A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Which of the following should have the HIGHEST expectation of privacy?
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following programming languages would most likely include tables and the select command?
A business would like to create an employee portal that employees will have access to when they are at work.
The employees will not be able to connect to the portal from home without a VPN connection. Which of the
following types of application does this describe?
Which of the following is an advantage of a fiat file?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
Which of the following is a reason why complex passwords are required?
Which of the following language types most likely controls the way a web page looks?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Which of the following database concepts would MOST likely use a CSV file?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
Which of the following is an example of multifactor authentication?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
Which of the following database structures is the most granular?
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
Which of the following connection types is typically used for a display monitor?
Which of the following file extensions is used for a consolidated group of files?
Which of the following is an example of a compiled language?
Which of the following storage types uses platters to store data?
Which of the following is a logical structure for storing files?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
Which of the following best protects data in transit?
A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?
Which of the following is most appropriate to list on a social media site about an employer?
A technician has verified full system functionality. Which of the following actions should the technician take next?
A technician has successfully verified full system functionality after implementing the solution to a problem.
Which of the following is the NEXT troubleshooting step the technician should do?
Which of the following data types should a developer use when creating a variable to hold a postal code?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Which of the following is a value that uniquely identifies a database record?
Which of the following interfaces is best for viewing database performance information?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
Which of the following contains exactly four copper wires?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
Which of the following are benefits of a security awareness training program9 (Select two).
Which of the following is both an input and output device?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
A user logs into a laptop using a username and complex password. This is an example of:
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?
A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?
Which of the following allows wireless devices to communicate to a wired network?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following is a wireless communication that requires devices to be within 6in of each other to
transfer information?