0 of 276 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 276 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
You have unlimited attempts. Thank you for completing the pre-assessment quiz for CompTIA ITF certification. If your score is a 90% or above you can move on to CompTIA Network + or CompTIA A+. If your score is greater than 75% but less than 90% our suggestion would be to take a 10-20 hour course on Understanding the Basics, and retake the quiz. If your score is less than 70% it is highly recommended that you take the CompTIA ITF course.
Ergonomics involves making the computer more comfortable to use, which of the following will allow for this to happen? (Choose all that apply)
The computer’s performance is largely determined by which of the following factors? (Choose all that apply)
Which of the following peripheral devices are normally connected to the motherboard? (Choose all that apply)
Which of the following is referred to as a desktop, can be used independently by a single user, run powerful applications and also function as a network client?
A _____________ type of PC is housed in a case that can sit on or under a desk. (Fill in the blank)
Which of the following has become smaller and more portable that is used by most home and end users? (Choose all that apply)
Which of the following was designed specifically for home use or by end users?
Which of the following can be classified as a type of computer? (Choose all that apply)
The data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on
The processed data is shown or played to the user through an output device, such as a monitor or loudspeaker system.
The data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software.
An Information Technology (IT) system is one that processes, stores, and transfers information.
The computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones.
A computer is a system that manipulates data according to a set of instructions.
Three elements are required for a computer to perform useful tasks: (Choose All That Apply)
Which of the following peripherals is considered an input device?
How does your computer receives data entered by a user?
Match the following to the correct description
Computer Data
|
|
Raw Data
|
|
Language
|
|
Referential Data
|
|
Information can take many different forms including: (Choose All That Apply)
Match the correct binary and decimal conversion to hexadecimal?
1111 1111
|
|
32
|
|
60
|
|
1011 0001
|
|
Which of the following represents the smallest unit of data?
If letter A=10, B=11, C=12, D=13, E=14, F=15. What type of notational system is being used?
What notational system is used, given the following Physical Address:
0001.42A7.C176
Convert the following to binary (Hex to binary conversion).
FF
You can express large numbers more efficiently by using, which of the following?
Which of the following is used to represent an IPv6 IP Address?
Which of the following is used to represent an IPv4 IP Address?
What is true about the binary number system. (Choose all that apply)
The decimal system is used to represent. (Choose all that apply)
In computing, a notational system is one used to represent different quantities or characters
Match the following to the correct numbering system.
The decimal system
|
|
The binary system
|
|
The hexadecimal system
|
|
Decimal to Binary Conversions for the following
172.16.63.255
Binary to Decimal Conversions for the following
11111111.11111111.11 000000.00000000
Binary to Decimal Conversions for the following
11111111.11111111.11111111.1111 0000
Match the following Binary to Decimal Conversions
11111111 .00000000.00000000.00000000
|
|
11111111.11111111 .00000000.00000000
|
|
11111111.11111111.11111111 .00000000
|
|
Match the following Binary to Decimal Conversions for the following
00001010 .00001010.00001010.00001010
|
|
11011100 .00000001.00000001.00001111
|
|
10110100 .00001010.00000001.01100100
|
|
Match the following Decimal to Binary Conversions for the following
10.255.1.110
Match the following Decimal to Binary Conversions for the following
150.10.172.15
Match the following Decimal to Binary Conversions for the following
192.168.1.1
Match the following Binary to Decimal Conversions
10101010
|
|
011001000
|
|
11111000111
|
|
011111010000
|
|
Match the following Binary to Decimal Conversions
11111111
|
|
11000000
|
|
11110000
|
|
What is a poison attack?
If you are not sure on what app or tool that is used to secure your mobile device, it is highly recommended that you?
What is considered a Malware?
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
Which of the following would work BEST stored as a flat file rather than stored in a database?
SQL databases use primary and foreign keys to enable which of the following?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
Which of the following BEST describes the physical location of the data in the database?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
For which of the following is a relational database management system MOST commonly used?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following
applications should be used to create this list?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
A programmer uses DML to modify:
Which of the following is a compiled language?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
A user logs into a laptop using a username and complex password. This is an example of:
Which of the following is a reason why complex passwords are required?
Which of the following security concerns is a threat to confidentiality?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
In which of the following situations should there be come expectation of privacy?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number
Which of the following practices are being employed? (Select TWO).
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
Which of the following is primarily a confidentiality concern?
Which of the following is an example of multifactor authentication?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
USB cables have the same connectors as HDMI
HDMI is the only type of display interface that supports High Definition picture resolutions.
A computer image is made up of a number of pixels
Using the link below Match the correct connector to the specific USB type
Type A
|
|
Type B
|
|
Type B Mini
|
|
Type B Micro
|
|
Type C
|
|
Match the following connectors pins to the appropriate diaplay
15
|
|
9
|
|
20
|
|
19
|
|
Which of the following devices can USB connect? (Choose two)
What are two features of USB
What type of mouse would you recommend for someone who uses their computer principally to play computer games and why?
A friend is asking for your help in using her computer. When he presses the key marked @, a different symbol appears. What could be the cause?
You need to configure settings for an input device. What should be your first step?
You are considering buying a new display device. The model you are considering accepts digital inputs only. Your computer’s graphics adapter has a blue port with 15 holes. Would this flat-panel be a wise purchase?
You want to purchase a flat-panel monitor that can show widescreen movies. You are considering models with native resolutions of 1400×1050 and 1920×1200. Which should you choose?
A user has two USB drives connected to her PC. She complains that when she copies large files to both drives at the same time, it seems to take much longer. Why might this be?
Which of the following connector is used for a Dial -up connection (NIC)
Which of the following connector is used for a Network Interface Card (NIC)
Which of the following is used for PAN(Personal Area Network)
Dual-link makes more bandwidth available. This may be required for resolution better than HDTV(1920×1200). Which type of display type is this?
John has a PC that support both VGA and DVI connector and a monitor with VGA connector. Which of the following supports both DVI and VGA?
Which of the following use Thunderbolt ports?
Jack want to daisy chain up to six devices to a single port? Which graphics device interface should you advice him to use?
The speed at which the display is refreshed, measured in __________?
The total number of colors supported in the image is referred to as the?
A single bus can connect up to 63 devices and support hot swapping. Which type of connector would this be?
Jack need your advice on what USB device to purchase based on the data rate. Jack decides to purchase a USB 2.0 device. What data rate can Jack expect?
Jack need your advice on what USB device to purchase based on the data rate. Jack decides to purchase a USB 1.1 device. What data rate can Jack expect?
A fan improves air flow and so helps to dissipate heat.
What is the main advantage of using a CPU in 64-bit mode?
What type of component provides persistent storage? (Choose Four)
John decided to increase the clock speed on his computer to try and make the CPU run faster. What are some of the drawbacks of doing this? (Choose 2)
John wants to permanently store information when his computer is turned off, what type of storage should John consider? (Choose Two)
A bus carries four things: (Choose 4)
System firmware setup can be referred to as? (Choose three)
How would you access the system setup program on a PC?
What type of component provides a passive cooling solution?
You want to purchase a computer with a fast graphics interface. What type of expansion slot should you look for?
What is a typical speed for a modern CPU to run at?
What computer component is most restrictive and expensive in terms of determining upgrade potential for a desktop computer?
John decided to increase the clock speed on his computer to try and make the CPU run faster. What is another way John can do this without impacting power or generating more heat
Which of the following is temporary storage?
When a program starts, its instructions are loaded into _____________________.
Which of the following bus provides connections between the CPU and add-on components?
Which of the following bus is referred to as the Input/Output (I/O) bus?
Which of the following bus provides connections between the CPU and system memory?
Which of the following bus is referred to as the front Side Bus (FSB) or local bus?
Which of the following is a passive cooling device?
Which fan makes upgrades more difficult?
UEFI provides support for 64-bit CPU operation at boot, a full GUI and mouse operation at boot, and _______________. A computer with UEFI may also support booting in a legacy BIOS mode
The bootstrapping process occurs before the operating system software is loaded and is enabled by a low-level operating system called ______________.
When a computer is powered on, it needs some standard means for the CPU to start processing instructions and initialize the other components. This is referred to as:
The motherboard is the most important component in the computer because it connects all the other components
Which of the following relational database constructs is used to ensure valid values are entered for a column
Data Definition Language (DDL) commands refer to SQL commands that add to or modify the structure of the database.
A database is an organized collection of information
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
A system administrator wants to remove a record within a database. Which of the following commands should the administrator use?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following type of application architectures did the employee use?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
A company requires serveral reports that analyze related information from sales, inventory, marketing and compensation data. Which of the following is the BEST place to store this data?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A database developer is working on generating queries. If the developer needs to ensure that the output of the query has data persistence, to where should the data be written?
Which of the following consists of columns and rows of numerical or text data?
You have created a relational database. Which of the following elements uniquely identifies a record in the database?
A user, Ann, is granted permissions to access a database. What is this an example of?
You have created a relational database. Which of the following elements uniquely identifies a record in the database?
A hospital office needs to create a solution to manage patient records. They have about 1000 patients and eight staff, they want to include notes from medical professionals, emails to and from patients, and images such as X-ray. What should they create?
A school has a database with four tables, but it needs a fifth table. Which command is used to accomplish this task?
Michelle, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?
A database consists of which of the following? (Choose Two)
Which of the following terms describe concepts related to breaking code into smaller, repeatable sections? (Choose two.
Given the following pseudocode:
declare @count int
set @count = 1
set @count <10
begin
set @count=@count+1
end
select @count
Which of the following is the output of the code?
Given the following pseudocode:
“For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges.”
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
A function is BEST used for enabling programs to:
Which of the following is the closest to machine language
Which of the following data types should a developer use when creating a variable to hold a postal code?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following language types would a developer MOST likely use to create a website
Which of the following are the basic computing operations?
Given the following pseudocode
Program Breakfast
weekday = [“Monday”, “Tuesday”, “Wednesday”, “Thursday”, “Friday”]
weekday = [“Saturday”, “Sunday”]
if today = = Wednesday
output “Bacon and eggs”
else if today = = Friday
output “Oatmeal”
else if today in weekend
output “Waffles”
else
output “Pancakes”
end
A program need to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
How is a markup language differ from a compiled language?
What is an interpreted language?
Flowcharts depict which one of the following?
Which programming language use a low level language?
What shows the structure of code without using the specific syntax of any one language?
You want to understand the sequence of a program, from start to finish. Which of the following is the best to use for this purpose?
What type of programming language is designed to retrieve data from a database?
A programmer created an array to hold 10 items, all of the character data type. You want to add a 11th character. Which of the following is the best approach to doing this?
Looping makes use of which of the following statements?
A programmer is writing a program that needs to accept an input of someone’s First and Last name . What type of variable should the programmer
Interpret the following logic. A law enforcement agency has received data indicating that there are ten current threats to public safety. What should the threat level be?
if threats < 3, then level “Green”
else if threats < 6, then level “Yellow”
else if threats < 9, then level “Orange”
else if threats < 12, then level “Red”
else level “Emergency”
Interpret the following logic. For data input on someone who is 35 years old, which category will they fall into?
if age <= 13, then category “Child”
else if age <= 20, then category “Teen”
else if age < =30, then category “Twenties”
else if age < =65, then category “Adult”
else category “Senior”
Interpret the following logic. For data input on someone who is 25 years old, which category will they fall into?
if age <= 13, then category “Child”
else if age <= 20, then category “Teen”
else if age < =30, then category “Twenties”
else if age < =65, then category “Adult”
else category “Senior”
Interpret the following logic. For data input on someone who is 15 years old, which category will they fall into?
if age < 13, then category “Child”
else if age < 20, then category “Teen”
else if age < 65, then category “Adult”
else category “Senior”
A developer needs to use a notational system code that is international, which should he choose?
Which of the following is an example of a Markup programming language?
Which of the following is an example of a Query programming language?
Which of the following numbers is written in hexadecimal format?
A flowchart is a visual representation of a program that uses boxes to represent the logic
You can use a flow chart to help visualize and understand the process of a program.
A program is just a sequence of instructions for your computer to perform
Which of the following is MOST likely used to represent international text data?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following BEST describes a kilobyte?
Which of the following statements BEST describes binary?
A ________________ is legal protection for some kind of invention
A ________________ must be distinctive within the industry in which the company is selling goods and services.
_______________ is often the most valuable information asset that an organization owns.
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the documen
_____________ is automatic legal protection granted to certain types of work indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale.
Modern CPUs and bus types plus fiber optic network equipment work at these much faster speeds. Which of the following appy to the statement above?
Older PC bus interfaces and many types of network interface work at this slower signaling speed. Which of the following appy to the statement above?
This sort of capacity is found in major telecommunications links between data centers, cities, and countries
Many internal computer interface, Wireless networks and residential Internet links is typically measured in_________________.
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Older computer peripheral interfaces (or buses) and slow network links would be measured in __________.
The largest storage networks and cloud systems would have ____________ of capacity
These units are usually used to describe large storage networks.
__________ are usually used to talk about disk capacity.
Many files would be measured in ______.
Small files are often measured in ______.
A nibble is ______________ bits. It is also referred to 1/2 of a byte.
A byte is ______________ bits
Convert 75 to Hexadecimal
255 in decimal is what in Hexadecimal
75 in decimal is what in binary?
255 in decimal is what in binary?
The market for workstation operating systems is divided into three main sections:? (Choose all that apply)
Two major types of mobile Operating Systems are? (Choose all that apply)
Two main types of PC firmware are? (Choose all that apply)
Common Windows files system includes (Choose all that apply)
Common Linux files system includes (Choose all that apply
Common Apple files system includes (Choose all that apply)
Which of the following operating systems do not require extensions on files to execute a program?(Choose all that apply)
___________________ notation represents base 2
Which Operation System (OS) offers centralization of resources?
A commercial OS ___________________________________.
A Open Source OS ___________________________________.
Which of the following computing devices would be used to provide centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
Which of the following BEST describes an application running on a typical operating system?
A system administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A system administrator uses a program that installs an operating system on a host machine already running Windows 10. This program is an example of:
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devicees would be BEST for the developer to buy?
Which of the following are function of an Operating Systems? (Choose all that apply)
Which Workstations Operating System was designed to work on standalone or workgroup PCs and laptops in a home or small office.
Which Workstations Operating System was designed to run on servers in business networks.
Firmware is usually stored in special types of memory, called flash ROM
Which Workstations Operating System was designed to work as a client in business networks
An embedded system is a computer or appliance designed for a very specific function
A mobile device OS is one designed for handheld devices, such as smartphones and tablets
A workstation OS is one that runs a traditional desktop PC or laptop.
John was asked to explain the basic function of an operating system? What should John say?
What would you consider to be an embedded operating system?
John installed an application on his Windows machine, after the installation he experience difficulty running it? How would you advice John to proceed?
What device use IOS operating system?
Which of the following are best practices to avoid self injury?
Should the following recommendation be considered for ergonomics?
What are some challenges that may result from improper placement of devices and sitting?
What are two important factors when setting up your computer to protect yourself from self injury?
Ergonomics is the study of factors affecting the performance of people at work.
What should be considered when you install a new computer system
Match the correct steps you should take when setting up a computer based on CompTIA instructions
Step 1
|
|
Step 2
|
|
Step 3
|
|
Step 4
|
|
Step 5
|
|
Step 6
|
|
Step 7
|
|
Step 8
|
|
Step 9
|
|
Which of the following storage types is MOST vulnerable to magnetic damage?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following are input devices? (Choose All That Apply)
Which of the following is both an input and output device?
Match the correct data type to the code
x = 200
|
|
x = 90.5
|
|
x = False
|
|
x = "Hello Good Morning"
|
|
The following code what data type of y would output to the screen?
>>> y=str(“Today is a Good Day”)
>>> print(type(y))
The following link will show you how to install python app on your system. https://vimeo.com/827151528?share=copy
Once python is installed complete the following to determine the appropriate data type
y = 30.5
#display y:
print(y)
#display the data type of y:
print(type(y))
The following link will show you how to install python app on your system. https://vimeo.com/827151528?share=copy
Once python is installed complete the following to determine the appropriate data type
y = True
#display y:
print(y)
#display the data type of y:
print(type(y))
The following link will show you how to install python app on your system. https://vimeo.com/827151528?share=copy
Once python is installed complete the following to determine the appropriate data type
y = 30
#display y:
print(y)
#display the data type of y:
print(type(y))
The following link will show you how to install python app on your system. https://vimeo.com/827151528?share=copy
Once python is installed complete the following to determine the appropriate data type
y = “Today is a Good Day”
#display y:
print(y)
#display the data type of y:
print(type(y))
Which of the following is true about Floating-point numbers?
Which of the following is true about characters(char)?
Which of the following is true about Boolean values?
Which of the following is true about integers?
Something is either TRUE or FALSE (with a 1 or 0) is what data type?
For example 4.1, 26.4, or 5.62 is what data type?
For example: 5, 21, or 65536 is what data type?
Which of the following is true about strings?
_____________ is a collection of text characters. For example: XYZ, Hello world. There is no real limit on the amount of storage that can be used by a string.
_________________ is a single textual character, and can be a letter of the alphabet, a symbol, or, indeed, a numerical character. For example: a, D, 7, $, @, #. These consume one byte of storage.
These are a special numeric data type indicating that something is either TRUE or FALSE (with a 1 or 0).
Which of the following data types should a developer use when creating a variable to hold a postal code?
________________ can support decimal fractions such as 4.1, 26.4, or 5.62.
________________ are whole numbers. For example: 5, 21, or 65536. An __________ data type consumes 1 to 8 bytes of computer storage.
Which notation system supports presenting the largest numbers using the fewest digits:
What are some advantages of Unicode
What is the difference between ASCII and Unicode? (Choose Two)
Match the correct Unicode character encoding standards to it respective description.
UTF-8
|
|
UTF-16
|
|
UTF-32
|
|
UTF-2
|
|
Which of the following are true regarding ASCII (American Standard Code for Information Interchange)?