IT Fundamentals Practice Exam Questions with Solutions
1. What kind of computer firmware provides support for mouse operation at boot?: UEFI
2. What file system features uses a change log?: Journaling
3. Which of the following does NOT encrypt web page data?: Mobile device encryption
4. Why would a programmer create a function instead of a procedure?: The process which calls the
function needs to receive back a return value
5. What is an example of an output device?: Loudspeaker
6. A complex software application collects requests from general users for cer- tain sets of
data through a form, connects to a Microsoft SQL (Structured Query Language) Server
database with ODBC (Open Database Connectivity), submits the criteria for the data query,
receives the results, and displays them to the users as a report on the screen.
Which combination of database access methods best describes this process?-
: User interface and programmatic access
7. Which of the following will NOT help prevent the attachment of portable personally
owned devices, such as smartphones and Universal Serial Buses (USBs)?: Requiring a fob
8. What is an advantage of the float data type compared to the integer data type?: The
float data type is not limited to whole numbers
9. A website visitor realizes that an important notification is not showing be- cause the
browser has a pop-up blocker. What's the best thing to do?: Add an exception for this website
10. What's a true statement about variables?: A variable can have any data type that the program- ming
,language supports
11. Data encryption, firewalls, and backups are examples of what?: Security controls
12. What port does an Ethernet network adapter use?: RJ-45
13. Which of the following does NOT follow accepted MAC (Media Access Con- trol)
address format?: 192:168:0.10/100
14. Which of the following helps protect against dangerous unsolicited email file
attachment threats?: Using anti-malware
15. When does this pseudocode execute the print command?
If i== 0 AND i ! = 0 Then print
"Yes"
End If: Never
16. What could a network administrator implement to allow employees to se- curely
connect remotely to the corporate network?: A Virtual Private Network (VPN)
17. A user needs to uninstall a driver on a computer running Windows OS
(Operating System). Which page or window does NOT contain the relevant options to
accomplish this?: Driver Manager
18. How much storage does a character data type use?: 1 byte
19. A table contains information about the company's customers. The infor- mation
includes First Name, Last Name, Address, Phone, and Email for each customer.
What's the best way to set up a primary key for this table?: Create a new field called Id
20. After a network administrator restores data from a backup due to a system outage,
, what is the first step before allowing user access to the data?: Ensure the integrity of the data
21. In a SQL (Structured Query Language) command, what does the WHERE clause
determine in the result set?: The number of rows
22. A laptop built a year ago is likely to have which CPU (Central Processing Unit)?:
64-bit
23. An Employee object includes the following fields:
Name
Address
Phone Age
Date Of Birth Salary
Which of the following is NOT a good example of a method in this object?: Cal- culateSalesTax, which
multiplies two numbers (input as variables) and returns the result to the calling program
24. Why do companies pay for a software license subscription plan instead of a less
expensive one-time purchase?: One-time purchases do not include full-feature upgrades
25. What is the main purpose of NIC (Network Interface Card) expansion card?: To provide
additional NICs to servers on a wired business network
26. An attacker captures password packets to figure out a user's password to gain
access to a host on a corporate network, and masquerades as that user. Which of the
following is a threat to integrity that describes this attack?: Imper- sonation
27. What type of software is Microsoft Office?: Productivity software
28. A package-delivery service is working with address information, which con- tains a
1. What kind of computer firmware provides support for mouse operation at boot?: UEFI
2. What file system features uses a change log?: Journaling
3. Which of the following does NOT encrypt web page data?: Mobile device encryption
4. Why would a programmer create a function instead of a procedure?: The process which calls the
function needs to receive back a return value
5. What is an example of an output device?: Loudspeaker
6. A complex software application collects requests from general users for cer- tain sets of
data through a form, connects to a Microsoft SQL (Structured Query Language) Server
database with ODBC (Open Database Connectivity), submits the criteria for the data query,
receives the results, and displays them to the users as a report on the screen.
Which combination of database access methods best describes this process?-
: User interface and programmatic access
7. Which of the following will NOT help prevent the attachment of portable personally
owned devices, such as smartphones and Universal Serial Buses (USBs)?: Requiring a fob
8. What is an advantage of the float data type compared to the integer data type?: The
float data type is not limited to whole numbers
9. A website visitor realizes that an important notification is not showing be- cause the
browser has a pop-up blocker. What's the best thing to do?: Add an exception for this website
10. What's a true statement about variables?: A variable can have any data type that the program- ming
,language supports
11. Data encryption, firewalls, and backups are examples of what?: Security controls
12. What port does an Ethernet network adapter use?: RJ-45
13. Which of the following does NOT follow accepted MAC (Media Access Con- trol)
address format?: 192:168:0.10/100
14. Which of the following helps protect against dangerous unsolicited email file
attachment threats?: Using anti-malware
15. When does this pseudocode execute the print command?
If i== 0 AND i ! = 0 Then print
"Yes"
End If: Never
16. What could a network administrator implement to allow employees to se- curely
connect remotely to the corporate network?: A Virtual Private Network (VPN)
17. A user needs to uninstall a driver on a computer running Windows OS
(Operating System). Which page or window does NOT contain the relevant options to
accomplish this?: Driver Manager
18. How much storage does a character data type use?: 1 byte
19. A table contains information about the company's customers. The infor- mation
includes First Name, Last Name, Address, Phone, and Email for each customer.
What's the best way to set up a primary key for this table?: Create a new field called Id
20. After a network administrator restores data from a backup due to a system outage,
, what is the first step before allowing user access to the data?: Ensure the integrity of the data
21. In a SQL (Structured Query Language) command, what does the WHERE clause
determine in the result set?: The number of rows
22. A laptop built a year ago is likely to have which CPU (Central Processing Unit)?:
64-bit
23. An Employee object includes the following fields:
Name
Address
Phone Age
Date Of Birth Salary
Which of the following is NOT a good example of a method in this object?: Cal- culateSalesTax, which
multiplies two numbers (input as variables) and returns the result to the calling program
24. Why do companies pay for a software license subscription plan instead of a less
expensive one-time purchase?: One-time purchases do not include full-feature upgrades
25. What is the main purpose of NIC (Network Interface Card) expansion card?: To provide
additional NICs to servers on a wired business network
26. An attacker captures password packets to figure out a user's password to gain
access to a host on a corporate network, and masquerades as that user. Which of the
following is a threat to integrity that describes this attack?: Imper- sonation
27. What type of software is Microsoft Office?: Productivity software
28. A package-delivery service is working with address information, which con- tains a