Given the following pseudocode:
Which of the following is the output of the code?
A company requires several reports that analyze related information from sales, inventory, marketing, and
compensation data. Which of the following is the BEST place to store this data?
Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?
Which of the following data types would be best for storing data representing a phone number?
Which of the following BEST describes the physical location of the data in the database?
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.
Which of the following is the most likely cause?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,
the data is stored on another drive, preventing data loss. Which of the following business continuity concepts
does this explain?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?
Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?
Which of the following database types would be best in which to place financial data?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the
same time?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?
A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
Which of the following intellectual property concepts BEST represents a legally protected slogan of a
business?
Which of the following internet service types is most susceptible to weather disruptions?
A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?
Which of the following data types should a developer use when creating a variable to hold a postal code?
A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?
Which of the following data types should a database administrator use to store customer postal codes?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Which of the following allows wireless devices to communicate to a wired network?
Which of the following is a wireless communication that requires devices to be within 6in of each other to
transfer information?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?
A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Which of the following practices are being employed? (Select TWO).
Which of the following connection types is typically used for a display monitor?
An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the best choice to perform this task?
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
Which of the following is MOST likely used to represent international text data?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?
A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?
Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?
A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Which of the following is most appropriate to list on a social media site about an employer?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
Which of the following is most likely to disclose the data collection practices of an application?
A user logs into a laptop using a username and complex password. This is an example of:
Which of the following language types would a web developer MOST likely use to create a website?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the
workspace, the employee requests that the laptop be installed with the cover closed. Which of the following
would be required to satisfy this request? (Choose two.)
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
Which of the following OS features would be best to use to remove unnecessary programs?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?
A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Which of the following commands would most likely be used to add data to an existing database table?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed. Which of the following should be the technician’s NEXT step?
IT Fundamentals | FC0-U61 Questions Answers | FC0-U61 Test Prep | CompTIA IT Fundamentals+ Certification Exam Questions PDF | FC0-U61 Online Exam | FC0-U61 Practice Test | FC0-U61 PDF | FC0-U61 Test Questions | FC0-U61 Study Material | FC0-U61 Exam Preparation | FC0-U61 Valid Dumps | FC0-U61 Real Questions | IT Fundamentals FC0-U61 Exam Questions