Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CompTIA FC0-U71 Dumps

Page: 1 / 11
Total 107 questions

CompTIA Tech+ Certification Exam Questions and Answers

Question 1

Which of the following is the number of bits in a byte of data?

Options:

A.

2

B.

4

C.

8

D.

16

Question 2

A user needs to transfer a 100GB data file to a coworker, but the network is down. Which of the following should the user most likely use instead?

Options:

A.

NAS

B.

Flash drive

C.

RAM

D.

Cloud

Question 3

A user identifies the reason a computer is not working, repairs it, and prints a test page. Which of the following steps should the user take next?

Options:

A.

Submit a support ticket

B.

Test the theory

C.

Implement the solution

D.

Document the actions taken

Question 4

Which of the following units of measurement is the largest?

Options:

A.

GB

B.

TB

C.

PB

D.

MB

Question 5

A web page is displaying outdated credentials when a user enters information in an online form. Which of the following actions should the user complete first to fix the issue?

Options:

A.

Change the user profile

B.

Turn off pop-up blockers

C.

Clear the cache

D.

Remove add-ons

Question 6

Which of the following makes a file readable only by select users who possess a key?

Options:

A.

Hidden folders

B.

File permissions

C.

Compression

D.

Encryption

Question 7

Which of the following display types is bidirectional?

Options:

A.

DisplayPort

B.

VGA

C.

DVI

D.

USB-C

Question 8

A programmer needs to create a space in an application code to hold a value. The value will be updated periodically when the code is executed. Which of the following should the programmer use?

Options:

A.

Variable

B.

Sequence

C.

Loop

D.

Constant

Question 9

Which of the following features of an OS prioritizes a program's use of resources?

Options:

A.

Application management

B.

Process management

C.

Access management

D.

Device management

Question 10

A lab technician removes access from students who do not need to use a fileshare. Which of the following best describes this action?

Options:

A.

Least privilege model

B.

Non-repudiation

C.

Multifactor authentication

D.

Single sign-on

Question 11

An employee is working on a database and wants to retrieve specific information. Which of the following should the employee use?

Options:

A.

Big data

B.

Input

C.

Scale

D.

Query

Question 12

A user plugs a new scanner into a computer and turns it on. The scanner is automatically detected. However, the OS will only respond to some, but not all, of the buttons on the scanner. Which of the following steps should the user take next to enable full functionality?

Options:

A.

Roll back the device driver to a previous version.

B.

Perform a test scan on the new device to the computer.

C.

Update the computer's OS.

D.

Install any applicable software from the vendor's website.

Question 13

A technician is reviewing log files to track the number of times that a specific user has logged on to the networks. Which of the following security concepts is being used?

Options:

A.

Accounting

B.

Authorization

C.

Authentication

D.

Non-repudiation

Question 14

Which of the following is used to measure the speed of a CPU?

Options:

A.

MHz

B.

MB

C.

Mbps

D.

MAC

Question 15

A database administrator wants to retrieve recently updated entries. Which of the following functions should the administrator run to complete the task?

Options:

A.

Create

B.

Query

C.

Import

D.

Report

Question 16

Which of the following encryption types protects data at rest?

Options:

A.

File-level

B.

VPN

C.

HTTPS

D.

Plaintext

Question 17

A group wants to store data while collaborating on a project. Which of the following is the best option to enable high availability of the data?

Options:

A.

Cloud storage

B.

External hard drive

C.

Flash drive

D.

Local backup

Question 18

A user wants to access books and does not need printed, physical copies. The solution should be portable and lightweight. Which of the following is the best solution?

Options:

A.

E-reader

B.

Servers

C.

External drive

D.

Workstation

Question 19

Users are discussing the birthdays and home addresses of notable public figures in a public chat room. Which of the following security concepts is being compromised?

Options:

A.

Confidentiality

B.

Integrity

C.

Privacy

D.

Availability

Question 20

A database administrator creates a new database and assigns the primary key. Which of the following database types has the administrator created?

Options:

A.

Document

B.

Key/value

C.

Relational

D.

Non-structured

Question 21

A user's internet speed is slow. The user logs in to the router's administrator portal and sees that unauthorized devices are connected to the network. Which of the following actions should the user take to prevent unauthorized use of the network?

Options:

A.

Call the internet provider's support line.

B.

Decrease the Wi-Fi signal range.

C.

Change the password.

D.

Reset the router.

Question 22

A user is typing a document using a keyboard. Which of the following describes this action?

Options:

A.

Input

B.

Storage

C.

Output

D.

Processing

Question 23

Which of the following refers to a human-readable program?

Options:

A.

Branch

B.

Sequence

C.

Object-oriented

D.

Pseudocode

Question 24

A technician needs to install input devices while setting up a new desktop PC. Which of the following should the technician install? (Choose two.)

Options:

A.

Printer

B.

Mouse

C.

Keyboard

D.

CPU

E.

Speaker

F.

SSD

Question 25

A user is writing code to calculate the amount of pay for each worker at a company. The pay rate is the same for all workers. The code will use the formula:

amount_of_pay = number_of_hours × pay_rate

Which of the following should be used in the code to represent pay_rate?

Options:

A.

Object

B.

Function

C.

Constant

D.

Array

Question 26

Which of the following can be used to stop an application that is no longer responding?

Options:

A.

Access management

B.

Task management

C.

Disk management

D.

Device management

Question 27

Which of the following is used to represent a device's physical address?

Options:

A.

Hexadecimal

B.

Octal

C.

Decimal

D.

Binary

Question 28

A user is creating a simple, static web page. Which of the following language types should the user use?

Options:

A.

Query

B.

Assembly

C.

Scripting

D.

Markup

Question 29

Given the following pseudocode:

10 READ Q,W

20 PRINT Q,W

30 GOTO 10

40 DATA 10,20,30,40,50,60,70,80,90,100

Which of the following best defines the type of data being used?

Options:

A.

Boolean

B.

Array

C.

Variable

D.

Function

Question 30

Which of the following is most likely the fastest residential internet option?

Options:

A.

Satellite

B.

Cable

C.

DSL

D.

Fiber optic

Question 31

Which of the following concepts is represented by the sale of customer email addresses to potential product vendors?

Options:

A.

Data monetization

B.

Data correlation

C.

Data analytics

D.

Data capture

Question 32

Which of the following internet services traditionally has the most challenges with latency?

Options:

A.

DSL

B.

Fiber

C.

Satellite

D.

Cable

Page: 1 / 11
Total 107 questions