Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT Fundamentals Practice Questions with Answers, Exams of Nursing

A series of practice questions and answers covering various topics in it fundamentals, including storage units, input/output devices, security policies, network connections, mobile phone protection, software licensing, troubleshooting, programming languages, and more. These questions can be used to test one's understanding and preparation in it fundamentals.

Typology: Exams

2023/2024

Available from 02/13/2024

TUTOR1
TUTOR1 🇺🇸

3.8

(4)

904 documents

1 / 18

Toggle sidebar

Related documents


Partial preview of the text

Download IT Fundamentals Practice Questions with Answers and more Exams Nursing in PDF only on Docsity! 1 lOMoAR cPSD|37409616 ITF+ questions with correct (answers) 2024 1 Which of the following storage units can be used to represent 1024MB? A. 1GB B. 1KB C. 1TB D. 1PB 2 An Image displayed on a monitor is an example of: A. Input B. Output C. Processing D. Storage 3 A school has a sign posted in the computer lab that says, "Sharing passwords with others is prohibited." This is an example of: A. Social networking B. A security policy C. File sharing D. Instant messaging 4 A user buys a new desktop computer and then connects a cable that allows the computer to connect to the web. Which of the following ports would MOST likely be used? A. DVI B. HDMI C. Ethernet D. Thunderbolt 2 E. Bluetooth 5 Which of the following would BEST help to protect against unauthorized use of a mobile phone? A. Pop-up blocker and cookie cleaner B. Alternate browser and private mode C. PIN and screen lock D. Encrypted messaging and time-expiring text 6 Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken by Ann. Which of the following Installation types does this BEST describe? A. Driver Installation B. Plug and Play C. Web based D. Manual 7 Which of the following protocols is used for secure web browsing? A. SFTP B. HTTPS C. L2TP D. IMAP 8 Which of the following is MOST secure password? A. Happybirthday12 B. HappyDay12! C. H*ppyBirthday%12 D. HappyBirthday123 9 Which of the following computer components is primarily responsible for preventing overheating? A. Fan B. SSD C. CPU D. Firmware 5 B. Bluetooth module C. Infrared port D. WLAN card 19 A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation? A. USB B. NFC C. DSL D. DVI 20 Which of the following operating systems do not require extensions on 昀椀les to execute a program? (Choose two) A. Windows 8 B. Android C. UNIX D. Windows server 2012 E. Linux 21 Which of the following data types should a developer use when creating a variable to hold a postal code? A. Integer B. String C. Float D. Boolean 22 A technician has been asked to assign an IP address to anew desktop computer. Which of the following is a valid IP address the technician should assign? A. 127.0.0.1 B. 172.16.2.189 6 C. 192.168.257.1 D. 255.255.255.0 23 Which of the following would be used to send messages using the SMTP protocol? A. Document sharing software B. Instant messaging software C. Conferencing software D. Email software 24 The sales department need to keep a customer list that contains names, contact information, and sales records. That list will need to edited by multiple people at the same time. Which of the following applications should be used to create the list? A. Database software B. Word processing software C. Conferencing software D. Presentation software 25 Which of the following features of a smart phone controls the screen orientation? A. Gyroscope B. NFC C. Accelerometer D. GPS 26 Which of the following is the BEST example of productivity software? A. Word processing software B. Entertainment software C. Image editing software D. Anti-Malware software 27 You want to upgrade your computer to give it a faster boot time and more space for your 昀椀les. What should you purchase? 7 A. SSD B. CPU C. RAM D. HDD 28 Which of the following peripherals is considered an input device? A. Touchscreen B. Flash drive C. Scanner D. Printer 29 You need to set up a wireless router for a friend. He want to be sure that his network is secure. Which wireless security method should you implement? A. WPA B. NAT C. WEP D. WPA2 30 David works as a database administrator for XYZ Inc. He wants to remove a column from an existing database. Which of the following command should he use to accomplish the task? A. DELETE B. ALTER C. REMOVE D. DROP 31 A user has been accused of hacking into a server. Which of the following would keep him form denying that he did it? A. Nonrepudiation B. Accounting 10 D. Array 41 Which operating system named its version after large cats? A. iOS B. Chrome OS C. Android D. OS X 42 Which of the following devices are used for persistent user data storage in a computer? A. Flash drive B. ROM C. RAM D. HDD 43 When creating a relational database, what is the name of the rules and structure? A. Tables B. Forms C. Constraints D. Schema 44 What type of security is involved when pairing two Bluetooth devices together? A. A PIN is provided by the Bluetooth device B. SSL certi昀椀cate are exchange C. There is no security involved D. The Bluetooth security layer negotiates the security mechanism 45 When providing computer support and testing solutions, what should you always do 昀椀rst? A. Check the simple stu昀昀 B. Restart the computer 11 C. Establish a plan of action D. Check to see whether its user error 46 Which of the following concerns includes replay attack? A. Con昀椀dentiality B. Integrity C. Availability D. Authentication 47 You open your web browser and type in Google, but you computer can't 昀椀nd the website. Your neighbor's computer 昀椀nds it just 昀椀ne. What is most likely the cause? A. The website is down B. Incorrect WPA2 con昀椀guration C. Incorrect DHCP con昀椀guration D. Incorrect DNS con昀椀guration 48 A while statement is used by which type of programming logic? A. Boolean B. Looping C. Branching D. Compiling 49 Which of the following on your computer is considered 昀椀rmware? A. SSD B. RAM C. BIOS D. CMOS 50 Which data type exists only in true and false states? 12 A. Binary B. Boolean C. Char D. Float 51 Your friend Marcos asks you which of the following are the most secure. What do you tell him? A. Infrared B. Fiber-optic C. UTP D. 802.11n 52 For security purposes, which of the following user accounts are disabled by default? A. Power users B. Administrator C. Guest D. Users 53 Which of the following statements is true regarding a foreign key in a relational data base? A. There can be only one per table B. They are required C. Null values are allowed D. They are automatically indexed 54 What was the 昀椀rst widely adopted video connector standard? A. XGA B. DVI C. CGA D. VGA 15 C. Establish a plan of action D. Verify full system functionality 64 Which of the following BEST describes a kilobyte? A. A kilobyte is a measurement of storage B. A kilobyte is a measurement of throughtput C. A kilobyte is a measurement of power D. A kilobyte is a measurement of processor speed 65 Which of the following are the basic computing operations? A. Input, process, putput, and feedback B. Input, output, storage, and feedback C. Input, process, and output D. Input, process, output and storage 66 Which of the following would MOST likely prevent malware sent as compromised 昀椀le via email from infecting a person’s computer? A. Email previewing B. Patching C. Clear browsing cache D. Kill process 67 A database administrator 昀椀nds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? A. UPDATE B. DELETE C. ALTER D. DROP 68 hich of the following is MOST likely used to represent international text data? 16 A. ASCII B. Octal C. Hexadecimal D. Unicode 69 Which of the following is the closest to machine language? A. Scripted language B. Compiled language C. Query language D. Assembly language 70 A technician needs to install a wireless router for a client that supports speeds up to 11Mbs and operates on the 2.4GHz band. Which of the following should the technician use? A. 802.11a B. 802.11b C. 802.11g D. 802.11n 71 A computer user is downloading software form the internet and notices the following at the end of the install 昀椀le:’…x86.exe’.Which of the following statements BEST represents what the ’…x86.exe’ means in the installation 昀椀le? A. x86 only supports an installation on a 32-bit CPU architecture B. x86 supports an installation on a 32-bit and a 64-bit CPU architecture C. x86 only supports an installation on a 64-bit CPU architecture D. x86 supports an installation on a 16-bit CPU architecture 72 A game developer is purchasing a computer device to develop a game and recognizes the game engine software will require a device with high-end speci昀椀cations that can be upgraded. Which of the following devices would be BEST for the developer to buy? A. Laptop B. Server 17 C. Game console D. Workstation 73 When transferring a 昀椀le across the network, which of the following would be the fastest transfer rate? A. 1001Kbps B. 110Mbps C. 1.22Gbps D. 123Mbps 74 A function is best used for enabling programs to: A. Hold a list of numbers B. Be divided into reusable components C. De昀椀ne needed constant values D. De昀椀ne variables to hold di昀昀erent values 75 A help desk technician encounters an issue and wants to 昀椀nd out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? A. Check Knowledge Base. B. Search local logs. C. Research possible theories. D. Question users. 76 The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? A. Update from 802.11b to 802.11g. B. Ensure sources of EMI are removed. C. Enable WPA2-Enterprise. D. Use WiFi Protected Setup.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved