Appendix A

Answers to Practice Questions

Chapter 2

1. C. ¢

2. D. Unicode contains all ASCII characters.

3. D. 1111

4. B. 32

5. B. 3D

6. C. FA

7. C. #0000FF

8. B. 128

9. A. 10 hex is equal to 10 decimal.

10. B. 326GB (binary)

11. C. Unicode is used for ASCII and non-ASCII characters.

12. D. Use Character Map.

13. B. ASCII character set

14. A. Use hexadecimal values for red, green, and blue.

15. A. #FFFFFF

16. C. They are 128 bits long, with eight groups of 16 bits each.

17. A. Base 10 uses decimal values (0–9).

18. D. 101

19. B. 128

20. D. ±

Chapter 3

1. A. Floats

2. C. It has at least one decimal point.

3. C. The result is a positive number.

4. A. AND

5. B. IF x=0 AND y<0, then x>y

6. B. It can represent a variable.

7. A. wide world o

8. C. 84

9. D. Burger AND ketchup AND pickle NOT mustard NOT onions

10. C. Eleven numeric characters

11. C. Char

12. D. Boolean

13. B. Floats

14. A. Truncation

15. C. Double or double-precision

Chapter 4

1. C. Printing

2. A. Output

3. A. Output

4. D. Processing

5. B. RAM

6. B. I/O

7. B. Input

8. C. Input

9. A. Multifunction device

10. D. Storage

11. B. Input

12. A. Input/output

13. C. input

14. D. output

15. B. input

16. D. Processing

17. B. input

18. B. Processing

19. C. GPU

20. C. Output

Chapter 5

1. D. Data is the source of information.

2. B. Gather data.

3. D. sm, ®

4. D. Copyleft allows an open source app and its modified versions to be modified freely by others.

5. D. Being a patent troll

6. C. Determining the statistical relationship between two types of data

7. B. Reduce background detail.

8. B. Preventing other companies from using the process

9. A. Try to register the trademark.

10. C. Take legal action for copyright infringement.

11. D. Meaningful reporting

12. B. Data correlation

13. A. Patent

14. D. Intellectual property

15. B. Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization

16. C. U.S. Patent and Trademark Office

Chapter 6

1. C. KB

2. B. Divide the value by 1,048,576.

3. B. 4.37

4. B. 950MB

5. D. PB

6. B. 1024MB = 1PB

7. D. Processor cycles per second

8. C. 2500MHz

9. C. A processor’s clock speed is one of the factors determining CPU performance.

10. D. There is not enough information to determine which computer will perform needed tasks faster.

11. B. 320Kbps compression.

12. D. Yes, there are three ports that are fast enough.

13. B. The CR2 file uses more disk space than the JPG file.

14. C. Save the file as a high-quality PDF.

15. C. Petabyte, gigabyte, megabyte

16. D. USB 3.0, Gigabit Ethernet, FireWire 1394b

17. C. Pulse and rest

18. B. 1MB = 1,048,576

19. C. A 32-bit processor can manage up to 4GB of RAM.

20. D. Windows displays binary MB or GB and bytes.

Chapter 7

1. B. Identify the problem

2. D. preventative measures

3. A. Power

4. A. Network adapter

5. C. Use your smartphone’s camera.

6. A. Software

7. D. USB port

8. C. Step 1: Identify the problem

9. B. c, b, a, d

10. D. Cooling

11. C. The replacement cable is not known to be working.

12. D. We don’t know if the power supply and the RAM are defective.

13. A. Establish a new theory or escalate.

14. B. Question the obvious.

15. D. Identify the problem and document findings/lessons learned, actions, and outcomes.

16. C. The operating system application log

17. D. Picture file corrupted

18. A. Open a different website.

19. C. Power supply switch and AC cord

20. B. Airplane mode

Chapter 8

1. D. The lowest recommended cable grade for Gigabit Ethernet is CAT 5e.

2. B. Recommend replacing the cable with CAT 6.

3. D. NFC must also be turned on.

4. A. Payment systems

5. C. File transfer runs at port speed.

6. B. USB 3.1 Gen 2

7. A. Either end

8. B. An image shows a cable connector with a small flat rectangular pin.

9. C. Use a DVI-HDMI cable.

10. C. Connect all four displays to the DisplayPort port.

11. C. Move the wireless mouse/keyboard transceiver to a USB 2.0 port.

12. D. FireWire 400 to 800 Bilingual cable.

13. C. USB 2.0

14. B. System Report

15. B. Does the computer have a FireWire port?

16. B. USB 3.0

17. A. Thunderbolt 3

Chapter 9

1. A. Web-based

2. D. Duplicate

3. C. S/PDIF

4. C. Lime green

5. C. Install drivers for the webcam.

6. C. Install the bundled apps after using the updated drivers online.

7. A. USB 2.0 port

8. B. HDMI

9. D. Install drivers.

10. B. pairing

11. C. Change the default audio source.

12. D. Light blue mini-jack

13. B. thumbscrews

14. B. Internet access

15. C. The import process opens.

16. D. Reformat the drive.

17. A. Printer is ready to work.

18. C. Web-based

19. B. S/PDIF optical

20. C. DisplayPort, HDMI

Chapter 10

1. C. Some motherboards include video outputs.

2. D. Port clusters enable multiple USB devices to be connected to a computer.

3. A. USB port

4. C. Laptop memory modules are physically smaller than desktop modules.

5. A. Laptop

6. D. Replace power supply.

7. D. 802.11ac

8. C. Use Wi-Fi.

9. B. 64-bit CPU with 16GB of RAM

10. C. Gigabit Ethernet connection is not present.

11. D. Changing the boot order

12. C. SSHD

13. B. HDMI

14. A. Core i7-8709G

15. C. Replace the graphics card.

16. A. 32-bit CPU

17. C. Replace the CPU.

18. D. Replace the device.

19. C. Run System Information.

20. A. firmware

Chapter 11

1. D. Fiber optic

2. C. RF

3. A. FTTP

4. D. Ask which cable service the customer has.

5. A. DSL

6. C. Satellite

7. D. RF

8. D. Cable

9. C. DSL

10. B. Hotspot

11. B. RF

12. B. DSL

13. B. Cable modem

14. B. RF

15. C. Satellite

16. D. Fiber optic to a cabinet, then DSL or cable to each home.

17. B. DSL

18. A. Client upgrading to 1Gbps cable service.

19. D. Lease a DSL modem.

20. A. Cable

Chapter 12

1. A. RAM

2. D. SODIMM

3. B. HDD

4. D. DVD+RW

5. B. SDXC

6. A. NAS

7. D. It can connect using USB or SATA ports.

8. B. It must be rack-mounted.

9. B. OneDrive

Chapter 13

1. C. Connect a drive made for the console.

2. C. Desktop

3. B. Blade servers

4. C. Make sure everything works with the same smart assistant technology.

5. C. Install a new app on your smartphone.

6. A. Buy a data plan.

7. D. Thermostat

8. B. Connect it to your home network.

9. D. Smartphone

10. A. Tablet

11. C. Server

12. C. KVM switch

13. B. Workstation

14. A. Home automation

15. C. Media streaming device

Chapter 14

1. C. Between the router and the server

2. B. Multiple logical network support

3. D. Router

4. A. Supports IMAP email

5. B. MAC address.

6. A. 172.16.4.257

7. B. DNS

8. D. Delete the message.

9. C. Packets are routed as needed to reach their destination.

10. A. 00-03-3-ac-fq-f3

11. A. Open a command prompt and run ipconfig /all.

12. B. Check with the email administrator.

13. C. POP3

14. C. Port labeled C

15. B. AP

16. C. Connect a switch with enough ports.

17. A. Access point

18. A. Managed switch

19. A. A router is a WAN device, and a switch is a LAN device.

20. D. DHCP server

Chapter 15

1. C. 3

2. D. Connect wireless devices directly to the Internet

3. A. Wireless-G

4. B. Enable mixed b/g/n mode in the router configuration.

5. B. Check for channel interference.

6. C. Signal direction

7. A. The default SSID displays the router brand.

8. B. Open

9. D. No support for WEP in router

10. A. PSK

11. A. Open network with captive portal

12. B. WEP, WPA, WPA2

13. A. WPA2

14. B. Signal reflections off objects are received at different times

15. B. WEP

16. C. Wireless access point

17. B. Wireless-AC

18. A. Distance from the router to the broadband Internet modem

19. B. The network adapter is 802.11a.

20. B. Moving the router

Chapter 16

1. D. Firmware

2. B. A Type 1 hypervisor

3. D. Device Manager

4. A. apt-get

5. D. diskpart

6. C. Run Regedit.

7. B. Linux

8. C. When it runs short of RAM

9. A. UAC

10. D. Google Play

11. A. sudo lshw

12. B. Domain

13. A. Windows Embedded

14. B. Uninstall an app

15. B. apt-get

16. B. Clustering

17. D. Disk Utility

18. D. iOS

19. C. macOS

20. B. Program Compatibility Wizard

Chapter 17

1. D. FAT32

2. B. macOS will examine the file’s MIME type to determine a suitable app.

3. D. Windows cannot use the driver.

4. C. Disk Utility

5. C. macOS – Activity Monitor

6. B. 54-40

7. D. mkdir directoryname

8. B. The proposed filename has a reserved character.

9. D. Drive uses FAT32 file system.

10. C. Stop the app.

11. A. File was encrypted.

12. C. ls-l filename

13. B. journaling

14. D. gzip

15. B. Add sudo to the beginning of the command.

16. A. daemon

17. D. mkdir directoryname

18. D. 15 2 * * 0

19. B. cmd.exe

20. B. Device Manager

Chapter 18

1. B. Accounting

2. C. Visual diagramming

3. B. Project management

4. D. Document management

5. B. Database

6. A. Instant messaging

7. B. LibreOffice

8. A. Firefox

9. B. Email

10. D. Document sharing

11. B. Online workspace

12. B. Spreadsheet

13. D. Visual diagramming

14. B. Upgrading the document-sharing plan

15. D. Database

16. B. Document sharing

17. C. Use a solution that has both cloud and client apps.

18. D. Point-of-sale and supply chain management

19. C. Office suite

20. C. EMR

Chapter 19

1. D. local-network-hosted

2. C. cloud-hosted

3. B. Client computer

4. B. One tier

5. B. 1 Presentation, 2 Logic, 3 Data access, 4 Database

6. B. Tier 3

7. C. Subscribe to the service.

8. A. One-tier architecture

9. C. Local network hosted

Chapter 20

1. B. Clear cache.

2. D. Use private browsing.

3. B. Call the IT department.

4. B. Accept popups for the site.

5. D. Go to badssl.com.

6. B. Use Registry Editor.

7. A. NET::ERR_CERT_AUTHORITY_INVALID

8. C. Script blocker

9. B. You are prompted to turn it on.

10. B. Close the window.

11. A. Does not store bookmarks

12. B. A proxy script is used by your corporate network.

13. D. Use script blocker.

14. D. Incognito

15. D. Disable the extension and enable it as needed.

16. B. NET::ERR_CERT_COMMON_NAME_INVALID

17. B Checks to see if an updated copy of the page is already stored

18. D. All of the above.

19. A. Click the padlock, then click the Certificate link to view the certificate.

20. D. Click the three-dot menu button, click More tools, Extensions, and slide its control to the right.

Chapter 21

1. B. Cross-platform

2. C. Some features might vary.

3. D. MP3

4. B. Use Compatibility Checker.

5. D. A software installation program

6. A. Concurrent license

7. B. Open source

8. D. One-time purchase

9. C. Your Adobe account information

10. B. EULA

11. A. It violates the EULA.

12. B. Custom installation

13. A. “Use your account information.”

14. C. Buy a second software license.

15. B. License the macOS version and install it.

16. B. Group or site license

17. E. All of the above are typical advanced/custom installation options.

18. B. The subscription will expire if they stop paying for it and the software will then stop working.

19. A. Heavy fines and malware

20. D. All of the above

Chapter 22

1. D. assemblers

2. A. SQL

3. D. XQuery

4. B. C++ adds object-oriented programming to C

5. B. Extensible Markup Language

6. B. extensions

7. A. XML

8. D. PowerShell

9. B. JavaScript

10. D. BASIC

11. B. Runs the following commands twice

12. B. print

13. D. Interpreted programming languages

14. B. Markup languages

15. A. Stop

16. C. VBA editor

17. A. Assembly

18. D. Java

19. A. HTML

20. B. XML

Chapter 23

1. B. a description of what a computer program needs to do

2. A. Diamond

3. C. UML

4. B. Branching

5. B. If X is not 30, then print “X is not 30.”

6. C. While loop

7. D. For loop

8. B Rectangle

9. D. Both programmers and non-programmers agree about what the program’s goal is.

10. D. sequence diagram

11. B. Cylinder

12. A. Branching and looping

13. C. variables

14. C. At the beginning of each loop.

Chapter 24

1. C. Methods

2. B. attributes

3. C. Array

4. C. math.h

5. B. function library

6. B. characteristic

7. B. Sign in

8. D. Top of the program

9. B. Refer to makeshape.

10. C. Current date

11. A. Variable

12. A. Containers

13. C. Variables and constants

14. D. properties

15. C. subroutine or procedure

Chapter 25

1. C. Data that has been committed to disk

2. D. Atomicity

3. A. Before building a table

4. B. Import spreadsheet

5. C. The condition needed for records to be retrieved for the query

6. A. Relation

7. A. Group records

8. C. Flat file

9. A. Row locking

10. D. Database engine

11. B. Atomicity, Consistency, Isolation, Durability

12. A. Everything is stored in a single table and tables do not need to be connected to each other.

13. C. Scalability

14. D. Multiple concurrent users

15. B. Import and input

16. A. SAN

17. C. A formatted list of the information in one or more database files

18. D. SQL statements

19. B. Dedicated cloud storage and database solutions

Chapter 26

1. C. STATUS DEFAULT ACTIVE

2. B. Nonrelational

3. D. Primary key

4. B. nonrelational

5. B. Structured

6. C. Database structure

7. A. Unique

8. B. constraints

9. A. NoSQL

10. A. Data directory

11. C. column

12. D. AGE INT     NOT NULL CHECK (AGE>=25)

13. B. Table

14. D. Constraints

15. B. It’s a unique identifier for a row/record in another database table.

16. D. Index

17. C. Key/value and document

18. A. Semi-structured data such as XML or JSON

19. B. Structured databases

20. D. Schema

Chapter 27

1. C. DROP tablename;

2. D. Programmatic access

3. A. ;

4. C. TRUNCATE

5. B. ALTER

6. D. Select and update

7. C. User interface access

8. D. Database dump

9. B. Hot backup

10. A. #Deleted

11. D. Direct access

12. C. CREATE DATABASE nameofdatabase;

13. A. Query

14. B. Data definition

15. A. ALTER TABLE tablename RENAME COLUMN oldname TO newname;

16. D. Exporting the database

17. B. Principle of least privilege

18. A. Undelete

19. B. SQL query builders to access SQL databases

20. D. Physical backup

Chapter 28

1. A. Ransomware

2. B. RAID 0

3. C. PC Health screen in BIOS

4. C. Network attack from multiple computers shuts down connection.

5. B. executive impersonation

6. A. Man-in-the-middle

7. A. Wiretapping

8. D. social engineering

9. B. Snooping

10. B. Eavesdropping

11. A. spear phishing

12. A. Outlet tester

13. B. UPS

14. B. Data destruction

15. D. Confidentiality, integrity, and availability of data

16. C. botnet

17. D. The alteration of information without authorization

18. B. Dumpster diving

19. A. Replay attack

20. D. Employ encryption techniques and educate users

Chapter 29

1. B. Run a web-based antivirus scan.

2. B. Unnecessary software

3. A. Add or remove software.

4. C. Create an anti-malware bootable CD or flash drive.

5. A. sudo apt-get update

6. C. iptables

7. C. Check for updates with Windows Update.

8. D. Open the App Store, click Updates, and click Free Upgrade.

9. D. All Debian-based distributions use sudo apt-get upgrade to upgrade their software.

10. A. There are 15 app updates available.

11. B. Allow App Store apps only.

12. C. Software bundled with unwanted applications

13. A. Installing a new operating system with antivirus on the infected computer

14. B. Boot sector

15. B. Create bootable antivirus media on another computer.

16. B. Select the custom option and deselect the programs you don’t want.

17. A. Run full system scans if a major virus or malware outbreak is reported.

18. D. All of the above.

19. B. Change the password immediately.

20. D. All of the above.

Chapter 30

1. D. Company confidential information

2. B. Metadata

3. B. Permissions

4. A. Virtual private network

5. B. Company confidential information

6. A. Self-destructing messages

7. B. System Preferences, Security & Privacy

8. D. Company confidential information

9. A. BYOD policy

10. D. PII

11. B. Single-use credit card

12. A. Expectation of privacy

13. C. Tracking cookie

14. B. MyPermissions Privacy Cleaner

15. A. AUP

16. B. SSH

Chapter 31

1. A. Multifactor authentication

2. A. Console

3. B. Discretionary access control

4. C. Standard account

5. B. Rule-based

6. A. Least privilege model

7. B. Single sign-on

8. B. Biometrics

9. B. PIN

10. B. Windows

11. B. Location tracking

12. C. Linux

13. C Advanced Sharing

14. A. ACL

15. A. One-time password

16. B. Software token

17. B. Accounting

18. D. Open System Preferences, Security & Privacy, Privacy, Location Services.

19. C. Security log

20. A. Hardware token

21. D. Nonrepudiation

Chapter 32

1. B. Change your PIN to a new six-character PIN.

2. B. Account lockout threshold

3. A. Password must meet complexity requirements.

4. A. Hex

5. B. Spidering

6. A. Password history

7. D. Read the message.

8. B. Local Group Policy Editor

9. B. Password expiration

10. A. Account lockout threshold

11. C. Password manager

12. A. Brute force

13. D. Password generator

14. D. Password policy

15. B. A password reset disk

16. A. Should be at least three characters in length

17. C. Single sign-on

18. B. ~ ! @ # $ % ^ & * ( ) _ - + =

19. B mY#p@$$~W0rD

20. D. gpedit.msc

21. B. Screensaver or lock screen password

22. A. BIOS/UEFI password

Chapter 33

1. D. data in transit

2. B. Cipher text is an encrypted form of plain text.

3. B. NTFS

4. C. Disk encryption is built in.

5. B. Linux

6. B. GPEDIT

7. D. Digital ID

8. B. Open Pretty Good Privacy

9. A. S/MIME

10. C. Yosemite

11. A. Connection is secure.

12. D. A remote computer

13. A. An email message

14. C. VeraCrypt

15. A. TPM

16. A. Microsoft Outlook doesn’t support sending encrypted email on an individual message or for all messages.

17. D. Certificate authority (CA)

18. C. PIN or passcode

19. C. Encrypt contents to secure data

20. B. Padlock and green filename

Chapter 34

1. C. A database that can recover from a failure quickly

2. B. RAID 10

3. C. 1.5TB

4. B. Network redundancy

5. C. File synchronization

6. B. Current orders

7. D. RAID

8. A. Configure the dissimilar hardware options.

9. B. Warm site

10. C. Hot site

11. A. They are not often used in servers.

12. D. RAID 0

13. B. Fault tolerance

14. A. Contingency plan

15. D. On-site

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset