IT Concepts and Terminology
Infrastructure
Applications & Software
Database Fundamentals
Security
100

Which of the following statements BEST describes binary?

  • A notational system used to represent media  access control
  • A notational system used to represent an "on" or "off" state
  • A notational system used to represent a storage unit of measurement
  • A notational system used to represent Internet protocol addressing

What is = 
A notational system used to represent an "on" or "off" state 

100

Which of the following storage types uses platters to store data?

What is:

Hard drive

100

Give one are more examples of a compiled language?

What is = C++

100

Which of the following relational database constructs is used to ensure valid values are entered for a column?

What is - Constraint

100

In macOS, which app is used to view logs

What is = Console

Explanation:- To view logs in macOS, you open Console. Go to Application > Utilities and double-click Console to launch it.

200

What is the approximate number of bytes in a Megabyte?

What is = 1 Million


200

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?


What is - Establish a plan of action.

200

Which utility in Windows is used to update device drivers?

What is = Device Manager

Explanation:- Use device manager to update the device drivers in Windows.

200

Which term describes the structure of a database, either in text or graphically?

What is = Schema

Explanation:- Schema refers to the structure of a database as described either in text or graphically.

200

To allow someone from Security to review information in Accounting for fraud detection, which type of access control does the organization need to use.

What is = (DAC) Discretionary access control

Explanation:- if a user in accounting needs to have someone in Security review information to check for fraud then Discretionary access control will be needed. 

300

Which decimal number corresponds to the binary number 01111001?

What is = 121

Explanation:- 125 decimal number corresponds to the binary number 01111101?

(128+64+32+16+8+4+2+1)

300

Which two network protocols will MOST likely be used  when sending and receiving Internet mail?

What is = SMTP and 

What is  = POP3

300

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

What is = Client-server application

300

A NoSQL database use to organize data?

What is = Keys/values 

300

Which type of account in Windows allows a user to manage their account but requires permission to install apps.

What is = Standard account

Explanation:- Standard account can manage their own account but needs permission to install apps.

400

Which computer components allows for communication over a computer network?


What is = NIC

Network Interface Card


400

Which types of memory can retain its content after a system reboot? is it RAM, ROM, DIMM, DDR

what is - ROM

Explanation:- ROM - Read only memory. Retain its content.

400

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

what is = Workstation

400

You are using a JAVA script to access a database. This is an example of?

What is  = Programmatic access

Explanation:- Programmatic access allows you to invoke actions on your resources either through an application that you write or through a third-party tool.

400

When you need to print a color presentation but the color printer won't be available until tomorrow morning, what type of access control is in use?

What is = Rule-based

Explanation:- You want to print a color presentation at  7 p.m., but the color laser printer won't be available until 9 a.m.  tomorrow.  

Rule based Access Control (RBAC) allows system owners to personalize the type of access a user has based on their role within organization.

500

Which data types should a developer use when creating a variable to hold a postal code?

What is a = String

500

A user is trying to set up a new wireless access point. What should the user do first?

What is = Change the default password. 


500

A global variable called "age" will be created in a program and incremented through the use of a function.
Which data types should be defined with the age variable?

What is = Integer 

500

Which of the following is used to retrieve data from a database in a readable format on a user's request?

What is  = Query

Explanation:- Query is used to extract data from a database, which is a request for information stored within a database management system (DBMS). 

500

Which types of encryptions would BEST protect a laptop computer in the event of theft?

What is =  Disk