔✔Establish a theory of probable cause Here is the troubleshooting methodology in order: - ✔✔1. Identify the problem
Julien, a programmer, was fixing a bug in the programming code written by another developer. He discovered that the code with the bug was repeated several times. Instead of fixing the bug in multiple places, which of the following programming features should he use so the code is only located in one place? - ✔✔Functions You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three secsesful login atempts - ✔✔Minimum password length Account lockout threshold What is the collective name for creations that are not the intellectual property of anybody? - ✔✔Public Domain A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use? - ✔✔Trademark An information system is made up of which of the following general components? - ✔✔Technology, people, and procedures Which of the following is NOT an example of an information system? - ✔✔Electrical system Which of the following is NOT one of the essential components of an information system? - ✔✔Hyperlinks A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following would represent the storage capacity of a modern hard disk drive (HDD) purchased from a computer store? - ✔✔3 Terabytes Which of the following devices would MOST likely have a 4G connection? - ✔✔Mobile phone
Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters? - ✔✔Network Architect Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored? - ✔✔In memory A developer wants to take existing code written by another person and add some features specific to their needs. Which of the following software licensing models allows them to make changes and publish their own version? - ✔✔Open-source You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. - ✔✔NFC chips Alberto works in human resources and wants to move all personnel files to a system that would provide a user interface for adding, updating, and removing personnel records. He also wants to ensure the data cannot be viewed without correct permissions. Which of the following would be the BEST option to store and retrieve this data? - ✔✔Database A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field? - ✔✔Primary key A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used? - ✔✔Branching