IT Concepts and Terminology
Infrastructure
Applications and Software
Database Fundamentals
Security
100

One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process? 

Peripheral device 

Output 

Input 

Speaker

Output

One option that a computer has for the information gathered in data processing is to return information to the user. This is called output. Examples of output are images on a screen, sounds from speakers, and printed pages.

100

Which connector is used with an unshielded twisted pair (UTP) cable? 

AUI 

RJ-45 

DIX 

BNC

RJ-45 

An RJ-45 connector is used with an unshielded twisted pair (UTP) cable. BNC and AUI are used with coaxial cables. DIX is an Ethernet protocol.

100

Which of the following are web browsers? (Select two.) 

Mozilla  Firefox 

Bing 

Microsoft Visio 

Google Chrome 

Google

Mozilla  Firefox, Google Chrome 

Mozilla Firefox is a web browser created by Mozilla Corporation but purchased by Microsoft. 

Google Chrome is a web browser provided by Google. 

Microsoft Visio is a visual diagramming application and not a web browser. 

Google is a search engine and not a web browser. 

Bing is a search engine (like Google) and is provided by Microsoft.

100

Peter is a regional sales manager for an online clothing retail company. He would like information on all the customers in his region and the purchases made by each of them during the last quarter. Which of the following database elements can BEST provide the information Peter needs? 

Report 

Query 

Form 

Table

Report 

Reports provide clear, easy-to-read summaries of data. They can be based on tables, queries, or both. In this case, a report can be generated to list the customers in Peter's region along with all their purchases from the last quarter.

100

Which software is Microsoft's anti-malware product that is preinstalled on most new computers? 

ESET NOD32 

McAfee VirusScan 

Norton Antivirus 

Windows Defender

Windows Defender

Windows Defender is an anti-malware program created by Microsoft and automatically installed on many versions of Windows. The other three programs are created by other companies and must be purchased before they can be used.

200

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on? 

Only 32-bit systems 

Only 64-bit systems 

Only 16-bit and 32-bit systems 

Both 32-bit and 64-bit systems

Both 32-bit and 64-bit systems 

An executable file with "x86" in the name was most likely created for 32-bit systems. However, since 64-bit systems are typically backwards compatible with 32-bit applications, this file will most likely run on both 32-bit and 64-bit systems.

200

Which of the following video standards provided resolutions up to 1024x768, color depths up to 32 bits, and higher refresh rates when it was released? 

SVGA 

VGA 

HDMI 

XGA

XGA

The XGA standard provided resolutions up to 1024x768, color depths up to 32-bits, and higher refresh rates when it was released. Most modern display systems use a variation of the XGA standard today.

200

Which of the following lines will initiate an Internet search from the address bar of a web browser? 

microsoft.org 

microsoft gov 

google.com 

microsoft.com

microsoft gov 

Typing anything that isn't a valid website into the URL bar of a modern web browser will run an Internet search on the browser's default search engine.

200

Alberto works in human resources and wants to move all personnel files to a system that would provide a user interface for adding, updating, and removing personnel records. He also wants to ensure the data cannot be viewed without correct permissions. Which of the following would be the BEST option to store and retrieve this data? 

Network share 

Cloud storage 

Text-based flat file 

Database

Database

A database is the best choice to store personnel information and provide access control permissions. A text-based flat file would not provide the needed access control. A network share and cloud storage would only provide a storage location for the data and would not provide the necessary user interface and functionality.

200

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver? 

Plain text 

Cipher text 

AES encrypted message 

WPA2 encryption

Plain text 

The information will be transmitted in clear text. The HTTP protocol sends and receives data as plain text, so the user shouldn't enter any private information.

300

The basic (and smallest) unit of computer information is the bit (binary digit). Memory and file sizes are commonly measured in multiples of bits. What is the first multiple of a bit called? 

Byte 

Decimal 

Kilobyte 

Kbps

Byte

The first multiple of a bit is called a byte, which is eight bits.

300

Which graphics interface supports both digital and analog signals? 

VGA 

DVI-I 

DVI-D 

HDMI

DVI-I

DVI-I is the graphics interface that supports both digital and analog signals. 

VGA only support analog signals. 

DVI-D only supports digital signals. 

HDMI only supports digital signals.

300

Hannah is the manager of a successful Thai cuisine restaurant. It's November and Hannah wants to begin reviewing salary expenses for the year. She decides to generate a payroll report for all her employees. Which of the following types of business software could easily provide Hannah with the report she needs? 

Business accounting software 

Spreadsheet software 

Project management software 

Database software

Business accounting software

Business accounting software makes it easier to process payroll, reconcile accounts, and track expenses. This software could quickly generate the report that Hannah needs.

300

A system manager has created a database to store company employees' personal information. What is the next step that the system manager needs to do? 

Generate a report to make sure the database is working properly. 

Validate that the database has sufficient storage space. 

Test the database by extracting information using a query. 

Import (input) data records into the database.

Import (input) data records into the database.

After creating a database, the next step is to import (input) data records into the database by providing an online form for employees to fill out or by importing records from another source (such as a CSV file).

300

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so? 

Perform a remote wipe to clear any personal data. 

Backup all data to an attached computer or a cloud backup service. 

Ensure that the battery is fully charged. 

Close all running applications.

Backup all data to an attached computer or a cloud backup service. 

A factory reset will clear all data from the mobile device. To prevent the loss of this data, it should be backed up to an attached computer or a cloud backup service.

400

You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue? 

Update the BIOS. 

Search for the error in Microsoft's knowledgebase.

Check the voltage levels on the DC side of the power supply. 

Remove all memory modules and replace them one at a time until the error reappears. 

Uninstall the last application or system update that was installed.

Search for the error in Microsoft's knowledgebase.

The first thing you should do when a "blue screen of death" has been displayed is identify the source of the error. Search for the text of the error message in Microsoft's knowledgebase or across the Internet in general using a search engine such as Google. This will help you identify what's causing the problem so you can troubleshoot it.

400

What is the maximum supported transfer rate for the IEEE 1394b standard? 

480 Mbps 

5 GBps 

800 Mbps 

400 Mbps

800 Mbps 

The IEEE 1394b, or Firewire 800, standard supports a maximum transfer rate of 800 Mbps.  

400

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.) 

There are no consequences. By law, you are allowed 1 to 3 activations per user. 

The software company will never detect the violation so negative consequences are unlikely. 

You risk losing your job. 

The software will eventually stop working properly for the 10 extra updates you installed. 

Your company is exposed to litigation by violating the software license agreement.

You risk losing your job.

Your company is exposed to litigation by violating the software license agreement.

Circumventing license agreements exposes your company to litigation and puts your job at risk. Even without a mechanism for tracking the number of users that are using the software, the enterprise agreement limits the number of licenses you are legally entitled to use. Using more licenses than you are entitled to is an act of theft. Your best course of action is to purchase 10 more licenses.

400

April is a database manager who wants to insert some new records (rows) into the company's customer contact database. Instead of using a database client to insert the records, she wants to use a command. Which of the following languages provides a command for inserting records into a database? 

DCL (Data Control Language) 

DDL (Data Definition Language) 

HTML (HyperText Markup Language) 

DML (Data Manipulation Language)

DML (Data Manipulation Language)

Data Manipulation Language (DML) provides commands that let you insert or update records in a database and provides the INSERT command that April needs.

400

A network administrator has successfully restored access to network data, hardware, and communications after a natural disaster and updated the disaster recovery plan. Which of the following should the network administrator do before the next disaster occurs? 

Prioritize which systems need to be restored first. 

Conduct disaster recovery exercises. 

Perform a business impact analysis. 

Estimate tangible and intangible impacts.

Conduct disaster recovery exercises. 

To make sure that the updated disaster recovery plan will be successful, it is important to conduct disaster recovery exercises that simulate real-world disasters.

500

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed? 

Implement the solution or escalate as necessary 

Document findings/lessons learned, actions, and outcomes 

Establish a plan of action to solve the problem and identify potential effects 

Verify full system functionality and, if applicable, implement preventive measures

Document findings/lessons learned, actions, and outcomes 

The last step in the troubleshooting methodology is to document findings/lessons learned, actions, and outcomes. Here is the troubleshooting methodology in order: 

1. Identify the problem 

2. Research knowledge base/Internet, if applicable 

3. Establish a theory of probable cause 

4. Test the theory to determine the cause 

5. Establish a plan of action to solve the problem and identify potential effects 

6. Implement the solution or escalate as necessary 

7. Verify full system functionality and, if applicable, implement preventive measures 

8. Document findings/lessons learned, actions, and outcomes

500

Stewart's friend gave him an old server. He decides to install a second NIC card and some extra hard drives. He puts the computer on his network and shares all the storage space for clients to use. What did Stewart just create? 

A file server 

A DAS 

A cloud server 

A NAS

A file server 

A file server is a computer that is placed on a network and shares its storage space to be used by clients on the network. 

A NAS (Network Attached Storage) is a standalone device with a large amount of storage space that can be placed on your network and accessed by clients on your network. 

A DAS (Direct Attached Storage) is a way of sharing a file server's (or any computer's) storage to be used by clients on the network. 

A cloud server is a resource for keeping data that is accessed through the internet.

500

Timothy is using a computer that's running a Windows OS. He wants to rename a file on his local hard drive. Which of the following tools should he use? 

Windows Settings 

Device Manager 

Task Manager 

File Explorer

File Explorer

File Explorer, formerly known as Windows Explorer, is a file management application that comes with Windows. File Explorer's main purpose is to let you view, open, copy, move, and otherwise manage your files and folders.

500

Cindy wants to use a database to store and retrieve information for a research project. She has gathered photos, newspaper articles, interviews, and notes. The information does not appear to have a clear pattern. Which of the following types of data does Cindy want to store? 

Non-structured 

Structured 

Relational 

Semi-structured

Non-structured 

Non-structured data is data that doesn't follow a clear pattern. An example would be a document database that provides search capabilities.

Structured data is data that can be organized into discrete categories. 

Semi-structured data is data that has things in common. 

Relational refers to relationships between items in a database. The data described would require a nonrelational database.

500

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.) 

Avoid anti-virus apps 

Keep the operating system up to date 

Keep an up-to-date remote backup 

Turn off location services 

Lock the screen with some form of authentication

Keep your device always in your possession

Keep the operating system up to date 

Lock the screen with some form of authentication

Keeping the operating systems up to date with the latest updates and patches will help because they often contain fixes for known security issues.

Configure the screen lock to require some sort of authentication to physically access your device.