CompTIA ITF+ 1

CompTIA ITF+ 1

11th Grade

25 Qs

quiz-placeholder

Similar activities

Key Programming Concepts

Key Programming Concepts

5th - 12th Grade

28 Qs

Computational Thinking

Computational Thinking

9th Grade - University

22 Qs

Business Apps FInal Exam Review

Business Apps FInal Exam Review

9th - 12th Grade

30 Qs

Oil change Vocabulary

Oil change Vocabulary

9th - 12th Grade

20 Qs

Concrete

Concrete

9th - 12th Grade

23 Qs

Term 3 Quiz Quizs Review

Term 3 Quiz Quizs Review

9th Grade - University

20 Qs

Word Processor Special Quiz

Word Processor Special Quiz

11th - 12th Grade

20 Qs

Ultimate Quiziz Part

Ultimate Quiziz Part

9th - 12th Grade

28 Qs

CompTIA ITF+ 1

CompTIA ITF+ 1

Assessment

Quiz

Instructional Technology

11th Grade

Medium

Created by

Jorge Melendez

Used 45+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A developer embeds a query in a high-level program to extract information from a database. This is an example of:

database direct access.

database utility access.

database programmatic access.

database manual access.

Answer explanation

A developer embedding a query in a high-level program to extract information from a database is an example of database direct access. This method involves using programming languages to interact with the database, allowing for more control and flexibility in data retrieval and manipulation.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following will a company do to update a customer’s address while using a flat file database?

Update the address for each order the customer placed.

Update the address in the customer address table.

Update the address field in the customer order table.

Update the primary key to reflect the customer’s address.

Answer explanation

In a flat file database, data is stored in a single table, so updating a customer's address would require updating the address field in the customer order table. This is because there is no separate customer address table or primary key related to the address in a flat file database.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?

Text editor

Word processor

Command line

Spreadsheet

Answer explanation

A systems administrator can use the command line to run scripts when they do not have access to the graphical user interface. Text editors, word processors, and spreadsheets are not suitable for running scripts, as they are primarily used for editing and managing documents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?

Enhance the granularity of user permissions.

Enable an audit log.

Implement smart card login.

Adopt a procedure for adding accounts.

Answer explanation

Implementing smart card login is the best action for adding accounting features to a web application because it provides an additional layer of security through two-factor authentication. This ensures that only authorized users can access the application, enhancing the overall security and integrity of the accounting features.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:

drawing a value stream map.

developing pseudocode.

identifying functions.

compiling the language.

Answer explanation

The question is about the process a developer undergoes when drafting the logic of a program. The correct answer is 'developing pseudocode.' Pseudocode is a simple way of writing programming code in English. It is a step in the programming process that helps developers plan out and visualize the logic of their code before writing the actual program.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the WEAKEST link in the security posture of an organization?

Technology

Infrastructure

People

Regulations

Answer explanation

The weakest link in the security posture of an organization is often the people. Despite having advanced technology, robust infrastructure, and strict regulations, human error or negligence can lead to security breaches. Therefore, people are considered the weakest link in an organization's security posture.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?

Manually install the driver software.

Connect the mouse.

Configure the USB port.

Download the driver software.

Answer explanation

The question asks about the necessary step a technician must take to install a plug-and-play USB mouse. The correct answer is 'Connect the mouse.' This is because plug-and-play devices like a USB mouse are designed to be recognized and configured automatically by the computer once they are connected, eliminating the need for manual driver installation or USB port configuration.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?