When writing a program, which of the following best describes a sequence of instructions that are followed until a specific function is met?
A) Branching
B) Flow chart
C) Looping
D) Cross-platform
C) WHAT IS Looping
Which of the following is an example of a compiled language?
A) Perl
B) Java Script
C) Java
D) Power shell
C) WHAT IS Java
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A. The quality of the computer used to connect.
B. A security method of allowing connections.
C. The employees' home ISP speeds.
D. The geographical location of the employees.
B. WHAT IS A security method of allowing connections.
Which of the following protocols is used to relay email from a user's mail server?
A. IMAP
B. FTP
C. SMTP
D. POP3
C. WHAT IS SMTP
When programming, which of the following is known as writing down the logic of the code in plain english?
A. Pseudocode
B. Flowchart
C. Sequence
D. Assembly
A. WHAT IS Pseudocode
________ is an identifier used to store information for code but CANNOT change.
A) Variable
B) Constant
C) Array
D) Vector
B) WHAT IS Constant
You have been tasked with explaining binary to a new hire. Which of the following best explains what binary is to a new hire?
A) A notational system used to represent an "on" or "off" state
B) A notational system used to represent media access control
C) A notational system used to represent Internet protocol addressing
D) A notational system used to represent a storage unit of measurement
A) WHAT IS A notational system used to represent an "on" or "off" state
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
A. Standalone application
B. Client-server application
C. Web application
D. Cloud application
B. WHAT IS Client-server application
Which of the following types of memory can retain its content after a system reboot?
A. DDR
B. DIMM
C. RAM
D. ROM
D. WHAT IS ROM
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.
B. WHAT IS Ensure sources of EMI are removed.
Which of the following is similar to array but is not fixed in size?
A) Array
B) Constant
C) Variable
D) Vector
D) WHAT IS Vector
Lisa, a programmer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Lisa MOST likely use to accomplish this?
A) Loop
B) Variable
C) Constant
D) Function
B) WHAT IS Variable
A user wants to add an loT device to a network The device connects with a cable to the router. Which of the following is a requirement for this device to work?
A. Driver
B. USB cable
C. IP address
D. Workstation
C. WHAT IS IP address
A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?
A. Word processing
B. Spreadsheet
C. Text editor
D. Visual diagramming
A. WHAT IS Word processing
An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?
A. Clear browser cache.
B. Change "http" to "https" in theURL.
C. Disable all add-ons.
D. Enable pop-up blockers
A. WHAT IS Clear browser cache.
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g
B. B. Ensure sources of EMI are removed
C. Enable WPA2-Enterprise
D. Use WiFi Protected Setup.
B) WHAT IS Ensure sources of EMI are removed.
An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step following the standard troubleshooting procedure?
A) Restart the computer.
B) Contact other users.
C) Disconnect the peripherals.
D) Document the findings.
D) Document the findings.
Which of the following is the LOWEST unit for measuring bandwidth?
A. Mbps
B. Kbps
C. MBps
D. KBps
B. WHAT IS Kbps
Which of the following is the slowest processing speed?
A. 2.6GHz
B. 5000Kbps
C. 3.4MHz
D. 4MbpS
C. WHAT IS 3.4MHz
Which of the following BEST describes a kilobyte?
A) A kilobyte is a measurement of throughput (e.g.,100Kbps).
B) A kilobyte is a measurement of storage (e.g., 100KB).
C) A kilobyte is a measurement of power (e.g., 100KW).
D) A kilobyte is a measurement of power (e.g., 100Ghz).
B) WHAT IS A kilobyte is a measurement of storage (e.g., 100KB).
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A) Variable
B) If
C) Datatype
D) Comment
B) WHAT IS If
When troubleshooting an issue, a tech tests the theory and determines the theory is confirmed. Which of the following should the technician perform next?
A) Implement the solution.
B) Document lessons learned.
C) Establish a plan of action.
D) Verify full system functionality.
A) WHAT IS Implement the solution.
Which of the following is used for assigning IP addresses to networking devices?
A. SMTP
B. DHCP
C. DNS
D. ARP
B. WHAT IS DHCP
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A. Installing a host-based firewall
B. Setting a BIOS password
C. Patching the operating system
D. Removing unnecessary software
B. WHAT IS Setting a BIOS password
Which of the following BEST describes a LAN-hosted application? (Choose two.)
A. Internet access required
B. Services required
C. Network required
D. Files saved to the cloud
E. Internet access not required
F. Cloud availability
C. WHAT IS Network required
E. WHAT IS Internet access not required