1. C. ¢
2. D. Unicode contains all ASCII characters.
3. D. 1111
4. B. 32
5. B. 3D
6. C. FA
7. C. #0000FF
8. B. 128
9. A. 10 hex is equal to 10 decimal.
10. B. 326GB (binary)
11. C. Unicode is used for ASCII and non-ASCII characters.
12. D. Use Character Map.
13. B. ASCII character set
14. A. Use hexadecimal values for red, green, and blue.
15. A. #FFFFFF
16. C. They are 128 bits long, with eight groups of 16 bits each.
17. A. Base 10 uses decimal values (0–9).
18. D. 101
19. B. 128
20. D. ±
1. A. Floats
2. C. It has at least one decimal point.
3. C. The result is a positive number.
4. A. AND
5. B. IF x=0 AND y<0, then x>y
6. B. It can represent a variable.
7. A. wide world o
8. C. 84
9. D. Burger AND ketchup AND pickle NOT mustard NOT onions
10. C. Eleven numeric characters
11. C. Char
12. D. Boolean
13. B. Floats
14. A. Truncation
15. C. Double or double-precision
1. C. Printing
2. A. Output
3. A. Output
4. D. Processing
5. B. RAM
6. B. I/O
7. B. Input
8. C. Input
9. A. Multifunction device
10. D. Storage
11. B. Input
12. A. Input/output
13. C. input
14. D. output
15. B. input
16. D. Processing
17. B. input
18. B. Processing
19. C. GPU
20. C. Output
1. D. Data is the source of information.
2. B. Gather data.
3. D. sm, ®
4. D. Copyleft allows an open source app and its modified versions to be modified freely by others.
5. D. Being a patent troll
6. C. Determining the statistical relationship between two types of data
7. B. Reduce background detail.
8. B. Preventing other companies from using the process
9. A. Try to register the trademark.
10. C. Take legal action for copyright infringement.
11. D. Meaningful reporting
12. B. Data correlation
13. A. Patent
14. D. Intellectual property
15. B. Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization
16. C. U.S. Patent and Trademark Office
1. C. KB
2. B. Divide the value by 1,048,576.
3. B. 4.37
4. B. 950MB
5. D. PB
6. B. 1024MB = 1PB
7. D. Processor cycles per second
8. C. 2500MHz
9. C. A processor’s clock speed is one of the factors determining CPU performance.
10. D. There is not enough information to determine which computer will perform needed tasks faster.
11. B. 320Kbps compression.
12. D. Yes, there are three ports that are fast enough.
13. B. The CR2 file uses more disk space than the JPG file.
14. C. Save the file as a high-quality PDF.
15. C. Petabyte, gigabyte, megabyte
16. D. USB 3.0, Gigabit Ethernet, FireWire 1394b
17. C. Pulse and rest
18. B. 1MB = 1,048,576
19. C. A 32-bit processor can manage up to 4GB of RAM.
20. D. Windows displays binary MB or GB and bytes.
1. B. Identify the problem
2. D. preventative measures
3. A. Power
4. A. Network adapter
5. C. Use your smartphone’s camera.
6. A. Software
7. D. USB port
8. C. Step 1: Identify the problem
9. B. c, b, a, d
10. D. Cooling
11. C. The replacement cable is not known to be working.
12. D. We don’t know if the power supply and the RAM are defective.
13. A. Establish a new theory or escalate.
14. B. Question the obvious.
15. D. Identify the problem and document findings/lessons learned, actions, and outcomes.
16. C. The operating system application log
17. D. Picture file corrupted
18. A. Open a different website.
19. C. Power supply switch and AC cord
20. B. Airplane mode
1. D. The lowest recommended cable grade for Gigabit Ethernet is CAT 5e.
2. B. Recommend replacing the cable with CAT 6.
3. D. NFC must also be turned on.
4. A. Payment systems
5. C. File transfer runs at port speed.
6. B. USB 3.1 Gen 2
7. A. Either end
8. B.
9. C. Use a DVI-HDMI cable.
10. C. Connect all four displays to the DisplayPort port.
11. C. Move the wireless mouse/keyboard transceiver to a USB 2.0 port.
12. D. FireWire 400 to 800 Bilingual cable.
13. C. USB 2.0
14. B. System Report
15. B. Does the computer have a FireWire port?
16. B. USB 3.0
17. A. Thunderbolt 3
1. A. Web-based
2. D. Duplicate
3. C. S/PDIF
4. C. Lime green
5. C. Install drivers for the webcam.
6. C. Install the bundled apps after using the updated drivers online.
7. A. USB 2.0 port
8. B. HDMI
9. D. Install drivers.
10. B. pairing
11. C. Change the default audio source.
12. D. Light blue mini-jack
13. B. thumbscrews
14. B. Internet access
15. C. The import process opens.
16. D. Reformat the drive.
17. A. Printer is ready to work.
18. C. Web-based
19. B. S/PDIF optical
20. C. DisplayPort, HDMI
1. C. Some motherboards include video outputs.
2. D. Port clusters enable multiple USB devices to be connected to a computer.
3. A. USB port
4. C. Laptop memory modules are physically smaller than desktop modules.
5. A. Laptop
6. D. Replace power supply.
7. D. 802.11ac
8. C. Use Wi-Fi.
9. B. 64-bit CPU with 16GB of RAM
10. C. Gigabit Ethernet connection is not present.
11. D. Changing the boot order
12. C. SSHD
13. B. HDMI
14. A. Core i7-8709G
15. C. Replace the graphics card.
16. A. 32-bit CPU
17. C. Replace the CPU.
18. D. Replace the device.
19. C. Run System Information.
20. A. firmware
1. D. Fiber optic
2. C. RF
3. A. FTTP
4. D. Ask which cable service the customer has.
5. A. DSL
6. C. Satellite
7. D. RF
8. D. Cable
9. C. DSL
10. B. Hotspot
11. B. RF
12. B. DSL
13. B. Cable modem
14. B. RF
15. C. Satellite
16. D. Fiber optic to a cabinet, then DSL or cable to each home.
17. B. DSL
18. A. Client upgrading to 1Gbps cable service.
19. D. Lease a DSL modem.
20. A. Cable
1. A. RAM
2. D. SODIMM
3. B. HDD
4. D. DVD+RW
5. B. SDXC
6. A. NAS
7. D. It can connect using USB or SATA ports.
8. B. It must be rack-mounted.
9. B. OneDrive
1. C. Connect a drive made for the console.
2. C. Desktop
3. B. Blade servers
4. C. Make sure everything works with the same smart assistant technology.
5. C. Install a new app on your smartphone.
6. A. Buy a data plan.
7. D. Thermostat
8. B. Connect it to your home network.
9. D. Smartphone
10. A. Tablet
11. C. Server
12. C. KVM switch
13. B. Workstation
14. A. Home automation
15. C. Media streaming device
1. C. Between the router and the server
2. B. Multiple logical network support
3. D. Router
4. A. Supports IMAP email
5. B. MAC address.
6. A. 172.16.4.257
7. B. DNS
8. D. Delete the message.
9. C. Packets are routed as needed to reach their destination.
10. A. 00-03-3-ac-fq-f3
11. A. Open a command prompt and run ipconfig /all.
12. B. Check with the email administrator.
13. C. POP3
14. C. Port labeled C
15. B. AP
16. C. Connect a switch with enough ports.
17. A. Access point
18. A. Managed switch
19. A. A router is a WAN device, and a switch is a LAN device.
20. D. DHCP server
1. C. 3
2. D. Connect wireless devices directly to the Internet
3. A. Wireless-G
4. B. Enable mixed b/g/n mode in the router configuration.
5. B. Check for channel interference.
6. C. Signal direction
7. A. The default SSID displays the router brand.
8. B. Open
9. D. No support for WEP in router
10. A. PSK
11. A. Open network with captive portal
12. B. WEP, WPA, WPA2
13. A. WPA2
14. B. Signal reflections off objects are received at different times
15. B. WEP
16. C. Wireless access point
17. B. Wireless-AC
18. A. Distance from the router to the broadband Internet modem
19. B. The network adapter is 802.11a.
20. B. Moving the router
1. D. Firmware
2. B. A Type 1 hypervisor
3. D. Device Manager
4. A. apt-get
5. D. diskpart
6. C. Run Regedit.
7. B. Linux
8. C. When it runs short of RAM
9. A. UAC
10. D. Google Play
11. A. sudo lshw
12. B. Domain
13. A. Windows Embedded
14. B. Uninstall an app
15. B. apt-get
16. B. Clustering
17. D. Disk Utility
18. D. iOS
19. C. macOS
20. B. Program Compatibility Wizard
1. D. FAT32
2. B. macOS will examine the file’s MIME type to determine a suitable app.
3. D. Windows cannot use the driver.
4. C. Disk Utility
5. C. macOS – Activity Monitor
6. B. 54-40
7. D. mkdir directoryname
8. B. The proposed filename has a reserved character.
9. D. Drive uses FAT32 file system.
10. C. Stop the app.
11. A. File was encrypted.
12. C. ls-l filename
13. B. journaling
14. D. gzip
15. B. Add sudo to the beginning of the command.
16. A. daemon
17. D. mkdir directoryname
18. D. 15 2 * * 0
19. B. cmd.exe
20. B. Device Manager
1. B. Accounting
2. C. Visual diagramming
3. B. Project management
4. D. Document management
5. B. Database
6. A. Instant messaging
7. B. LibreOffice
8. A. Firefox
9. B. Email
10. D. Document sharing
11. B. Online workspace
12. B. Spreadsheet
13. D. Visual diagramming
14. B. Upgrading the document-sharing plan
15. D. Database
16. B. Document sharing
17. C. Use a solution that has both cloud and client apps.
18. D. Point-of-sale and supply chain management
19. C. Office suite
20. C. EMR
1. D. local-network-hosted
2. C. cloud-hosted
3. B. Client computer
4. B. One tier
5. B. 1 Presentation, 2 Logic, 3 Data access, 4 Database
6. B. Tier 3
7. C. Subscribe to the service.
8. A. One-tier architecture
9. C. Local network hosted
1. B. Clear cache.
2. D. Use private browsing.
3. B. Call the IT department.
4. B. Accept popups for the site.
5. D. Go to badssl.com.
6. B. Use Registry Editor.
7. A. NET::ERR_CERT_AUTHORITY_INVALID
8. C. Script blocker
9. B. You are prompted to turn it on.
10. B. Close the window.
11. A. Does not store bookmarks
12. B. A proxy script is used by your corporate network.
13. D. Use script blocker.
14. D. Incognito
15. D. Disable the extension and enable it as needed.
16. B. NET::ERR_CERT_COMMON_NAME_INVALID
17. B Checks to see if an updated copy of the page is already stored
18. D. All of the above.
19. A. Click the padlock, then click the Certificate link to view the certificate.
20. D. Click the three-dot menu button, click More tools, Extensions, and slide its control to the right.
1. B. Cross-platform
2. C. Some features might vary.
3. D. MP3
4. B. Use Compatibility Checker.
5. D. A software installation program
6. A. Concurrent license
7. B. Open source
8. D. One-time purchase
9. C. Your Adobe account information
10. B. EULA
11. A. It violates the EULA.
12. B. Custom installation
13. A. “Use your account information.”
14. C. Buy a second software license.
15. B. License the macOS version and install it.
16. B. Group or site license
17. E. All of the above are typical advanced/custom installation options.
18. B. The subscription will expire if they stop paying for it and the software will then stop working.
19. A. Heavy fines and malware
20. D. All of the above
1. D. assemblers
2. A. SQL
3. D. XQuery
4. B. C++ adds object-oriented programming to C
5. B. Extensible Markup Language
6. B. extensions
7. A. XML
8. D. PowerShell
9. B. JavaScript
10. D. BASIC
11. B. Runs the following commands twice
12. B. print
13. D. Interpreted programming languages
14. B. Markup languages
15. A. Stop
16. C. VBA editor
17. A. Assembly
18. D. Java
19. A. HTML
20. B. XML
1. B. a description of what a computer program needs to do
2. A. Diamond
3. C. UML
4. B. Branching
5. B. If X is not 30, then print “X is not 30.”
6. C. While loop
7. D. For loop
8. B Rectangle
9. D. Both programmers and non-programmers agree about what the program’s goal is.
10. D. sequence diagram
11. B. Cylinder
12. A. Branching and looping
13. C. variables
14. C. At the beginning of each loop.
1. C. Methods
2. B. attributes
3. C. Array
4. C. math.h
5. B. function library
6. B. characteristic
7. B. Sign in
8. D. Top of the program
9. B. Refer to makeshape.
10. C. Current date
11. A. Variable
12. A. Containers
13. C. Variables and constants
14. D. properties
15. C. subroutine or procedure
1. C. Data that has been committed to disk
2. D. Atomicity
3. A. Before building a table
4. B. Import spreadsheet
5. C. The condition needed for records to be retrieved for the query
6. A. Relation
7. A. Group records
8. C. Flat file
9. A. Row locking
10. D. Database engine
11. B. Atomicity, Consistency, Isolation, Durability
12. A. Everything is stored in a single table and tables do not need to be connected to each other.
13. C. Scalability
14. D. Multiple concurrent users
15. B. Import and input
16. A. SAN
17. C. A formatted list of the information in one or more database files
18. D. SQL statements
19. B. Dedicated cloud storage and database solutions
1. C. STATUS DEFAULT ACTIVE
2. B. Nonrelational
3. D. Primary key
4. B. nonrelational
5. B. Structured
6. C. Database structure
7. A. Unique
8. B. constraints
9. A. NoSQL
10. A. Data directory
11. C. column
12. D. AGE INT NOT NULL CHECK (AGE>=25)
13. B. Table
14. D. Constraints
15. B. It’s a unique identifier for a row/record in another database table.
16. D. Index
17. C. Key/value and document
18. A. Semi-structured data such as XML or JSON
19. B. Structured databases
20. D. Schema
1. C. DROP tablename;
2. D. Programmatic access
3. A. ;
4. C. TRUNCATE
5. B. ALTER
6. D. Select and update
7. C. User interface access
8. D. Database dump
9. B. Hot backup
10. A. #Deleted
11. D. Direct access
12. C. CREATE DATABASE nameofdatabase;
13. A. Query
14. B. Data definition
15. A. ALTER TABLE tablename RENAME COLUMN oldname TO newname;
16. D. Exporting the database
17. B. Principle of least privilege
18. A. Undelete
19. B. SQL query builders to access SQL databases
20. D. Physical backup
1. A. Ransomware
2. B. RAID 0
3. C. PC Health screen in BIOS
4. C. Network attack from multiple computers shuts down connection.
5. B. executive impersonation
6. A. Man-in-the-middle
7. A. Wiretapping
8. D. social engineering
9. B. Snooping
10. B. Eavesdropping
11. A. spear phishing
12. A. Outlet tester
13. B. UPS
14. B. Data destruction
15. D. Confidentiality, integrity, and availability of data
16. C. botnet
17. D. The alteration of information without authorization
18. B. Dumpster diving
19. A. Replay attack
20. D. Employ encryption techniques and educate users
1. B. Run a web-based antivirus scan.
2. B. Unnecessary software
3. A. Add or remove software.
4. C. Create an anti-malware bootable CD or flash drive.
5. A. sudo apt-get update
6. C. iptables
7. C. Check for updates with Windows Update.
8. D. Open the App Store, click Updates, and click Free Upgrade.
9. D. All Debian-based distributions use sudo apt-get upgrade to upgrade their software.
10. A. There are 15 app updates available.
11. B. Allow App Store apps only.
12. C. Software bundled with unwanted applications
13. A. Installing a new operating system with antivirus on the infected computer
14. B. Boot sector
15. B. Create bootable antivirus media on another computer.
16. B. Select the custom option and deselect the programs you don’t want.
17. A. Run full system scans if a major virus or malware outbreak is reported.
18. D. All of the above.
19. B. Change the password immediately.
20. D. All of the above.
1. D. Company confidential information
2. B. Metadata
3. B. Permissions
4. A. Virtual private network
5. B. Company confidential information
6. A. Self-destructing messages
7. B. System Preferences, Security & Privacy
8. D. Company confidential information
9. A. BYOD policy
10. D. PII
11. B. Single-use credit card
12. A. Expectation of privacy
13. C. Tracking cookie
14. B. MyPermissions Privacy Cleaner
15. A. AUP
16. B. SSH
1. A. Multifactor authentication
2. A. Console
3. B. Discretionary access control
4. C. Standard account
5. B. Rule-based
6. A. Least privilege model
7. B. Single sign-on
8. B. Biometrics
9. B. PIN
10. B. Windows
11. B. Location tracking
12. C. Linux
13. C Advanced Sharing
14. A. ACL
15. A. One-time password
16. B. Software token
17. B. Accounting
18. D. Open System Preferences, Security & Privacy, Privacy, Location Services.
19. C. Security log
20. A. Hardware token
21. D. Nonrepudiation
1. B. Change your PIN to a new six-character PIN.
2. B. Account lockout threshold
3. A. Password must meet complexity requirements.
4. A. Hex
5. B. Spidering
6. A. Password history
7. D. Read the message.
8. B. Local Group Policy Editor
9. B. Password expiration
10. A. Account lockout threshold
11. C. Password manager
12. A. Brute force
13. D. Password generator
14. D. Password policy
15. B. A password reset disk
16. A. Should be at least three characters in length
17. C. Single sign-on
18. B. ~ ! @ # $ % ^ & * ( ) _ - + =
19. B mY#p@$$~W0rD
20. D. gpedit.msc
21. B. Screensaver or lock screen password
22. A. BIOS/UEFI password
1. D. data in transit
2. B. Cipher text is an encrypted form of plain text.
3. B. NTFS
4. C. Disk encryption is built in.
5. B. Linux
6. B. GPEDIT
7. D. Digital ID
8. B. Open Pretty Good Privacy
9. A. S/MIME
10. C. Yosemite
11. A. Connection is secure.
12. D. A remote computer
13. A. An email message
14. C. VeraCrypt
15. A. TPM
16. A. Microsoft Outlook doesn’t support sending encrypted email on an individual message or for all messages.
17. D. Certificate authority (CA)
18. C. PIN or passcode
19. C. Encrypt contents to secure data
20. B. Padlock and green filename
1. C. A database that can recover from a failure quickly
2. B. RAID 10
3. C. 1.5TB
4. B. Network redundancy
5. C. File synchronization
6. B. Current orders
7. D. RAID
8. A. Configure the dissimilar hardware options.
9. B. Warm site
10. C. Hot site
11. A. They are not often used in servers.
12. D. RAID 0
13. B. Fault tolerance
14. A. Contingency plan
15. D. On-site