TESTOUT CERTIFICATION TEST QUESTIONS
Abby wants a high-end computer system for her home office that can be upgraded.
Which of the
following should she choose? - Answers- Desktop
Which type of digital picture can be scaled to any size without losing quality? -
Answers- vector
Which of the following lists the basic computing and processing steps in order? -
Answers- Input, processing, output, and storage
Which of the following is the correct binary representation of the number - Answers- 10
Which of the following encoding schemes would MOST likely be used to represent an
emoji? - Answers- unicode
Anna, a technician, is helping a customer troubleshoot an issue where a server will
intermittently become inaccessible to employees. Anna has completed researching the
knowledge bases available. What should Anna do NEXT as part of standard
troubleshooting methodology? - Answers- Establish a theory of probable cause
Here is the troubleshooting methodology in order: - Answers- 1. Identify the problem
2. Research knowledge base/Internet, if applicable
3. Establish a theory of probable cause
4. Test the theory to determine the cause
5. Establish a plan of action to solve the problem and identify potential effects
6. Implement the solution or escalate as necessary
7. Verify full system functionality and, if applicable, implement preventive measures
8. Document findings/lessons learned, actions, and outcomes.
A customer has brought a computer in to be repaired. He said he thinks that the sound
card has
stopped working because no audio is produced when music, video, or DVDs are played.
stopped working - Answers- verify that the volume isn't muted.
Verify that speakers are plugged into the correct jack and are powered on.
You are troubleshooting a malfunctioning notebook computer. Nothing appears on the
LED
display when the system is powered on. - Answers- Plug in an external monitor
Which of the following is NOT an optical storage device? - Answers- hard disk
You want to use an application and are not connected to a network. Which of the
following
application delivery methods should you choose? - Answers- Local installation
, Which of the following wireless communication technologies can be described as
follows?
• Has a very limited transmission range, of less than two inches
• Used with credit cards and passports
• Slower than other wireless technologies
• Constantly emitting a signal - Answers- nfc
An application developer needs to store configuration data that can be retrieved each
time the application is launched. The data must be in a format that could be easily
viewed outside of the application and edited using any editor. Which of the following
would be the BEST choice? - Answers- Text-based flat file
A database administrator wants to export all the data in a database to a comma
separated value file (.CSV) where it can be opened by spreadsheet software. Which of
the following would be the
EASIEST way to create the exported file? - Answers- Database dump
Which of the following SQL commands would you use to delete an entire table and all of
its data? - Answers- DROP
A business user wants to retrieve data from a relational database. Which of the
following would
they use to get the data they need? - Answers- Query language
After running the following pseudocode, what will the value of VARIABLE be?
1. Set value of VARIABLE to 5
2. Increase the value of VARIABLE by 3
3. If the value of VARIABLE is odd, increase its value by 1
4. If the value of VARIABLE is even, increase its value by 1
5. If the value of VARIABLE is odd, increase its value by 1 - Answers- 10
A developer is creating a program that will store a customer's latest order number. The
value will
change each time a custom creates a new order. Which of the following would MOST
likely be - Answers- variable
Which of the following is used to model real-world objects into computer code? -
Answers- Object-oriented programming
Julien, a programmer, was fixing a bug in the programming code written by another
developer.
He discovered that the code with the bug was repeated several times. Instead of fixing
the bug
in multiple places, which of the following programming features should he use so the
code is only
Abby wants a high-end computer system for her home office that can be upgraded.
Which of the
following should she choose? - Answers- Desktop
Which type of digital picture can be scaled to any size without losing quality? -
Answers- vector
Which of the following lists the basic computing and processing steps in order? -
Answers- Input, processing, output, and storage
Which of the following is the correct binary representation of the number - Answers- 10
Which of the following encoding schemes would MOST likely be used to represent an
emoji? - Answers- unicode
Anna, a technician, is helping a customer troubleshoot an issue where a server will
intermittently become inaccessible to employees. Anna has completed researching the
knowledge bases available. What should Anna do NEXT as part of standard
troubleshooting methodology? - Answers- Establish a theory of probable cause
Here is the troubleshooting methodology in order: - Answers- 1. Identify the problem
2. Research knowledge base/Internet, if applicable
3. Establish a theory of probable cause
4. Test the theory to determine the cause
5. Establish a plan of action to solve the problem and identify potential effects
6. Implement the solution or escalate as necessary
7. Verify full system functionality and, if applicable, implement preventive measures
8. Document findings/lessons learned, actions, and outcomes.
A customer has brought a computer in to be repaired. He said he thinks that the sound
card has
stopped working because no audio is produced when music, video, or DVDs are played.
stopped working - Answers- verify that the volume isn't muted.
Verify that speakers are plugged into the correct jack and are powered on.
You are troubleshooting a malfunctioning notebook computer. Nothing appears on the
LED
display when the system is powered on. - Answers- Plug in an external monitor
Which of the following is NOT an optical storage device? - Answers- hard disk
You want to use an application and are not connected to a network. Which of the
following
application delivery methods should you choose? - Answers- Local installation
, Which of the following wireless communication technologies can be described as
follows?
• Has a very limited transmission range, of less than two inches
• Used with credit cards and passports
• Slower than other wireless technologies
• Constantly emitting a signal - Answers- nfc
An application developer needs to store configuration data that can be retrieved each
time the application is launched. The data must be in a format that could be easily
viewed outside of the application and edited using any editor. Which of the following
would be the BEST choice? - Answers- Text-based flat file
A database administrator wants to export all the data in a database to a comma
separated value file (.CSV) where it can be opened by spreadsheet software. Which of
the following would be the
EASIEST way to create the exported file? - Answers- Database dump
Which of the following SQL commands would you use to delete an entire table and all of
its data? - Answers- DROP
A business user wants to retrieve data from a relational database. Which of the
following would
they use to get the data they need? - Answers- Query language
After running the following pseudocode, what will the value of VARIABLE be?
1. Set value of VARIABLE to 5
2. Increase the value of VARIABLE by 3
3. If the value of VARIABLE is odd, increase its value by 1
4. If the value of VARIABLE is even, increase its value by 1
5. If the value of VARIABLE is odd, increase its value by 1 - Answers- 10
A developer is creating a program that will store a customer's latest order number. The
value will
change each time a custom creates a new order. Which of the following would MOST
likely be - Answers- variable
Which of the following is used to model real-world objects into computer code? -
Answers- Object-oriented programming
Julien, a programmer, was fixing a bug in the programming code written by another
developer.
He discovered that the code with the bug was repeated several times. Instead of fixing
the bug
in multiple places, which of the following programming features should he use so the
code is only