Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ITF+ PRACTICE TEST EXAM QUESTIONS WITH VERIFIED ANSWERS, ALREADY PASSED, Exams of Computer Science

1. Which of the following relational database constructs is used to ensure valid values are entered for a column? - ANS ✅Constraint 2. A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? - ANS ✅Encryption 3. A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: - ANS ✅a Type 1 hypervisor. 4. Which of the following is a compiled language? - ANS ✅Java 5. Which of the following actions is the FINAL step in the standard troubleshooting methodology? - ANS ✅Document the solution and cause

Typology: Exams

2024/2025

Available from 05/27/2025

WINGS_TO-FLY
WINGS_TO-FLY 🇺🇸

1

(1)

1.1K documents

1 / 14

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ITF+
1
ITF+ Practice test
ITF+ PRACTICE TEST EXAM QUESTIONS
WITH VERIFIED ANSWERS, ALREADY
PASSED! (COMPLETE & ACCURATE)
1. Which of the following relational database constructs is used to
ensure valid values are entered for a column? - ANS Constraint
2. A user is buying a laptop. The user will have a lot of personal and
confidential information on the laptop. The user wants to ensure data
cannot be accessed by anyone, even if the laptop is stolen. Which of
the following should be set up to accomplish this? - ANS Encryption
3. A systems administrator uses a program that interacts directly with
hardware to manage storage, network, and virtual machines. This
program is an example of: - ANS a Type 1 hypervisor.
4. Which of the following is a compiled language? - ANS Java
5. Which of the following actions is the FINAL step in the standard
troubleshooting methodology? - ANS Document the solution and
cause
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe

Partial preview of the text

Download ITF+ PRACTICE TEST EXAM QUESTIONS WITH VERIFIED ANSWERS, ALREADY PASSED and more Exams Computer Science in PDF only on Docsity!

ITF+ PRACTICE TEST EXAM QUESTIONS

WITH VERIFIED ANSWERS, ALREADY

PASSED! (COMPLETE & ACCURATE)

  1. Which of the following relational database constructs is used to ensure valid values are entered for a column? - ANS ✅Constraint
  2. A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? - ANS ✅Encryption
  3. A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: - ANS ✅a Type 1 hypervisor.
  4. Which of the following is a compiled language? - ANS ✅Java
  5. Which of the following actions is the FINAL step in the standard troubleshooting methodology? - ANS ✅Document the solution and cause
  1. Which of the following is a value that uniquely identifies a database record? - ANS ✅Primary key
  2. A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? - ANS ✅SELECT
  3. Which of the following statements BEST describes binary? - ANS ✅A notational system used to represent an a€œona€ or a€œoffa€ state
  4. Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the programs run. Which of the following would Joe
  5. MOST likely use to accomplish this? - ANS ✅Variable
  6. An end users computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step? - ANS ✅Document the findings.
  7. A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of? - ANS ✅Authentication
  1. program Breakfast
  2. weekday = ["Monday", "Tuesday", "Wednesday", "Thursday", "Friday"]
  3. weekend = ["Saturday", "Sunday"]
  4. if today == Wednesday
  5. output "Bacon and eggs"
  6. else if today == Firday
  7. output "Oatmeal"
  8. else if today in weekend
  9. out "Waffles"
  10. else
  11. output "Pancakes"
  12. end
  13. If the Breakfast program ran on Sunday, which of the following would be the output? - ANS ✅Waffles
  14. A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function? - ANS ✅Driver
  15. Which of the following BEST describes a kilobyte? - ANS ✅A kilobyte is a measurement of storage (e.g., 100KB).
  1. Which of the following security concerns is a threat to confidentiality? - ANS ✅Replay attack
  2. Which of the following software license models allows a developer to modify the original code and release its own version of the application? - ANS ✅Open source software
  3. Which of the following are the basic computing operations? - ANS ✅Input, process, output, and storage
  4. Which of the following would work BEST stored as a flat file rather than stored in a database? - ANS ✅Contact list
  5. An administrator grants permission for a user to access data in a database. Which of the following actions was performed? - ANS ✅Data definition
  6. An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? - ANS ✅Client-server application
  7. Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that
  1. Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a personal's computer? - ANS ✅Patching
  2. A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task? - ANS ✅WLAN card
  3. Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed? - ANS ✅Password reuse
  4. A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure? - ANS ✅WPA
  5. Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.) - ANS ✅POP3 and SMTP
  6. A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? - ANS ✅DROP
  1. A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation? - ANS ✅DVI
  2. Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used? - ANS ✅Satellite
  3. Which of the following is MOST likely used to represent international text data? - ANS ✅Unicode
  4. For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: - ANS ✅prioritization
  5. Which of the following operating systems do not require extensions on files to execute a program? (Select TWO). - ANS ✅UNIX and Linux
  6. A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select? - ANS ✅802.11b
  1. Which of the following is the closest to machine language? - ANS ✅Assembly languages
  2. A function is BEST used for enabling programs to: - ANS ✅define variables to hold different values.
  3. When transferring a file across the network, which of the following would be the FASTEST transfer rate? - ANS ✅1.22Gbps
  4. A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign? - ANS ✅172.16.2.
  5. A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy? - ANS ✅Server
  6. A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data? - ANS ✅Database
  1. A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. Which of the following statements BEST represents what the x86.exe means in the installation file? - ANS ✅x86 only supports an installation on a 32 - bit CPU architecture.
  2. Which of the following would be used to send messages using the SMTP protocol? - ANS ✅Email software
  3. Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing? - ANS ✅Configure prompting before downloading content.
  4. Which of the following is an example of information a company would ask employees to handle in a sensitive manner? - ANS ✅Customer date of birth
  5. The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list? - ANS ✅Database software
  6. Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages.
  1. Which of the following allows wireless devices to communicate to a wired network? - ANS ✅Access point
  2. Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? - ANS ✅Server
  3. Which of the following describes something in a database that refers to the unique identifier in the parent table? - ANS ✅Attribute
  4. For which of the following is a relational database management system MOST commonly used? - ANS ✅Storing information
  5. Which of the following BEST describes an application running on a typical operating system? - ANS ✅Process
  6. The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? - ANS ✅Ensure sources of EMI are removed.
  7. A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting

steps is the technician using by browsing to the same site? - ANS ✅Duplicate the problem.

  1. A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue? - ANS ✅Ensure both devices are connected to the LAN.