CompTia Fundamentals FC0-U61 Exam Dumps Part 2

CompTia Fundamentals FC0-U61 Exam Dumps Part 2

For the rest of CompTia Fundamentals FC0-U61 exam questions. Please follow us on the CompTia Fundamentals FC0-U61 Actual Exam Version.

awslagi.com/course/comptia-fundamentals-fc0..

QUESTION NO: 21. Which of the following statements BEST describes binary?

A. A notational system used to represent an “on” or “off” state

B. A notational system used to represent media access control

C. A notational system used to represent Internet protocol addressing

D. A notational system used to represent a storage unit of measurement

QUESTION NO: 22. Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

A. Loop

B. Variable

C. Constant

D. Function

QUESTION NO: 23. An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

A. Restart the computer.

B. Contact other users.

C. Disconnect the peripherals.

D. Document the findings.

QUESTION NO: 24. A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

A. Non-repudiation

B. Authentication

C. Integrity

D. Accounting

QUESTION NO: 25. Which of the following is an advantage of installing an application to the cloud?

A. Data is not stored locally.

B. Support is not required.

C. Service is not required.

D. Internet access is not required.

QUESTION NO: 26. A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

A. The quality of the computer used to connect

B. A security method of allowing connections

C. The employees’ home ISP speeds

D. The geographical location of the employees

QUESTION NO: 27. A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

A. Variable

B. If

C. Datatype

D. Comment

QUESTION NO: 28. A UPS provides protection against:

A. denial of service

B. replay attack.

C. power outages.

D. wiretapping.

QUESTION NO: 29. A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A. Optical drive

B. Hard disk drive

C. Solid state drive

D. Flash drive

QUESTION NO: 30. A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step?

A. Implement the solution.

B. Document lessons learned.

C. Establish a plan of action.

D. Verify full system functionality.

QUESTION NO: 31. Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

A. Oatmeal

B. Bacon and eggs

C. Waffles

D. Pancakes

QUESTION NO: 32. A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

A. Permission

B. Ink cartridge

C. USB cable

D. Driver

QUESTION NO: 33. Which of the following BEST describes a kilobyte?

A. A kilobyte is a measurement of storage (e.g., 100KB).

B. A kilobyte is a measurement of throughput (e.g.,100Kbps).

C. A kilobyte is a measurement of power (e.g., 100KW).

D. A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

QUESTION NO: 34. Which of the following security concerns is a threat to confidentiality?

A. Replay attack

B. Denial of service

C. Service outage

D. Dumpster diving

QUESTION NO: 35. Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A. Proprietary software

B. Commercial software

C. Open source software

D. Cross-platform software

QUESTION NO: 36. Which of the following are the basic computing operations?

A. Input, process, output, and feedback

B. Input, output, storage, and feedback

C. Input, process, and output

D. Input, process, output, and storage

QUESTION NO: 37. Which of the following would work BEST stored as a flat file rather than stored in a database?

A. Contact list

B. Movie theater locations

C. Directions to doctor’s office

D. Store inventory

QUESTION NO: 38. An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

A. Data correlation

B. Data manipulation

C. Data gathering

D. Data definition

QUESTION NO: 39. An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

A. Standalone application

B. Client-server application

C. Web application

D. Cloud application

QUESTION NO: 40. Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

A. The power interruption caused the camera to malfunction.

B. Ann has a compatibility problem with the camera.

C. A firmware update needs to be applied to the camera.

D. Ann’s Internet connection and wireless router are still down.