100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Npower ITF Certification - Quiz Bank: Questions With Solutions $27.99   Add to cart

Exam (elaborations)

Npower ITF Certification - Quiz Bank: Questions With Solutions

 7 views  0 purchase
  • Course
  • Institution

Npower ITF Certification - Quiz Bank: Questions With Solutions

Preview 4 out of 46  pages

  • October 13, 2024
  • 46
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Npower ITF Certification - Quiz Bank: Questions With
Solutions

Which of the following can be accomplished in the Task Manager? Right
Ans - Startup management,
Process management

What would you use if you wanted to assign a special rule to a column or
group of columns? Right Ans - Constraint

Which of the following is true about a foreign key? Right Ans - A foreign
key allows you to find associated data in a master or parent table.

Which of the following are components of data-driven business decisions?
Right Ans - Meaningful reporting, Data correlation, and Data capture and
collection

Which of the following are types of non-relational databases? Right Ans -
Document Database, Key/Value Database

Which term is used to describe the overall structure of a database? Right
Ans - Schema

Which of the following can help with system performance, storage space, and
clean up the device GUI? Right Ans - Unnecessary Software Removal

Which of the following is NOT an advanced option regarding software
installation best practices? Right Ans - Reading Instructions

Select, insert, delete, and update are members of which of the following
relational methods? Right Ans - Data Manipulation

When using the Internet, which of the following areas should concern you
about your expectation of privacy? Right Ans - When using email

When using file sharing applications

When using social networking sites

,While instant messaging

Which of the following are measures of processing speed? Right Ans - MHz
(Megahertz), GHz (Gigahertz)

You are setting up a wireless network for a coffee shop. The shop owner is
concerned about the types of traffic on
the network. She would like to have patrons acknowledge an Acceptable Use
Policy before logging on to the
network.

Which of the following is the best practice that would allow you to configure
the network per the owner's request? Right Ans - Set up a captive portal

Where would you go to update a driver? Right Ans - Device Manager

Which kind of application architecture includes making a purchase on the
Internet? Right Ans - n-tier

Which of the following disaster recovery concepts is implemented by choosing
to restore yesterday's sales data over employee resumes? Right Ans -
Prioritization

Which of these would more likely be associated with a server versus a
workstation? Right Ans - Hot-swappable redundant power supplies, KVM
switch, & Rack-mounted

What is BitLocker used to protect? Right Ans - Data at rest

Which of the following would most likely have the most restrictive data cap
limiting the amount of data you could
download over a specific time frame? Right Ans - Cellular, & Satellite
service

You are at a restaurant and check in on a social media site using your mobile
phone. Why is this a privacy concern? Right Ans - The mobile social media
application may share your location information with other

,Which programming language is most commonly used to extract information
from a database? Right Ans - SQL

A written in plain language so that the steps are easy to understand. Right
Ans - Pseudocode

visual representations of the logic Right Ans - Flow Charts

Allows the program to continue on an alternate path based on the evaluation
of a condition. Right Ans - Branching

repeats a section of the program based on a condition that remains true, until
a condition becomes true, or for a specific number of times. Right Ans -
Looping

Which of the following are characterized as availability concerns? Right
Ans - Power Outage, Denial of Service, & Destruction

You have determined that a table in the database is no longer needed. Which
would you use to remove the table? Right Ans - Drop

Where would you most likely find a 64-bit CPU? Right Ans - Laptop,
Workstation, or Server

Of the choices below, which provides the fastest Internet service? Right
Ans - Fiber Optic

In the address bar of a web site, you see a lock symbol similar to the one in the
image below, along with https:// instead of http://. What do the lock and
https tell you? Right Ans - You are on a secure website.

Of which of the following are XML and JSON examples? Right Ans - Semi-
Structured Data

You arrive at the user's cubicle in response to a help desk call. Your first step
is to identify the problem. Which one of these is NOT an activity you might use
to identify the problem? Right Ans - Establish a theory of probable cause.

, Which of the following is an example of single-platform software? Right
Ans - CorelDraw

Which of the following basic protocols is responsible for sending email?
Right Ans - SMTP

Which of the following is an IP address? Right Ans -
2001:0db8:85a3:0000:0000:8a2e:0370:7334

and

192.168.0.1

Which of the following addresses the storage concern of data persistence?
Right Ans - Saving the information to disk

Which of the following loses the data stored on it when the power goes out?
Right Ans - RAM

You are at the computer store, trying to decide which wireless router to
purchase for your new wireless network. What types of features and
specifications should you consider? Right Ans - Older vs newer standards

Attenuation factors

Interference factors

Speed limitations

Encrypting email is one type of data-in-transit encryption. What does email
use for encryption? Right Ans - PGP, S/MME

You want to create a group of steps that will be executed without branching or
looping. Which programming concept would you use? Right Ans - Sequence

When you type a website address, such as www.cybervista.net, into a web
browser, what is responsible for translating the characters into an IP address?
Right Ans - DNS

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller LeCrae. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $27.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78075 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$27.99
  • (0)
  Add to cart