You are on page 1of 43

It allows a computer to read PDFs.

Select one:

a.
PDF reader

b.
Pdf File

c.
File reader

d.
Reader

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is well-known organization for computing professionals

Select one:

a.
NCITE

b.
IEEE

c.
ICT

d.
ACM

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A systems administrator wants to return results for a time range within a database. Which of
the following commands should the administrator use?

a.
UPDATE
b.
SELECT

c.
DELETE

d.
INSERT

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The conversion of 87 hexadecimal to binary is 11100001.

Select one:
True
False 

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A programmer needs to store output in a place that can be accessed as quickly as possible.
The data does not need to remain persistent. Which of the following is the BEST option for
storing the data?

a.
Relational database

b.
Flat file

c.
Solid state drive

d.
Memory

Question 6
Correct
Mark 1.00 out of 1.00
Flag question

Question text
A regulation requires new applicants to provide a scan of their retinas in case of any future
legal questions regarding who applied for the position. Which of the following concepts is
this an example of?

a.
Non-repudiation

b.
Authentication

c.
Integrity

d.
Accounting

Question 7
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
ERMA (Electronic Recording Machine-Academy), was a pioneering computer development
project run at SRI under contract Bank of Africa in order to automate banking bookkeeping.

Select one:
True 
False

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
As binary system uses the power of?

Select one:

a.
16

b.
8

c.
10

d.
2

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It a number is made up of just two possible digits, zero and one.

Select one:

a.
Address

b.
Hexadecimal

c.
Binary

d.
Decimal

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A number system with a ten possible values.

Select one:

a.
hexadecimal

b.
decimal

c.
binary

d.
octal

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Two types of memory are CDROM and ROM

Select one:
True
False 

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the year when DEC launched the first minicomputer called the PDP-8.

Select one:

a.
1959

b.
1969

c.
1959

d.
1968

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Semiconductors are used in almost all electronic equipment in use today and have
revolutionized the world of electronics.

Select one:
True
False 
Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This principle discuss that computing professionals should not misrepresent an
organization's policies or procedures, and should not speak on behalf of an organization
unless authorized to do so.

Select one:

a.
Respect Privacy

b.
Be fair and take action not to discriminate

c.
Be Honest and Trustworthy

d.
Avoid Harm

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This principle, which concerns the quality of life of all people, affirms an obligation of
computing professionals, both individually and collectively, to use their skills for the benefit
of society, its members, and the environment surrounding them.

Select one:

a.
Be Honest and Trustworthy

b.
Be fair and take action not to discriminate

c.
Avoid Harm

d.
Contribute to Society and to Human Well-being, Acknowledging that all People are
Stakeholders in Computing

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the year when the general electric corporation delivered its ERMA computing system to
the Bank of America in California.

Select one:

a.
1979

b.
1968

c.
1959

d.
1969

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Spreadsheet applications contain a lot of features that can help the ICT professionals

Select one:
True 
False

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are the basic computing operations?

a.
Input, process, and output

b.
Input, output, storage, and feedback
c.
Input, process, output, and storage

d.
Input, process, output, and feedback

Question 19
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Malware infections are being caused by websites. Which of the following settings will help
prevent infections caused by Internet browsing?

a.
Delete browsing history on program close.

b.
Turn on private browsing

c.
Configure prompting before downloading content.

d.
Notify when downloads are complete.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is also known as "electron tube" in North America, "thermionic valve", or "valve" in Britain

Select one:

a.
Vacuum tube

b.
ENIAC

c.
ENVAC

d.
Z-machine
Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
WAN is also known as _______________.

Select one:

a.
Wide Area Network

b.
Wire Access Network

c.
Wireless Area Network

d.
Wireless Access Network

Question 22
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
The Abacus known as early computing tool which logarithm is invented by John Clipper and
the invention of slide rule by William Oughtred.

Select one:
True 
False

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The future of computing depends on both technical and ethical excellence

Select one:
True 
False
Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The decimal value of 11 is equal to B in hexadecimal

Select one:
True 
False

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Decimal number system is using based 10

Select one:
True 
False

Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A Vacuum tube is a device used to amplify, switch, otherwise modify, or create an electrical
signal by controlling the movement of electrons in a low-pressure space.

Select one:
True 
False

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
8 raised to 2 is equal to 64
Select one:
True 
False

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following data types should a developer use when creating a variable to hold a
postal code?

a.
String

b.
Integer

c.
Boolean

d.
Float

Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A series of eight bit.

Select one:

a.
bin

b.
bit

c.
binary

d.
byte

Question 30
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of the following would work BEST stored as a flat file rather than stored in a
database?

a.
Contact list

b.
Store inventory

c.
Movie theater locations

d.
Directions to doctors office

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
While browsing the Internet, a user receives a warning regarding the display of mixed
content. The address bar includes https, and the lock symbol is showing. Which of the
following does this warning indicate about the website?

a.
It is best viewed with a different browser.

b.
It stores data in cache or cookies, but not both.

c.
It requires login credentials for some sections.

d.
It contains both secure and non-secure parts.

Question 32
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which of the following software types BEST facilitates collaboration?

a.
Personal information manager

b.
Video editing software

c.
CAD software

d.
Instant messaging software

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user is configuring a new wireless router. Which of the following should be done to
ensure that unauthorized changes cannot be made?

a.
Change the SSID

b.
Change the encryption key

c.
Change the administrator password

d.
Change the router’s address

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is primarily a confidentiality concern?

a.
Destructing

b.
Altering

c.
Impersonating

d.
Eavesdropping

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following relational database constructs is used to ensure valid values are
entered for a column?

a.
Schema

b.
Permissions

c.
Constraint

d.
Column

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the
system. Which of the following BEST describes the type of account Joe should create for his
roommate?

a.
Guest

b.
Administrator

c.
Power user
d.
Standard

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A UPS provides protection against:

a.
power outages.

b.
replay attack.

c.
denial of service

d.
wiretapping.

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following actions is the FINAL step in the standard troubleshooting
methodology?

a.
Research the problem online.

b.
Implement preventive measures.

c.
Document the solution and cause.

d.
Create a new theory of cause.

Question 39
Correct
Mark 1.00 out of 1.00
Flag question

Question text
An employee’s new computer came with a free 30-day trial version of antivirus software. The
employee’s company provides enterprise antivirus software from a different vendor. Which
of the following should the employee do in order to use a full version of antivirus software?

a.
Verify Internet connectivity and run online virus scanning software.

b.
Update the trial antivirus software to the latest version.

c.
Enter the company product key for the antivirus software, enabling the full version.

d.
Uninstall the current version antivirus software and install the company version.

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her
house after a rain storm that caused a power interruption. The camera has an LED light
indicating it has power. Which of the following is MOST likely the problem?

a.
Ann has a compatibility problem with the camera.

b.
Anns Internet connection and wireless router are still down.

c.
A firmware update needs to be applied to the camera.

d.
The power interruption caused the camera to malfunction.

Question 41
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which of the following should be done to reduce physical safety hazards around a newly
installed computer?

a.
Verify all connections are seated properly.

b.
Bundle loose cables with zip ties or Velcro straps.

c.
Avoid placing other computers nearby.

d.
Attach all peripherals to the computer.

Question 42
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user receives an email formatted to appear as if the bank sent it. The email explains that
the user must confirm the name, address, and social security number listed on the bank
account. Which of the following BEST describes the security threat taking place?

a.
Shoulder surfing

b.
Spam

c.
Social engineering

d.
Phishing

Question 43
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following BEST describes an application running on a typical operating
system?

a.
Task

b.
Function

c.
Process

d.
Thread

Question 44
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?

a.
The application must be activated.

b.
The application has to be registered to the user.

c.
The application needs to be reinstalled.

d.
The application must be upgraded to a 64-bit version.

Question 45
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following should be performed after a backup has been completed?

a.
Schedule the backup

b.
Delete the backup

c.
Save the backup
d.
Verify the backup

Question 46
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a safety feature of cloud-based backups?

a.
Local copy of data

b.
Offsite storage of data

c.
Incremental copy of data

d.
Full backup of PC data

Question 47
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A company requires several reports that analyze related information from sales, inventory,
marketing, and compensation data. Which of the following is the BEST place to store this
data?

a.
Word processor

b.
Network share

c.
Database

d.
Flat file

Question 48
Correct
Mark 1.00 out of 1.00
Flag question

Question text
A user needs to download tax documents from a financial website. Which of the following is
the website MOST likely to use for transmission of the tax document to the user’s browser?

a.
HTTPS

b.
SFTP

c.
FTP

d.
HTTP

Question 49
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Joe, a user, saves a document to a flash drive on his computer in order to print the
document from a public computer kiosk. After returning home and reinserting the flash
drive in his computer, the security software identifies an infected file on the flash drive.
Which of the following is the MOST likely cause of the infection?

a.
The public workstation was infected and passed the virus to the flash drive.

b.
The flash drive was infected by a war driving hacker on the way to the public kiosk.

c.
The public workstation was infected by Joe’s flash drive.

d.
The flash drive was already infected by the user’s computer.

Question 50
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which of the following is the function of a CPU?

a.
Performs data computation

b.
Supplies electricity to components

c.
Provides storage location for files

d.
Encrypts data for remote transmission

Question 51
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop
into the corporate network. A sensitive file from the laptop has been found on another
user’s laptop. How could the user have prevented this breach?

a.
Delete unused drives from network.

b.
Remove shared keys from the key ring.

c.
Disable file and print sharing on the laptop.

d.
Set the read-only attribute on the files.

Question 52
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she
can only see her search bars and plug-ins. Which of the following is the MOST likely source
of this issue?

a.
The computer needs to have its components upgraded

b.
The owner was not using complex passwords

c.
The downloaded toolbars are filling the browser screen

d.
The computer does not have current antivirus software installed

Question 53
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Where can a user find the latest updates, upgrades, or firmware for an electronic device that
the vendor supports?

a.
Internet forum

b.
Internet search engine

c.
Technical community groups

d.
OEM website

Question 54
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is used with a touch screen to increase accuracy?

a.
Trackball

b.
Stylus pen

c.
Touchpad
d.
Joystick

Question 55
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following connectors is MOST often used to connect a computer to a network?

a.
RJ-45

b.
IDE

c.
eSATA

d.
RJ-11

Question 56
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost
or stolen?

a.
Host-based firewall

b.
Full disk encryption

c.
Anti-malware software

d.
Strong administrator password

Question 57
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Joe, a developer, is writing a program in which he needs to store a number that changes
over the duration of the program‫ג‬€™s run. Which of the following would Joe MOST likely
use to accomplish this?

a.
Loop

b.
Function

c.
Variable

d.
Constant

Question 58
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following data connections would provide a user the BEST Internet availability
while traveling?

a.
Laptop with Bluetooth wireless connectivity

b.
Tablet connected to a SOHO wireless network

c.
Smartphone with cellular service

d.
Workstation with only RJ-45 connectors

Question 59
Incorrect
Mark 0.00 out of 1.00

Flag question
Question text
Which of the following language types would a web developer MOST likely use to create a
website?

a.
Query

b.
Compiled

c.
Interpreted

d.
Assembly

Question 60
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following storage methods provides the HIGHEST redundancy and availability?

a.
Network Attached Storage

b.
Storage Area Network

c.
Locally attached storage

d.
Cloud-based storage

Question 61
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An employee is asked to generate a report on a student information system. The employee
uses spreadsheet software and connects to a remote database to pull data for the report.
Which of the following types of application architectures did the employee use?

a.
Cloud application
b.
Client-server application

c.
Standalone application

d.
Web application

Question 62
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When setting up a new workstation, which of the following should be configured during the
initial OS setup wizard?

a.
Date and time settings

b.
Security software

c.
Additional software

d.
Peripheral devices

Question 63
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following BEST describes the pros and cons of a home wired network?

a.
Low throughput, low mobility, high availability, high latency, high security

b.
High throughput, low mobility, high availability, low latency, high security

c.
Low throughput, high mobility, low availability, high latency, low security
d.
High throughput, high mobility, low availability, low latency, high security

Question 64
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which of the following security concerns is a threat to confidentiality?

a.
Dumpster diving

b.
Service outage

c.
Replay attack

d.
Denial of service

Question 65
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A help desk technician encounters an issue and wants to find out if a colleague has
encountered the same issue before. Which of the following should the technician do FIRST?

a.
Check Knowledge Base.

b.
Search local logs.

c.
Research possible theories.

d.
Question users.

Question 66
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
Which of the following is a compiled language?

a.
PowerShell

b.
Perl

c.
JScript

d.
Java

Question 67
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following internal components is used for temporary data storage in a
workstation?

a.
RAM

b.
Power supply

c.
Hard drive

d.
CPU

Question 68
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a benefit of setting up a computer to receive automatic updates
from the OS vendor?

a.
Provides the latest virus definitions to keep the computer safe

b.
Keeps the software current and applies security patches

c.
Restores missing files that were lost or deleted

d.
Arranges the hard drive files in order

Question 69
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays
constant pop-up ads. Which of the following is the MOST likely cause?

a.
The workstation has been infected with malware

b.
The website is not secured by SSL

c.
The certificate of the website has expired

d.
The browser is incompatible with the website

Question 70
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following will allow the easiest and fastest way to share a single file between
two modern smartphones without joining the same WiFi network?

a.
Infrared
b.
Micro SD card

c.
USB connection

d.
Bluetooth

Question 71
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When setting up a new computer, where does a user change the date and time?

a.
Screen resolution

b.
Localization settings

c.
Peripheral configuration

d.
eSATA settings

Question 72
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A website locks a user’s account after three unsuccessful login attempts. This precaution
prevents which of the following?

a.
Spam

b.
Shoulder surfing

c.
Password cracking

d.
Phishing

Question 73
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
To reduce the risk of installing unapproved or possibly malicious apps on a smartphone, a
user should:

a.
Utilize the vendor-provided app store.

b.
Download apps from a user-supported community.

c.
Update the firmware to the latest version.

d.
Use a search engine to identify safe apps.

Question 74
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When operating under optimal network conditions, which of the following has the HIGHEST
reliability?

a.
Bluetooth

b.
Wired

c.
WiFi

d.
Cellular

Question 75
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of the following is considered an open-source operating system?

a.
Chrome OS

b.
Linux

c.
Mac OS X

d.
Windows

Question 76
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that
she can only get to local (intranet) pages. Which of the following actions would MOST likely
fix the problem?

a.
Disable the pop-up blocker

b.
Clear the browser cache.

c.
Configure the browser proxy settings.

d.
Renew the IP address.

Question 77
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A company executive wants to view company training videos from a DVD. Which of the
following components would accomplish this task?

a.
Solid state drive

b.
Hard disk drive

c.
Optical drive

d.
Flash drive

Question 78
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user has just removed a new desktop PC from the box and has plugged in several new
peripheral devices. During which of the following steps will the plug and play peripheral
devices be installed on the new PC?

a.
Booting the operating system

b.
Adding additional user accounts

c.
Powering on for the first time

d.
Installing security software

Question 79
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user is attempting to print a document to a wireless printer and receives an error stating
the operation could not be completed. Which of the following should the user do to correct
this issue?

a.
Enable task scheduling.

b.
Ensure both devices are connected to the LAN.

c.
Review the fault tolerance configurations.

d.
Reset the proxy settings to their default values.

Question 80
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which of the following describes something in a database that refers to the unique
identifier in the parent table?

a.
Attribute

b.
Schema

c.
Constraint

d.
Foreign key

Question 81
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A home computer that has been in operation for more than five years is now suffering from
random shutdowns during the day. The PC is set up in an enclosed cubby built into the
home office desk. Which of the following is MOST likely plaguing the PC?

a.
The PC’s BIOS is severely out-of-date, causing PSU issues

b.
The PC was switched over to 240v operation mode
c.
Dust accumulation

d.
EMI

Question 82
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A company requires several reports that analyze related information from sales, inventory,
marketing, and compensation data. Which of the following is the BEST place to store this
data?

a.
Flat file

b.
Network share

c.
Word processor

d.
Database

Question 83
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user is updating a website. Which of the following protocols will provide the MOST
security when uploading the files?

a.
SMTP

b.
FTPS

c.
FTP

d.
HTTP
e.
SNMP

Question 84
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST
characteristic to sort by in order to ensure that the most space is freed by deleting the least
amount of files?

a.
Extension

b.
File path

c.
Date modified

d.
Size

Question 85
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A technician is called to replace a display for a workstation. Which of the following would
MOST likely be used to connect the display to the workstation?

a.
USB

b.
NFC

c.
DSL

d.
DVI

Question 86
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A regulation requires new applicants to provide a scan of their retinas in case of any future
legal questions regarding who applied for the position. Which of the following concepts is
this an example of?

a.
Authentication

b.
Non-repudiation

c.
Integrity

d.
Accounting

Question 87
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A program needs to choose apples, oranges, or bananas based on an input. Which of the
following programming constructs is BEST to use?

a.
Datatype

b.
Variable

c.
Comment

d.
If

Question 88
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is
considered:

a.
phishing

b.
adware

c.
spyware

d.
ransomware

Question 89
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Several users want to share a common folder with high availability. Which of the following
devices is BEST to use for this requirement?

a.
Firewall with security management

b.
Large USB flash drive connected to a PC

c.
Network attached storage appliance

d.
Medium capacity SATA hard drive

Question 90
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An attacker cracks a user's password for all social media, email, and bank accounts. The user
needs to change the passwords for all these accounts. Which of the following should the
user do in the future to prevent this from happening?

a.
Disable unused browser toolbars.

b.
Clear the browser cache.

c.
Avoid credential reuse.

d.
Delete tracking cookies.

Question 91
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Joe, a user, has just installed his first home wireless router. Which of the following tasks
should be considered to help secure the unit from any confirmed exploits?

a.
Change the router’s broadcasting channel.

b.
Use a complex administrator password.

c.
Change the router administrator username.

d.
Update the unit’s firmware.

Question 92
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A technician is typing the password to logon to a system. A user is standing in close
proximity to the technician and is able to see the password being typed. Which of the
following BEST describes this situation?

a.
Phishing

b.
Dumpster diving
c.
Social engineering

d.
Shoulder surfing

Question 93
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following would work BEST stored as a flat file rather than stored in a
database?

a.
Directions to doctors office

b.
Store inventory

c.
Movie theater locations

d.
Contact list

Question 94
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following software is used to reduce the size of a file or folder?

a.
Desktop publishing

b.
Anti-malware

c.
Basic database

d.
Compression

Question 95
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A regulation requires new applicants to provide a scan of their retinas in case of any future
legal questions regarding who applied for the position. Which of the following concepts is
this an example of?

a.
Integrity

b.
Accounting

c.
Non-repudiation

d.
Authentication

Question 96
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that
she can only get to local (intranet) pages. Which of the following actions would MOST likely
fix the problem?

a.
Renew the IP address.

b.
Clear the browser cache.

c.
Disable the pop-up blocker

d.
Configure the browser proxy settings.

Question 97
Correct
Mark 1.00 out of 1.00
Flag question

Question text
A user is installing a new scanner on a computer. Which of the following MOST likely needs
to be installed in order for this equipment to work?

a.
OS update

b.
License key

c.
Driver

d.
Firmware

Question 98
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A user has finished running the initial operating system setup wizard. Which of the following
would be BEST for the user to do next?

a.
Verify Internet connectivity

b.
Install security software

c.
Add other user accounts

d.
Install productivity software

Question 99
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is an advantage of installing an application to the cloud?

a.
Internet access is not required.

b.
Service is not required.

c.
Support is not required.

d.
Data is not stored locally.

Question 100
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is the closest to machine language?

a.
Query languages

b.
Scripted languages

c.
Assembly languages

d.
Compiled languages

You might also like