You are on page 1of 54

Question Answer Option 1 Answer Option 2

Chapter 1 - How People Use Computers


Technology
Knowing computers are all around us and how they work is known as... Computer Science
Information
Typing, Input,
calculating, processing,
What are the four stages of the computing process?
speaking, and output and
saving storage

How does the device show you that it has responded to your
Input Processing
processing request?

The ability to add applications (apps) to a general computing device


Functionality Value
increases its...

What term describes a group of computers or other network devices in


the same location that can communicate with one another? WAN PC

Servers that allow applications which are not installed on the local Online
machine to be accessed by local users are called... applications LANs

Which of the following is NOT a specialized computing device? Thermostat Printer


Answer Option 3 Answer Option 4 Correct

Techno-babble Computer Literacy 4

Powering on device,
Input, number
requesting information,
crunching, output and 2
receiving information and
printing
  powering down device

Output Storage 3

Entertainment value Complexity 1

LAN Switch 3

Remotely-accessed
The Internet computer systems 4

iPhone Point-of-sale terminal 3


Explanation

Given that our society is surrounded by all types of computing devices, computer literacy is a valuable
skill.

Input, processing, output, and storage are the only four stages of the computing process.

The correct answer is Output. Output is what shows up on the screen after you have input a request
and the device has processed that request. Input is what goes into the computer before processing.
Processing happens inside the computer to create the output and Storage happens after the output is
generated.

The correct answer is Functionality. Increasing the functionality allows the general-purpose computing
device to be more useful and personal to the user. Adding apps to a computer does increase value but
this is not the best answer. Not all apps provide entertainment. Some apps make the device simpler to
use, not more complex.

A LAN is a group of computers or network devices in the same location that can communicate with
each other. A WAN is two or more LANs connected together. A PC is usually a part of a LAN, and a
switch is used to connect computers together to create a LAN.
Online applications reside on the remotely-accessed computer systems. A LAN or the Internet is the
path to reach remotely-accessed computer systems.
The iPhone is a general purpose device where apps can be added. For the most part, additional
functionality cannot be added to specialized computing devices.
Question Answer Option 1 Answer Option 2
Chapter 2 - System Hardware
How is a CPU’s speed measured? Gigahertz Cache

Which of the following does passive cooling use? CPU fan Liquid cooling

The amount of usable RAM in a computer is called: Dynamic RAM RAM rods

The electric grid of the United States runs on: Direct current The Force

Computing devices run on: AC DC


Answer Option 3 Answer Option 4 Correct Response

CPU units Bits 1

Heat sink Case fan 3

Dual inline
System memory 3
memory modules

Electro-resistant
Alternating current 4
power

Static electricity
AC/DC from cat fur 2
Explanation

A computer’s speed is measured in gigahertz, or billions of cycles per second. Cache refers to a computer’s
memory, and bits describe the amount of data a CPU can process.

The correct answer C. Passive cooling most often uses a heat sink attached to a chip to wick the heat away.
CPU and case fans are used in active cooling, where an electrically powered part mechanically pushes or
pulls heat away from a chip. Liquid cooling uses a series of liquid filled tubes to carry the heat away.

The correct answer C. System memory, also known as system RAM, is the memory used by the computer
as a whole. Dual inline memory modules (DIMMs) describe the actual long, thin sticks of RAM that are
inserted in a desktop PC’s motherboard.

The correct answer D. The United States’ power grid runs off alternating current (AC). This is why computer
components, which run off of direct current (DC), require some kind of power supply to convert AC to DC.

The correct answer is B. Computing devices run on direct current (DC), and the United States’ power grid
run on alternating current (AC), which is why computing devices use a power supply to convert AC to DC.
Question Answer Option 1
Chapter 3 - Device Ports and Peripherals

Which of the following is both an input AND output device? Keyboard

What are peripherals such as printers, joysticks, and POS systems


Specialty I/O devices
called?

Very old mice and keyboards are connected to a PC by which type


USB
of connector?
Answer Option 2 Answer Option 3 Answer Option 4 Correct

Monitor Touchscreen Mouse 3

Output devices Input devices Toys 1

VGA HDMI PS/2 4


Explanation

The correct answer is Touchscreen. It is an input device because of the touch


function and an output device because of the screen monitor. A keyboard and
mouse are solely input devices, and the monitor in only an output device.
The correct answer Specialty I/O devices. They are designed for special
uses..Output devices and input devices are the generic terms, and though a
joystick might be considered a toy; a POS device certainly is not.
The correct answer PS/2. USB connector is used with newer peripheral devices.
VGA connects older monitors, and HDMI is a type of video connector.
Question Answer Option 1 Answer Option 2
Chapter 4 - Data Storage and Sharing
Manufacturer &
In what two ways are hard drives categorized? Color & Size
Speed
When you turn off your PC the data stored on the
1 0
hard drive will disappear.
How many bits make up a byte? 8 16
Network Attached
What type of storage plugs directly into your PC? Mass Storage
Storage

Which of the following is an example of a cloud


Hard drive SSD
storage solution?
Answer Option 3 Answer Option 4 Correct Response

Capacity & Speed Size & Capability 3

4
64 1024 1
Local Direct
Cloud Storage 4
Storage

Dropbox Optical Drive 3


Explanation

Hard drives are described as how much data they can store (capacity) and how fast the data can be
accessed (speed).
The data stored in RAM disappears when the PC is shut down. Data saved onto a hard drive remains intact
until the data is deleted or the drive fails.
Eight bits equal one byte.
The correct answer Local Direct Storage. Mass storage includes all different types of storage. Network
attached storage is storage accessed via a network, and cloud storage is accessed through the internet.
The correct answer Dropbox. Dropbox is a company that provides a cloud storage and sharing solution.
Hard drives are connected directly to a PC, either internally or externally. A SSD is a type of hard drive, and
an optical drive is also connected directly to a PC.
Question Answer Option 1 Answer Option 2
Chapter 5 - Understanding Operating Systems
What does every computing device have? Spam filter Virus

Which of the following is one of the four features ALL operating


Email User interface
systems offer?

What is the default browser that comes with Windows 10? Microsoft Edge Internet Explorer

The bar at the bottom of the screen in the Mac OS is called. Taskbar Icon hub

Where can you find what version of Windows is running on a


Desktop System applet
computer?

What type of machine do you have if you can run both Mac OS
Special New
and Windows OS on the same computer?
Answer Option 3 Answer Option 4 Correct Response

Games Operating system 4

Games Solitaire 2

Safari Firefox 1

Dock Desktop 3

Devices and
Documents 2
printers

Gaming Dual-boot 4
Explanation

The correct answer operating system. Without an OS the computing device can’t run any
software or other programs. The other choices run on top of the operating system.
All operating systems have a user interface, or a way for the user to interact with the operating
system. The remaining choices are applications or services.
Windows 10 uses Microsoft Edge as its default browser. Internet Explorer was the primary
browser in previous versions of Windows. Safari is mainly used on Apple devices, and Firefox is
a third-party browser.

The correct answer is Dock. Taskbar and desktop are Windows terms and Icon hub is made up.

The correct answer is System applet. Desktop is where files, folders and shortcuts to files and
programs can be seen. Devices and printers is where you can see which printers are available
for use, and documents is where files you create can be stored.
The correct answer is Dual-boot. Dual-boot means you can boot either into Windows or into
Mac OS.
Question Answer Option 1 Answer Option 2
Chapter 6 - Setting Up and Configuring a PC
What is the baseline temperature and humidity settings for 68 degrees / 20% 75 degrees / 65%
optimum computing? humidity humidity
How far should a monitor be away from the user? 8 to 16 inches 16 to 24 inches
Find all the right
What is the first step in setting up a desktop PC? Turning it on
software
What is the first thing you should do once the PC is connected Run Windows Watch YouTube
to the internet? Update videos

According to the CompTIA IT Fundamentals exam what should Go to Netflix and


Set up email
your next step be after running Windows update? watch a movie
Answer Option 3 Answer Option 4 Correct Response

80 degrees / 80% 72 degrees / 50%


4
humidity humidity
24 to 32 inches 2 to 10 inches 2
Connect all of the Make sure you can access
3
hardware the network

Check email Play games on Steam 1

Install security
Install Office 3
software
Explanation

The correct answer is 72 degrees / 50% humidity.


16 to 24 inches is the ideal distance between the monitor and user.
All of the other tasks listed cannot be successfully completed without the hardware
correctly connected.
It is important to have the operating system up-to-date to make sure any security holes
have been filled and any previous issues (bugs) have been fixed.
According to CompTIA, after you run Windows update you should install security
software, however in the real world Windows does a great job with security through its
Windows Defender program which installs automatically.
Question Answer Option 1
Chapter 7 - Setting Up and Configuring a Mobile Device
End-User License
What is the EULA?
Agreement

If you are streaming Netflix on a cross-country road trip which Storage on your
of the following are you “using up?” mobile device.

What is the process in which you can make your iPhone &
Twinning
Mac match?
Answer Option 2 Answer Option 3 Answer Option 4 Correct Response

A setting you use to A virus that can A low power


configure your email on a infect your mobile configuration 1
mobile device device. setting

Data in your monthly


Netflix user access Video capacity 2
mobile device plan.

Imaging Mirroring Synchronization 4


Explanation

The End-User License Agreement explains what you can or cannot do on a device or with a piece of
software and must be agreed to in order to use the device or software.

The correct answer is Data in your monthly mobile device plan. Data is the amount of traffic that
flows between the internet and your device; like movies from Netflix. Storage is the capacity a given
device must keep files, apps, pictures, etc. There are no user access limits for Netflix subscribers.
There is no video capacity limit on mobile devices.

Synchronization matches the files, contacts etc between two devices such as an iPhone and a Mac
Question Answer Option 1
Chapter 8 - Managing Files

What is the primary file management tool used in Windows? Control Panel

What is the primary file management tool used in Mac OS? Finder

In a typical Ubuntu build of Linux OS what is the file management tool used? File Explorer

Which of the following is NOT a term describing something you can do with a file
Create
on a hard drive?
When you move a file from one folder to another on a hard drive two copies of
1
the file now exist. (True or False)
How do you permanently delete a file using the shortcut key combination on the CTRL-X
keyboard?

What is the standard utility program that takes care of backups in Mac OS? Time Machine
It is not necessary to run backups on a regular basis. (True or False) 1
What is the shortcut key command to save in Windows? CTRL-ALT-DELETE

What is the shortcut key command (or hot buttons) to print in Mac OS? CTRL-P
Answer Option 2 Answer Option 3 Answer Option 4 Correct

File Explorer Ubuntu File Keeper 2

Linux File Explorer Toolbar 1

Windows Finder Nautilus 4

Liquidate Copy Move 2

0 2

CTRL-C SHIFT-DELETE CTRL-V 3

File History Imaging software Never lose my stuff 1


0 2
CTRL-V CTRL-X CTRL-S 4

CMD-P CTRL-V CTRL-S 2


Explanation

Windows uses File Explorer as its primary file management tool. Control Panel is the tool in Windows
where your system settings and controls are managed. Ubuntu is a distribution of Linux OS, and File
Keeper is a made up term.
Mac OS uses Finder as its primary file management tool. Linux is an operating system. File explorer is
the tool used in Windows, and Toolbar is the tray at the bottom of Windows that shows application
information.
Ubuntu uses Nautilus for file management. File explorer is the tool used in Windows. Windows is an
operating system, and finder is the tool used in Mac OS.
Liquidate is NOT a proper term for what you can do with a file. The correct term would be delete not
liquidate.
Move actually takes the file from one place and puts it in another. Copy function is what creates a
duplicate file in another location.

The correct answer is SHIFT-DELETE. CTRL-X cuts, CTRL-C copies and CTRL-V pastes.

The Mac OS backup utility is called Time Machine. File History is the utility used in Windows. Imaging
software is 3rd party software and Never lose my stuff is made up.
n order to protect your data backups should be run on a regular basis.
CTRL-S is the shortcut command for save in Windows. CTRL-ALT-DELETE opens Task Manager. CTRL-V
pastes and CTRL-X cuts.
CMD-P prints in Mac OS. CTRL-P will print in Windows. CTRL-V pastes in Windows and CTRL-S saves in
Windows.
Question Answer Option 1
Chapter 9 - Using and Managing Application Software
Applications enable computing devices to perform...? Tasks

What file extension is used in an Excel file? .pdf

Which of the following is a file extension that shows that the file
.tif
has been compressed?

What is a security feature in Windows that attempts to stop


User permissions
malicious software from installing without permission?

What are the three (3) typical stages in the lifecycle of an


Install, Use, Delete
application?
Bug fixes and
Why would you want to update software?
product updates
Answer Option 2 Answer Option 3 Answer Option 4 Correct R

On stage Backflips Well 1

.pptx .xlsx .docx 3

.jpg .jpeg .zip 4

User Account
Anti-malware Anti-virus 2
Controls (UAC)

Create, Patch, Install, Update,


Install, Copy, Resell 4
Uninstall Uninstall
Software does not
New stuff The prompt said to 1
need to be updated
Explanation

An application allows the computing device to perform tasks such as word processing, play solitaire, play videos,
browse the Internet and many other functions.
Excel uses .xls or .xlsx file extensions. A pdf is a document created with Adobe, Word files use .docx extension
and .pptx is the extension used with Powerpoint files.
A very common file compression software is called ZIP and uses the .zip file extension. The other file extensions are
used for image files.

User permissions are what a user is allowed to do/change on a system. They can control whether the user has
permission to change system settings or other configurations. Anti-malware and anti-virus software look for
malicious software/viruses on the system after or as it is being installed. They do not ask permission The correct
answer is UAC. UAC does not scan for malicious software it simply asks the user if you mean to install the software
in question. It asks you to give your permission to install software.

In order to effectively make use of an application it must be installed on a device, be kept up-to-date with any bug
fixes or security updates, and when the application is no longer needed it can be easily uninstalled.
When software is released problems and shortcomings are usually discovered. Updating the software will take
advantage of those bug fixes and add any additional product updates and features.
Question Answer Option 1 Answer Option 2
Chapter 10 - Configuring Network and Internet Connectivity

Which on of the following describes the probability that a


Latency Reliability
system will be functional?

Which of the following is NOT a type of high-speed internet


Edge Wireless
connection?

Which high-speed internet connection allows the most


Wired Cellular
concurrent users?

Nothing.  It is good Change the IP


This is one of the most important steps when configuring a
to go right out of address of your
new SOHO router.
the box. computer.

Where do you go to install a printer in Windows, especially in


Windows 8 and previous versions? Internet Settings

Once a printer is installed, how do you make sure it is Open a Word file
working? Print a test page. and try to print.

What device do you need to create a wired network? Router Ethernet cable

When there are more people attempting to access the


internet than the WAP can, then the WAP has reached its Mobile devices Concurrent users
_______________ limit.
Answer Option 3 Answer Option 4 Correct

Availability Mobility 3

Wired Cellular 1

Wireless Ethernet 2

Change the channel Change the default


4
settings. admin password.

Control Panel Programs 3

If you see the


printer in devices Check to see if it is
and printers all is plugged in. 1
well.

Happy thoughts Switch 4

Guests Wi-Fi signals 2


Explanation

The correct answer is Availability. Availability describes the how likely it is that a system is functional. Latency is the
connection delay between the request and the response to that request. Reliability refers the quality of the data
received, and mobility is how far you can travel and still access network resources and Mobility is not directly related to
functionality.

The correct answer is Edge. Edge is the standard web browser in Windows 10. You would access this with any of the
high-speed Internet connection options. Wireless is a high-speed Internet connection. Wired provides a high-speed
Internet connection. Cellular is a high-speed Internet connection.
The correct answer is Cellular. A cellular tower can handle hundreds of concurrent users. Wired connections are limited
by the number of switches it has. Wireless is limited to how much the WAP can handle. Ethernet is the cable used in
wired connections.

The correct answer is to change the default admin password. The default admin password for most SOHO routers is
“admin” and everyone knows it. It is important that is changed before you access the internet to help prevent malicious
attacks on your network. Many SOHO routers are not secure, straight out of the box. The SOHO router will usually
change the IP address of your computer for you and changing the channel settings may be a good step to improve
performance but is not as important as securing the router.

Control panel is where the devices and printers are housed and it is from there that you can take the necessary steps to
add a new printer.

The correct answer is to print a test page. This is the most straightforward way to see of a printer is functioning and that
it is not an issue with any other program. Opening a Word file and trying to print is a valid test but not the quickest or
most direct way. You can see the printer in devices and printers and think all is well but just because you see the
printer’s icon does not mean it is working. Another option is to check to see if it is plugged in. Checking whether or not it
is plugged in is troubleshooting tactic not a testing one.

The correct answer is a switch. Wired networks are created by connecting computers and peripherals to the ports on a
switch. A router connects one network to another. Ethernet cable is what is used to connect the computers to the
switch, but cable is not a device. Happy thoughts are a good thing but not essential in creating a wired network.
The correct answer is concurrent users. Too many users at once will slow down and eventually stop access to the
internet simply because there is too much traffic attempting to access the internet. Mobile devices access cellular
towers, not WAPs. Guests are user types and there is no way to measure Wi-Fi signals as a unit of capacity.
Question Answer Option 1 Answer Option 2
Chapter 11 - IT Security Threat Mitigation
What is an unsolicited email asking for money or to purchase a
Ham Spam
product?

In Windows OS, which shortcut keys are used to force quit a


Ctrl-Alt Del Ctrl-P
browser?
True or False:  You should NEVER click on pop-up ads or
1 0
warnings.
The type of spyware which records everything you type. Keyrecorder Keystroke mirroring
Make sure to click
on any pop-up
One important way to keep malware off of a system is to do Never go onto the
warnings that
what? internet.
appear on your
screen.

What is the first thing that needs to be done to a system


suspected to be infected by malware? Remediate Educate

What is the secure protocol that allows access to secure Websites are always
websites? HTTP secure.

What type of malware encrypts everything on your hard-drive


and requires payment to get your data back? MalWare Bytes Ransomware

True or False:  It is NOT important to keep your web browser


updated. 1 0
Answer Option 3 Answer Option 4 Correct

Ad Virus 2

Ctrl-S Alt-F4 4

1
Keylogger Keycopy 3

Keep the Turn off your


operating system machine every 3
up-to-date. night.

Run anti-malware
software Quarantine 4

Websites are
HTTPS never secure. 3

Phishing Ad Block 2

2
Explanation

The correct answer is Spam. Spam is unwanted advertising delivered through emails and websites. Ham is
what is for breakfast. Ads are just advertisements. A virus is a malicious program loaded onto your computer
and may be delivered through links found in spam.
The correct answer is Alt-F4. Alt-F4 forces browsers and most other programs to close. Ctrl-Alt-Del brings up
Task Manager. Ctrl-P is the shortcut to print. Ctrl-S is the shortcut to save.
The correct answer is True. These ads and warnings are most likely bogus and can install malicious programs
onto your computer. It is usually unsafe to click on pop-up ads and warnings.
Keylogger will record every keystroke.
The correct answer is to keep the operating system up-to-date. Current patches and fixes are the best way
for your OS to prevent malware. If you never go onto the internet, you’ll definitely never get any malware,
but it is impractical in today’s world. You should not EVER click on pop-up warnings as those are assuredly
malicious and will do bad things to your machine. Turning your machine off will not have an effect on
whether or not malware infects your machine.

The correct answer is Quarantine. The first step must be to make sure other devices on the network do not
get infected by quarantining or separating it from the network. Remediation happens after the virus is
quarantined and removed. Educating users is an important step in helping other recognize and avoid
malware but is not the first step to perform after an infection is discovered. Anti-malware software is used to
remove the malware but is not the first step after an infection is discovered.

The correct answer is HTTPS. HTTPS is the secure version of HTTP and makes sure that the communications
on that website are encrypted. HTTP is not a secure protocol and some websites are secure while some are
not.

The correct answer is Ransomware. Ransomware offers a decryption key in exchange for payment. MalWare
Bytes is an anti-malware program. Phishing is the practice of sending emails supposedly from reputable
companies in order to obtain personal information, such as passwords and credit card numbers. Ad Block is a
browser plug-in that blocks advertising on web pages.
It is very important to keep browsers updated because an up-to-date web browser will have the latest
protection against malicious attacks and sites.
Question Answer Option 1
Chapter 12 - Computer Maintenance and Management

Which applet do you use in Control Panel to adjust energy usage on


Network & Sharing
your laptop?

True or False:  You can use any type of spray cleaner when cleaning
1
the inside of your computer case?

Which of the following can be thrown in the regular trash? Scanner

Reset the device


Which of the following is essential to do BEFORE you recycle a
back to factory
mobile device?
defaults.

True or False:  A factory reset is sufficient to get rid of all of your 1


personal information on a desktop or laptop computer ?

What is a good reason to keep your PC on and not turn it off? E-mail

Why is using a vacuum cleaner on the inside of your computer NOT Static electricity
recommended? build up
Answer Option 2 Answer Option 3 Answer Option 4 Correct Response

Delete cookies or
Screen Resolution Power Options 3
temporary files

0 2

CRT monitor Smartphone AA batteries 4

Don’t recycle.
Smash it with a
Nothing Throw it in the 1
hammer.
trash.

0 2

Gaming Patching Storms 3

Too messy Too loud Wastes too much 1


energy
Explanation

The correct answer is Power Options. Power Options applet is where you control all settings pertaining to
battery usage. Network & Sharing does not have power management options. Screen Resolution does not
have power management options. Deleting cookies or temp files does not have power management options.

The correct answer is False. Only compressed air should be used to clean the inside of your computer. Take
the computer outside, because cleaning is messy. It would be a pretty bad idea to clean a computer with
something flammable.
The correct answer is AA batteries. Alkaline AA batteries don't contain any hazardous materials. Old scanners,
laptops, and monitors should be recycled as required by the Restriction of Hazardous Substances (RoHS)
Directive.

The correct answer is to reset the device back to factory defaults. You should never turn in any device without
removing your personal information and restoring a mobile device to factory defaults will do that. It is
important to do something in this situation rather than nothing. Hazardous materials in mobile devices should
NOT be put in the trash and while smashing the device is fun, it’s not necessary.
The correct answer is False. That method is good enough for mobile devices but resetting PCs doesn’t
completely delete all data. The data can be easily recovered.

The correct answer is Patching. Operating systems will set up important updates and patches to occur during
non-working hours. Keeping your computer on enables those important patches to take place, which in turn
keeps your machine up to date. E-mail comes to your mailbox even when your computer is off. It is not
advised to leave a computer on for 24 hours gaming. Storms are a pretty good reason to turn a computer OFF.

The correct answer is static electricity build up. The plastic tools on a vacuum can create static electricity
which can cause static electricity build-up and fry the insides of the computer. Vacuums are not too messy or
two loud depending on the vacuum and it doesn't take much energy to vacuum out a computer.
Question Answer Option 1 Answer Option 2 Answer Option 3
Chapter 13 : IT Troubleshooting

Check to see if
What should be the first thing you do if it looks like Check power and Call tech
you have the
your computer is dead? connections. support.
latest updates.

Check to see if Try a different


Delete or
One option to troubleshoot an issue with an cables are application that
uninstall the
application is to... connected does the same
application.
properly. thing.

True or False:  The first question you should ask a


person who is having a computer issue is/ “What 1 0
did you do?”

The operating The hard drive is


What does “low disk space” message mean? system needs to running out of The computer is
dying.
be updated. storage space.

What does ISP stand for? Internet Service Instant Simple Imaging Sending
Provider Program Process

Which tool (utility) shows how hard the CPU is Control Panel Devices and Task Manager
working? (Windows) Printers
True or False:  When on the phone with a
technician, it is okay to ask them to repeat
1 0
instructions or explain instructions in “human”
terms as opposed to “techie” terms.
Answer Option 4 Answer Option 5 Answer Option 6 Correct Response

Throw the
2
computer away.

Perform a web
search of the
4
problem.  “Google
It!”

There are too


many applications 2
open at one time.

Internet Search 1
Protocol

File Explorer 3
1
Explanation Knowledge Area

The correct answer is to check power and


connections. Any failure with power or
connectivity will result in a “dead” computer. It
would be hard to check for updates on a dead
computer. Throwing your computer away seems
a bit premature and there are things that you can
check before you call tech support.

The correct answer is to perform a web search of


the problem. “Google it!”. It’s best to try to fix
the issue before you delete it. Usually, hardware
failures in cables do not cause software failures
and trying a different application does not fix the
software you are currently having issues with.

Remember you are trying to help. Starting with a


question like that will cause the user to “clam up”
and not give you information. They will only say
“I didn’t do anything.” Ask leading questions
such as has the program ever run properly or
when was the last time the program run
correctly. This will open them up so you can get
a complete picture of what occurred.

The correct answer is that the hard drive is


running out of storage space. When the hard
drive begins to fill up it can cause the system to
run slowly and that warning message will appear.
Being out of date doesn't fill the hard drive. A
computer is not dying just because the disk is
filling up and no, too many applications open at
one time does not fill up the disk, though it may
cause slow performance.

The correct answer is Internet Service Provider. It


is an organization that provides its customers
access to the Internet (ie Comcast.)

The correct answer is Task Manager. Task


manager not only shows CPU usage but also all
the programs and processes running on your PC.
Control Panel does not show CPU utilization.
Devices and Printers does not show CPU
utilization. File Explorer does not show CPU
utilization.
The correct answer is True. It is perfectly
acceptable to ask for clarification. However, it is
important to stay calm and not lose your
patience. Remember, the technician is on the
phone to help you. Everyone needs a little help,
now and then.
Question Answer Option 1 Answer Option 2 Answer Option 3
Chapter 14 : Understanding Databases

A typical database table is organized by


___________________, which in turn has one or flat files queries records
more fields of data.

What term describes a unique record element for a


foreign key ID primary key
table used in another table?  
Answer Option 4 Answer Option 5 Answer Option 6 Correct Response

subjects 3

strong 1
Explanation Knowledge Area

The correct answer is records. A record is the


basic building block for a database. A flat file
or flat-file storage describes a simple
document, not something as complicated as
a database. You can run queries on the
various fields and other elements of a
database to get answers to
questions. “Subjects” sounds plausible, but
try a different word!

The correct answer is a foreign key. A


primary key used in another table as a data
entry point is called a foreign key. An ID, or
identifier, is often used when calling out a
unique record element for a table used in
another table. A primary key describes a
unique record element for a table. A string
refers to a grouping of letters, numbers, or
symbols.  
Question Answer Option 1 Answer Option 2 Answer Option 3
Chapter 15 : Developing and Implementing Software

Which of the following languages would you most


Assembly C++ JavaScript
likely find on a webpage?  

Byron reads through some notes on a program in


development, discovering a statement that says “If Assembly Binary Conditional
the sky is blue, continue to step seven.” What type
of statement is this?  
Answer Option 4 Answer Option 5 Answer Option 6 Correct Response

SQL 3

Looping 3
Explanation

The correct answer is JavaScript. JavaScript is a


common interpreted language, often used for
webpages. Assembly is very close to machine
language and isn’t used in higher level programming,
such as webpages. C++ is a compiled programming
language, not suited for webpages. SQL is a query
language, most commonly seen in databases.

The correct answer is Conditional. A conditional


statement (such as “IF”) tells the program to assess
the state of things and then do one of a number of
choices depending on that state.  Assembly is a type
of programming language, not a statement in code.
Binary is a numbering system. A looping statement
tells the program to reuse code. 

You might also like