Npower ITF Certification Practice
Quiz Bank Questions And Answers
Latest Update
Which of the following can be accomplished in the Task Manager?
Startup management,
Process management
What would you use if you wanted to assign a special rule to a column or group of
columns?
Constraint
Which of the following is true about a foreign key?
A foreign key allows you to find associated data in a master or parent table.
Which of the following are components of data-driven business decisions?
Meaningful reporting, Data correlation, and Data capture and collection
Which of the following are types of non-relational databases?
Document Database, Key/Value Database
Which term is used to describe the overall structure of a database?
Schema
Which of the following can help with system performance, storage space, and
clean up the device GUI?
Unnecessary Software Removal
Which of the following is NOT an advanced option regarding software installation
best practices?
Reading Instructions
,Select, insert, delete, and update are members of which of the following
relational methods?
Data Manipulation
When using the Internet, which of the following areas should concern you about
your expectation of privacy?
When using email
When using file sharing applications
When using social networking sites
While instant messaging
Which of the following are measures of processing speed?
MHz (Megahertz), GHz (Gigahertz)
You are setting up a wireless network for a coffee shop. The shop owner is
concerned about the types of traffic on
the network. She would like to have patrons acknowledge an Acceptable Use
Policy before logging on to the
network.
Which of the following is the best practice that would allow you to configure the
network per the owner's request?
Set up a captive portal
Where would you go to update a driver?
Device Manager
Which kind of application architecture includes making a purchase on the
Internet?
n-tier
,Which of the following disaster recovery concepts is implemented by choosing to
restore yesterday's sales data over employee resumes?
Prioritization
Which of these would more likely be associated with a server versus a
workstation?
Hot-swappable redundant power supplies, KVM switch, & Rack-mounted
What is BitLocker used to protect?
Data at rest
Which of the following would most likely have the most restrictive data cap
limiting the amount of data you could
download over a specific time frame?
Cellular, & Satellite service
You are at a restaurant and check in on a social media site using your mobile
phone. Why is this a privacy concern?
The mobile social media application may share your location information with
other
Which programming language is most commonly used to extract information
from a database?
SQL
A written in plain language so that the steps are easy to understand.
Pseudocode
visual representations of the logic
Flow Charts
Allows the program to continue on an alternate path based on the evaluation of a
condition.
Branching
, repeats a section of the program based on a condition that remains true, until a
condition becomes true, or for a specific number of times.
Looping
Which of the following are characterized as availability concerns?
Power Outage, Denial of Service, & Destruction
You have determined that a table in the database is no longer needed. Which
would you use to remove the table?
Drop
Where would you most likely find a 64-bit CPU?
Laptop, Workstation, or Server
Of the choices below, which provides the fastest Internet service?
Fiber Optic
In the address bar of a web site, you see a lock symbol similar to the one in the
image below, along with https:// instead of http://. What do the lock and https
tell you?
You are on a secure website.
Of which of the following are XML and JSON examples?
Semi-Structured Data
You arrive at the user's cubicle in response to a help desk call. Your first step is to
identify the problem. Which one of these is NOT an activity you might use to
identify the problem?
Establish a theory of probable cause.
Which of the following is an example of single-platform software?
CorelDraw
Which of the following basic protocols is responsible for sending email?
SMTP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Schoolflix. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.