Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

IT Fundamentals Practice Exam Questions with Solutions

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
26-01-2026
Written in
2025/2026

IT Fundamentals Practice Exam Questions with Solutions

Institution
IT Fundamith Solut
Course
IT Fundamith Solut

Content preview

IT Fundamentals Practice Exam Questions with Solutions



1. What kind of computer firmware provides support for mouse operation at boot?: UEFI


2. What file system features uses a change log?: Journaling


3. Which of the following does NOT encrypt web page data?: Mobile device encryption


4. Why would a programmer create a function instead of a procedure?: The process which calls the

function needs to receive back a return value

5. What is an example of an output device?: Loudspeaker


6. A complex software application collects requests from general users for cer- tain sets of

data through a form, connects to a Microsoft SQL (Structured Query Language) Server

database with ODBC (Open Database Connectivity), submits the criteria for the data query,

receives the results, and displays them to the users as a report on the screen.


Which combination of database access methods best describes this process?-

: User interface and programmatic access

7. Which of the following will NOT help prevent the attachment of portable personally

owned devices, such as smartphones and Universal Serial Buses (USBs)?: Requiring a fob

8. What is an advantage of the float data type compared to the integer data type?: The

float data type is not limited to whole numbers

9. A website visitor realizes that an important notification is not showing be- cause the

browser has a pop-up blocker. What's the best thing to do?: Add an exception for this website

10. What's a true statement about variables?: A variable can have any data type that the program- ming


,language supports

11. Data encryption, firewalls, and backups are examples of what?: Security controls


12. What port does an Ethernet network adapter use?: RJ-45


13. Which of the following does NOT follow accepted MAC (Media Access Con- trol)

address format?: 192:168:0.10/100

14. Which of the following helps protect against dangerous unsolicited email file

attachment threats?: Using anti-malware

15. When does this pseudocode execute the print command?




If i== 0 AND i ! = 0 Then print

"Yes"

End If: Never

16. What could a network administrator implement to allow employees to se- curely

connect remotely to the corporate network?: A Virtual Private Network (VPN)

17. A user needs to uninstall a driver on a computer running Windows OS

(Operating System). Which page or window does NOT contain the relevant options to

accomplish this?: Driver Manager

18. How much storage does a character data type use?: 1 byte


19. A table contains information about the company's customers. The infor- mation

includes First Name, Last Name, Address, Phone, and Email for each customer.


What's the best way to set up a primary key for this table?: Create a new field called Id

20. After a network administrator restores data from a backup due to a system outage,


, what is the first step before allowing user access to the data?: Ensure the integrity of the data

21. In a SQL (Structured Query Language) command, what does the WHERE clause

determine in the result set?: The number of rows

22. A laptop built a year ago is likely to have which CPU (Central Processing Unit)?:

64-bit

23. An Employee object includes the following fields:




Name

Address

Phone Age

Date Of Birth Salary



Which of the following is NOT a good example of a method in this object?: Cal- culateSalesTax, which

multiplies two numbers (input as variables) and returns the result to the calling program

24. Why do companies pay for a software license subscription plan instead of a less

expensive one-time purchase?: One-time purchases do not include full-feature upgrades

25. What is the main purpose of NIC (Network Interface Card) expansion card?: To provide

additional NICs to servers on a wired business network

26. An attacker captures password packets to figure out a user's password to gain

access to a host on a corporate network, and masquerades as that user. Which of the

following is a threat to integrity that describes this attack?: Imper- sonation

27. What type of software is Microsoft Office?: Productivity software


28. A package-delivery service is working with address information, which con- tains a

Written for

Institution
IT Fundamith Solut
Course
IT Fundamith Solut

Document information

Uploaded on
January 26, 2026
Number of pages
30
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$22.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
HESIGRADER001 chamberlain college of nursing
Follow You need to be logged in order to follow users or courses
Sold
50
Member since
4 year
Number of followers
41
Documents
4078
Last sold
2 months ago

2.6

8 reviews

5
2
4
1
3
1
2
0
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions