IT Fundamentals AnsToReview
IT Fundamentals AnsToReview
Computing Devices
a) True.
3) What type of computer is best suited for using in a job where you have to
make notes and be able to move around easily?
6) What type(s) of IoT appliance are less likely to be controlled via a home
automation hub?
Page 1
Module 1 / Unit 1 / Common Module 1 / Unit 2 / Using a Workstation
Computing Devices
a) Verify that the environment is suitable and that the installation will
be safe.
a) You do not want to leave trailing wires over walkways so you need
to consider the position of power outlet(s) and where peripheral
devices will be placed. You also want to ensure adequate air flow
around the system unit.
3) What factors should you consider when positioning input and output
devices?
5) You have to open a word processing application but you cannot see an
icon on the desktop. What should you do?
6) Your colleague has to run many applications at the same time and finds it
difficult to know which icon to choose when switching between them. What
alternative method could you suggest?
7) Your colleague is using a laptop and you notice that he laboriously clicks
the mouse repeatedly to scroll through the document you are co-editing.
What technique could he use to be more productive?
a) Use the mouse scroll wheel (or if it doesn't have one drag the
scroll button in the scroll bar).
Page 2
Module 1 / Unit 3 / Using an OS Module 1 / Unit 3 / Using an
OS
6) You have to open a file located on a network server. What should be your
first step?
a) Open the Network object from Explorer and locate the server
(computer) hosting the file.
8) What key combination can you use to force the browser to ignore any
locally cached files when refreshing a page?
a) Ctrl+F5.
Page 3
Module 1 / Unit 1 / Common Module 1 / Unit 4 / Managing an OS
Computing Devices
1) What is the registry and how does it distinguish Windows and Linux?
3) Why might you use the Services snap-in to manage background processes
rather than Task Manager?
a) Task Manager allows you to start and stop services but the
Services snap-in also allows you to configure service properties.
6) What two things are configured on a disk to make storage space on the
disk available to the Windows OS?
7) What is a CLI?
a) User Access Control (UAC). UAC means that the user must input
their credentials or click through an authorization prompt before
the configuration change can be made.
Page 4
Module 1 / Unit 5 / Troubleshooting and Support Module 1 / Unit 5 /
Troubleshooting and
Support
1) You are advising a colleague about best practices when troubleshooting.
You have identified the following techniques to use to identify a problem:
gather information, duplicate the problem, question users, identify
symptoms, and approach multiple problems individually. If you are
following CompTIA's troubleshooting model, what other piece of advice
should you give?
2) You have asked a senior manager to authorize your plan of action for
resolving a fault in a software application. What name is given to the
process you are following?
4) Your computer locks up periodically and feels hot to the touch. Could these
things be related?
5) What crucial piece of information would you need when trying to locate
support information about a computer system on the manufacturer's
website?
6) If you do not have a support contract, what is likely to be the best option for
obtaining advice about a problem with an application?
7) You are looking for content on a topic but your search is returning millions
of matches that are not particularly helpful. What two methods could you
use to get better search results?
8) You want to find something on a particular website, but the site does not
have a search tool. Could you use a general search engine, and if so,
how?
1) Which notation system supports presenting the largest numbers using the
fewest digits: Binary, Decimal, or Hexadecimal?
a) Integer.
4) What is the difference between the char and string data types?
a) That it works with the version of Windows that you have and that
your computer meets the system (hardware) requirements.
a) Use the program's Compatibility tab to use settings for the older
Windows version.
3) Why would Windows prompt you to enter a password if you try to install a
software application?
4) Windows comes with web server software but it is not enabled by default.
How would you install this software?
a) Try using the Repair option in Programs and Features (if available)
or re-installing the program.
a) Remote Desktop.
a) Pseudocode.
a) Programming identifiers.
6) You want to check whether a condition has been met, and if it has, perform
one action. Otherwise, you want your program to perform a second action.
What sort of programming operation would help achieve this?
11) True or false? You do not need to install a web application to your
computer; it would be accessed via a browser.
a) True.
a) Query.
3) How does an RDBMS such as Microsoft SQL Server differ from Microsoft
Excel when used to store a dataset?
a) Each table contains a primary key whose value is unique for each
record in the table. A foreign table can use the value of a primary
key as a relation, storing the value in a foreign key field.
a) Programmatic access.
a) Around 2 GHz; budget models might run as low as 1 GHz while the
fastest run up to about 3 GHz.
Page 10
6) You want to purchase a computer with a fast graphics interface. What type Module 3 / Unit 2 / Using
Device Interfaces
of expansion slot should you look for?
2) True or false? USB cables have the same connectors at either end.
a) Partly false—the connectors for the host (PC) and device use
different form factors (there are also normal size and mini or micro
device connectors). A new reversible Type C connector is starting
to be used however.
3) A user has two USB drives connected to her PC. She complains that when
she copies large files to both drives at the same time, it seems to take
much longer. Why might this be?
5) True or false? HDMI is the only type of display interface that supports High
Definition picture resolutions.
Page 11
Module 1 / Unit 1 / Common 6) You are considering buying a new display device. The model you are
Computing Devices
considering accepts digital inputs only. Your computer's graphics adapter
has a blue port with 15 holes. Would this flat-panel be a wise purchase?
7) You need to configure settings for an input device. What should be your
first step?
8) A friend is asking for your help in using her computer. When he presses the
key marked @, a different symbol appears. What could be the cause?
9) What type of mouse would you recommend for someone who uses their
computer principally to play computer games and why?
3) True or false? If you want to configure the DPI of a display device, you
would do so via the Personalization app.
Page 12
5) You need to plug a microphone into a computer to make a recording. How Module 3 / Unit 3 / Using
Peripheral Devices
would you identify which jack to use?
9) You want to configure a printer to use both sides of the paper (duplex) by
default. You have alt-clicked the printer object—which command should
you select to proceed?
a) Printing preferences.
11) What function of a scanner would you use if you want to convert a letter
that someone has mailed to you into a computer-editable document?
12) True or false? If your PC does not have a flash memory card reader, you
should be able to connect the camera itself to the PC over USB to copy
images off the card.
Page 13
Module 1 / Unit 1 / Common Module 3 / Unit 4 / Using Storage Devices
Computing Devices
1) You have a motherboard that is designed for DDR2 memory that works at
a bus speed of 533 MHz. You have some DDR3 memory modules that also
work at a bus speed of 533 MHz. Are the modules compatible with the
motherboard?
2) Why can't you use memory modules designed for a desktop computer in a
laptop?
4) What type of connector would you use for an external hard drive to connect
to a Windows PC?
5) Your computer has 4 SATA ports. How many hard drives can be installed?
6) True or false? A single layer Blu-ray Disc has greater capacity than a dual-
layer, double-sided DVD.
7) What sort of device would you need to transfer data from a "Memory
Stick?"
8) What sort of device could you use to expand the storage capacity of a
smartphone?
Page 14
Module 3 / Unit 5 / Using File Systems Module 3 / Unit 5 / Using
File Systems
2) What type of file system must the partition that Windows files are installed
on use?
a) NTFS.
3) What default installation folders contain system and application files that
should not normally be deleted or modified manually?
4) What is the file path to the Documents folder for a user named "David,"
assuming Windows is installed to a hard disk with a single partition using
the default settings?
a) C:\Users\David\Documents
6) If you have made changes to a file and want to keep both the original file
and the modified version, what command should you use?
a) Save As.
7) Why should you be more careful about deleting files from a USB flash drive
than from the main hard drive?
8) What view options could you use to show files of a particular type sorted by
date?
9) What kind of data would you expect to find in a file with a TIFF extension?
Page 15
Module 1 / Unit 1 / Common Module 4 / Unit 1 / Networking Concepts
Computing Devices
1) What is a WAN?
a) A router.
10) Which email protocol(s) are used to download messages from a mail
server?
Page 16
a) Either Post Office Protocol (POP) or Internet Message Access Module 4 / Unit 2 /
Connecting to a Network
Protocol (IMAP).
a) A switch.
4) What is the latest Wi-Fi standard and which frequency band(s) does it use?
6) What is the risk of using a free Wi-Fi network to make an order from an
online shop?
1) If you use an open network, what email configuration setting should you
ensure is enabled?
a) Trojan Horse.
3) You want to use a website that hosts training modules in a custom media
format. What type of add-on would you need to install to play this media?
4) What type of file might a website use to track whether you have visited it
before?
a) Cookie.
6) You are using a computer in an Internet cafe. What should you do at the
end of the session?
7) What identifies a website as using the secure HTTPS protocol with a valid
certificate?
a) The URL shows the "https://" protocol and the browser shows a
padlock icon. For sites that have passed special validation
regimes, the address bar will be shown in green. If a site uses
https but the certificate is not trusted by the browser, an alert is
displayed.
a) The IP address of the host and the port number of the application.
Page 18
Module 4 / Unit 4 / Using Shared Storage Module 4 / Unit 4 / Using
Shared Storage
1) True or false? A hard disk connected to a computer via a USB port could
be described as "Direct Attached Storage."
a) True.
a) Via the System applet in Control Panel or via the Settings app
(Access work or school).
4) True or false? Any version or edition of Windows can be used to share files
with other users.
5) How could you access a network folder called DATA on a network server
called TOWER1 using the Explorer address bar?
8) You have made a backup of system data using a removable hard disk.
What should you do next?
Page 19
Module 1 / Unit 1 / Common Module 4 / Unit 5 / Using Mobile Devices
Computing Devices
a) Pinch.
4) True or false? A smartphone cannot join a Wi-Fi network if the SSID is not
being broadcast.
Page 20
5) In considering availability concerns, what use might a lockable faceplate on Module 5 / Unit 2 / Using
Best Practices
a server-class computer be?
a) It may prevent the user switching the machine on or off (useful for
servers) or accessing removable drives and ports.
7) Why should a security policy instruct users not to reveal their password to
technical support staff?
9) What are the three main areas where redundancy should be provisioned?
Page 21
Module 1 / Unit 1 / Common 3) How might malware hosted on a website be able to infect your computer
Computing Devices
simply by your browsing the site?
5) What type of malware is being described? The malware encrypts the user's
documents folder and any attached removable disks then extorts the user
for money to release the encryption key.
a) Ransomware.
8) What are the two main ways that spam might expose recipients to
hazardous content?
9) Your friend sent you an email link, which you have opened, and now the
browser is asking whether you should install a plug-in to view all the
content on the page. Should you proceed?
Page 22
Module 5 / Unit 3 / Using Access Controls Module 5 / Unit 3 / Using
Access Controls
a) Implicit deny.
a) Guest account.
Page 23
Module 1 / Unit 1 / Common 10) Why is it important not to use simple words or names as a password?
Computing Devices
3) Why might a company ban use of the corporate network and desktop
software for personal communications?
4) What two main privacy issues arise from using a social networking site?
a) Firstly, you need to control how far information you post to the
site is distributed. You could make it private, accessible to close
friends only, accessible to all your contacts, or accessible to
anyone. Secondly, you need to know how the company processes,
stores, and transfers or sells any data it collects about you,
including information you post and your activity on the site.
Page 24