Labs 2
Lab 4
Lab 5
Lab 6
MIX
100

When writing a program, which of the following best describes a sequence of instructions that are followed until a specific function is met?

A) Branching 

B) Flow chart 

C) Looping

D) Cross-platform 

C) WHAT IS Looping 


100

Which of the following is an example of a compiled language?

A) Perl

B) Java Script 

C) Java 

D) Power shell

C) WHAT IS Java 


100

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

A. The quality of the computer used to connect.

B. A security method of allowing connections.

C. The employees' home ISP speeds.

D. The geographical location of the employees.

B. WHAT IS A security method of allowing connections.


100

Which of the following protocols is used to relay email from a user's mail server?

A. IMAP

B. FTP

C. SMTP

D. POP3

C. WHAT IS SMTP


100

When programming, which of the following is known as writing down the logic of the code in plain english?

A. Pseudocode

B. Flowchart

C. Sequence

D. Assembly

A. WHAT IS Pseudocode


200

________ is an identifier used to store information for code but CANNOT change.

A) Variable 

B) Constant 

C) Array 

D) Vector 

B) WHAT IS Constant 


200

You have been tasked with explaining binary to a new hire. Which of the following best explains what binary is to a new hire?

A) A notational system used to represent an "on" or "off" state

B) A notational system used to represent media access control

C) A notational system used to represent Internet protocol addressing

D) A notational system used to represent a storage unit of measurement

A) WHAT IS A notational system used to represent an "on" or "off" state


200

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

A. Standalone application

B. Client-server application

C. Web application

D. Cloud application

B. WHAT IS Client-server application


200

Which of the following types of memory can retain its content after a system reboot?

A. DDR

B. DIMM

C. RAM

D. ROM

D. WHAT IS ROM


200

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A. Update from 802.11b to802.11g.

B. Ensure sources of EMI are removed.

C. Enable WPA2-Enterprise.

D. Use WiFi Protected Setup. 

B. WHAT IS Ensure sources of EMI are removed.


300

Which of the following is similar to array but is not fixed in size?

A) Array 

B) Constant 

C) Variable 

D) Vector 

D) WHAT IS Vector 


300

Lisa, a programmer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Lisa MOST likely use to accomplish this?

A) Loop

B) Variable

C) Constant

D) Function

B) WHAT IS Variable 


300

A user wants to add an loT device to a network The device connects with a cable to the router. Which of the following is a requirement for this device to work?

A. Driver

B. USB cable

C. IP address

D. Workstation

C. WHAT IS IP address


300

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

A. Word processing

B. Spreadsheet

C. Text editor

D. Visual diagramming

A. WHAT IS Word processing


300

An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?

A. Clear browser cache.

B. Change "http" to "https" in theURL.

C. Disable all add-ons.

D. Enable pop-up blockers

A. WHAT IS Clear browser cache.


400

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A. Update from 802.11b to 802.11g

B.  B. Ensure sources of EMI are removed

C. Enable WPA2-Enterprise

D. Use WiFi Protected Setup.

B) WHAT IS Ensure sources of EMI are removed.

400

An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step following the standard troubleshooting procedure?

A) Restart the computer.

B) Contact other users.

C) Disconnect the peripherals. 

D) Document the findings.

D) Document the findings.


400

Which of the following is the LOWEST unit for measuring bandwidth?

A. Mbps

B. Kbps

C. MBps

D. KBps

B. WHAT IS Kbps


400

Which of the following is the slowest processing speed?

A. 2.6GHz

B. 5000Kbps

C. 3.4MHz

D. 4MbpS

C. WHAT IS 3.4MHz


400

Which of the following BEST describes a kilobyte?

A) A kilobyte is a measurement of throughput (e.g.,100Kbps).

B) A kilobyte is a measurement of storage (e.g., 100KB).

C) A kilobyte is a measurement of power (e.g., 100KW).

D) A kilobyte is a measurement of power (e.g., 100Ghz).

B) WHAT IS A kilobyte is a measurement of storage (e.g., 100KB).


500

A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

A) Variable 

B) If 

C) Datatype 

D) Comment 

B) WHAT IS If 


500

When troubleshooting an issue, a tech tests the theory and determines the theory is confirmed. Which of the following should the technician perform next?

A) Implement the solution.

B) Document lessons learned. 

C) Establish a plan of action.

D) Verify full system functionality. 

A) WHAT IS Implement the solution.


500

Which of the following is used for assigning IP addresses to networking devices?

A. SMTP

B. DHCP

C. DNS

D. ARP

B. WHAT IS DHCP


500

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

A. Installing a host-based firewall

B. Setting a BIOS password

C. Patching the operating system

D. Removing unnecessary software

B. WHAT IS Setting a BIOS password


500

Which of the following BEST describes a LAN-hosted application? (Choose two.)

A. Internet access required

B. Services required

C. Network required

D. Files saved to the cloud

E. Internet access not required

F. Cloud availability

C. WHAT IS Network required

E. WHAT IS Internet access not required