CompTIA IT Fundamentals Review (2nd Attempt)

CompTIA IT Fundamentals Review (2nd Attempt)

7th - 8th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

7th Grade

20 Qs

Year 7 October

Year 7 October

7th Grade

15 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

Safe or Unsafe?

Safe or Unsafe?

5th - 9th Grade

16 Qs

Jobs in ICT

Jobs in ICT

6th - 10th Grade

15 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

ICT

ICT

6th - 10th Grade

15 Qs

Hackers and Malware

Hackers and Malware

8th Grade

15 Qs

CompTIA IT Fundamentals Review (2nd Attempt)

CompTIA IT Fundamentals Review (2nd Attempt)

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Umente Charles

Used 176+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

The quality of the computer used to connect

A security method of allowing connections

The employees’ home ISP speeds

The geographical location of the employees

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A function is BEST used for enabling programs to:

hold a list of numbers.

be divided into reusable components.

define needed constant values.

define variables to hold different values.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Database software

Word processing software

Conferencing software

Presentation software

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step?

Implement the solution.

Document lessons learned.

Establish a plan of action.

Verify full system functionality.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Password reuse

Snooping

Social engineering

Phishing

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Loop

Variable

Constant

Function

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following language types would a web developer MOST likely use to create a website?

Interpreted

Query

Compiled

Assembly

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?