CBT (ITF+-Computer Basics)

Welcome to your CBT (ITF+-Computer Basics)

What type of computer, also called a notebook, has a monitor that folds down to cover the keyboard for transport?

What would be an appropriate use for a supercomputer?

Which of these is a workstation operating system?

Which of these operating systems cannot run on a desktop PC with an Intel processor?

What kind of OS enables users to interact with it using a pointer and graphics?

A version of Linux packaged with add-ons and utilities for a particular purpose is known as a:

A BlackBerry is a type of smartphone known for what distinctive feature that most other modern smartphones lack?

What operating system is used on an iPad?

What kind of network is used to connect individual computers in a single physical location?

Listening to music using an online service like Spotify is an example of what?

You are running virtual machines on a single physical server. The server operating system does not run any other applications and is dedicated to virtualization. What type of hypervisor is this?

Which factor distinguishes IoT devices from standard computing devices such as laptops and smartphones?

How are information and data different?

Which of these is not part of the data processing sequence?

What is another name for a CPU?

Which of these is not a feature of a CPU?

Why is passive cooling not usually used for a CPU?

What is the main advantage of liquid cooling over air cooling?

In what type of computer is SODIMM memory used?

In what two ways are DDR3 DIMMs better than DDR2 DIMMs? (Choose two.)

What manages and controls the speed of a motherboard's buses?

What are the two functions of a desktop PC's power supply? (Choose two.)

What is the reason for different color wires on a power supply?

You are reconfiguring a cloud virtual machine with additional vCPUs and additional RAM. Which term best describes your actions?

A video card on a modern motherboard would run best in which type of slot?

Which port is used exclusively for external hard drives?

Which of these external ports is not obsolete?

What type of connector does a modem use?

The USB connector that plugs into a full-size printer is:

Which of these is not a flat-panel display?

Which of these ports are physically identical?

What is the purpose of a wheel on a mouse?

A video camera that works only when connected to a computer is a:

A receipt printer on a cash register is likely to be what kind of printer?

A video card on a modern motherboard would run best in which type of slot?

Which port is used exclusively for external hard drives?

Which of these external ports is not obsolete?

What type of connector does a modem use?

The USB connector that plugs into a full-size printer is:

Which of these is not a flat-panel display?

Which of these ports are physically identical?

What is the purpose of a wheel on a mouse?

A video camera that works only when connected to a computer is a:

A receipt printer on a cash register is likely to be what kind of printer?

Which of the following practices are being employed? (Choose two)

Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?.

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.

Which of the following BEST describes an application running on a typical operating system

49. A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.

Which of the following BEST describes a kilobyte?.

Which of the following BEST describes the practice of providing user credentials when logging onto the network?.

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?.

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?.

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.

Which of the following security concerns is a threat to confidentiality.

Which of the following actions is the FINAL step in the standard troubleshooting methodology?.

A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?.

Which of the following are the basic computing operations?

Which of the following is a compiled language?.

A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician NEXT step?

Which of the following is primarily a confidentiality concern?

Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

A UPS provides protection against.

Which of the following is an advantage of installing an application to the cloud?

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

Which of the following statements BEST describes binary?

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

The broadcast signal from a recently installed wireless access point is not as strong an expected. Which of the following actions would BEST improve the signal strength?

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

Which of the following is MOST likely used to represent international text data?

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two).

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

In which of the following situations should there be come expectation of privacy?

Which of the following storage devices have a spinning disk? (choose two.)

Which of these is not a flat-panel display?

CDN means..................

DDOS means

Which of the following is the main purpose of a CDN?

What is the main advantage of using a CDN?

What is the term used to describe the network of servers that make up a CDN?

Which of the following technologies is commonly used for building the user interface of a web application?

What does IoT stand for?

Which of the following is NOT a characteristic of IoT devices?

What does PWA stand for?

Do PWAs require installation from app stores?

Give vivid explanation of CDN
Give vivid explanation
Explain what you know by Web Apps. Your explanation should include its characteristics

Explain vividly

Explain what you know by PWA. Your explanation should include its characteristics

Explain vividly

Explain what you know by IOT. Your explanation should include its characteristics

Explain vividly

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Alert: Content selection is disabled!!