Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FC0-U61 Exam Dumps - CompTIA IT Fundamentals+ Certification Exam

Question # 4

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Full Access
Question # 5

Which of the following data types should a developer use when creating a variable to hold a postal code?

A.

Integer

B.

String

C.

Float

D.

Boolean

Full Access
Question # 6

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Full Access
Question # 7

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Full Access
Question # 8

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Full Access
Question # 9

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A.

Update from 802.11b to 802.11g.

B.

Ensure sources of EMI are removed.

C.

Enable WPA2-Enterprise.

D.

Use WiFi Protected Setup.

Full Access
Question # 10

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Full Access
Question # 11

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Full Access
Question # 12

Which of the following BEST describes a kilobyte?

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Full Access
Question # 13

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Full Access
Question # 14

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Full Access
Question # 15

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Full Access
Question # 16

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Full Access
Question # 17

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Full Access
Question # 18

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

A.

Method

B.

Object

C.

Property

D.

Attribute

Full Access
Question # 19

A user logs into a laptop using a username and complex password. This is an example of:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Full Access
Question # 20

Which of the following is the closest to machine language?

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Full Access
Question # 21

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Full Access
Question # 22

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Full Access
Question # 23

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Full Access
Question # 24

Which of the following relational database constructs is used to ensure valid values are entered for a column?

A.

Schema

B.

Permissions

C.

Constraint

D.

Column

Full Access
Question # 25

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Full Access
Question # 26

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Full Access
Question # 27

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Full Access
Question # 28

Which of the following business continuity concepts is the best example of fault tolerance?

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Full Access
Question # 29

Which of the following language types most likely controls the way a web page looks?

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Full Access
Question # 30

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Full Access
Question # 31

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Full Access
Question # 32

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.

Boolean

B.

Integer

C.

Float

D.

Char

Full Access
Question # 33

Which of the following best describes the differences between data and information?

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Full Access
Question # 34

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Full Access
Question # 35

Which of the following can a company use to protect its logo?

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Full Access
Question # 36

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Full Access
Question # 37

Which of the following file extensions is used for a consolidated group of files?

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Full Access
Question # 38

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Full Access
Question # 39

Which of the following is most appropriate to list on a social media site about an employer?

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Full Access
Question # 40

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Full Access
Question # 41

Which of the following BEST explains the use of float over integer to store monetary values?

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Full Access
Question # 42

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Full Access
Question # 43

Which of the following commands can be used to remove a database permanently?

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Full Access
Question # 44

Which of the following protocols is used to relay email from a user's mail server?

A.

IMAP

B.

FTP

C.

SMTP

D.

POP3

Full Access
Question # 45

Which of the following commands would most likely be used to add data to an existing database table?

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Full Access
Question # 46

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Full Access
Question # 47

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Full Access
Question # 48

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Full Access
Question # 49

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Full Access
Question # 50

Which of the following data types should a database administrator use to store customer postal codes?

A.

Float

B.

String

C.

Boolean

D.

Integer

Full Access
Question # 51

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

A.

Array

B.

Vector

C.

List

D.

String

Full Access
Question # 52

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Full Access
Question # 53

SQL databases use primary and foreign keys to enable which of the following?

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Full Access
Question # 54

Which of the following is secure?

A.

.edu

B.

FTP

C.

HTTPS

D.

.org

E.

FAT32

Full Access
Question # 55

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Full Access
Question # 56

The computer language that is closest to machine code is:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Full Access
Question # 57

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Full Access
Question # 58

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Full Access
Question # 59

Which of the following is both an input and output device?

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Full Access
Question # 60

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Full Access
Question # 61

Which of the following are the primary functions of an operating system? (Choose two.)

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Full Access
Question # 62

Which of the following would indicate the FASTEST processor speed?

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Full Access
Question # 63

A function is BEST used for enabling programs to:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Full Access
Question # 64

Which of the following categories describes commands used to extract information from a database?

A.

DDL

B.

DDR

C.

DLL

D.

DML

Full Access
Question # 65

Privacy expectations on a company intranet should be limited to:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Full Access
Question # 66

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Full Access
Question # 67

Given the following pseudocode:

Which of the following would be the output of the program?

A.

foohappy

B.

barsad

C.

foosad

D.

barhappy

Full Access
Question # 68

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Full Access
Question # 69

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Full Access