Basic IT Literacy 2-CompTIA IT Fundamentals (FCO-U51) Certification Exam
Terms in this set (61)
Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers?
Which of the following is a common way to prevent physical theft of a laptop or workstation?
Cable and lock device securely attached to a solid object.
Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message on her screen indicating a virus has been detected by the antivirus software. Which of the following actions should be performed NEXT?
Run a scan on the entire local drive.
A technician needs to troubleshoot a user's computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?
Joe, a user, has many applications on his computer and is trying to use software management best practices. Which of the following should he consider?
Uninstall unneeded applications.
A user's government identification number, birth date, and current address are considered which of the following?
A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice?
Online user forum
Which of the following software types BEST facilitates collaboration?
Instant messaging software
To increase security, which of the following is the BEST feature to disable on a mobile device when not in use?
A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check?
The data cable
A user is updating a website. Which of the following protocols will provide the MOST security when uploading the files?
A website locks a user's account after three unsuccessful login attempts. This precaution prevents which of the following?
Which of the following commands is used to view the contents of a file?
Which of the following extension types are associated with document files? (Select THREE).
.txt, .odf, .rtf
A home user wants to share files between two different computers. The user wants the files to be available to either computer, regardless of whether or not either computer is turned on. Which of the following is the BEST storage method?
Network attached storage
Which of the following is the component responsible for interconnectivity of internal system devices?
Which of the following storage methods provides the HIGHEST redundancy and availability?
Which of the following is a benefit of setting up a computer to receive automatic updates from the
Keeps the software current and applies security patches
Which of the following application types is MOST often used for doing a mail merge?
A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible. Which of the following is the MOST likely cause?
SSID broadcast is disabled
Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?
Ensuring sufficient airflow
An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?
Joe, a user, is setting up a new computer and wants to minimize the risk of a malicious software infection over the network. Which of the following should be configured on the new computer? (Select THREE).
Software firewall, Operating system updates, Anti-malware software
Which of the following file types is used to consolidate a group of files?
Which of the following keys should be pressed to enable access to various menus?
Ann, a user, has an external monitor that will not turn on. Her laptop has activity lights and is plugged into the same power strip. Which of the following should be checked FIRST to begin troubleshooting this issue?
The monitor power cable
Which of the following data connections can span the FARTHEST distance?
Which of the following functions can transfer a file between folders and deletes it from the original
An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?
The operating system is 32-bit.
A printer is migrated between offices. All the wires are connected properly, but the new workstation cannot find the printer. Which of the following should the technician install?
A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?
Back up important folders
Which of the following adds a basic security measure to a wireless device?
Screen lock feature
Which of the following system utilities allows a user to configure multiple monitors in the OS?
Joe, a user, reports that his neck and back are hurting after being at his desk for the whole day. Which of the following are the possible causes of the problem? (Select TWO).
The monitor height is not adjusted to Joe's needs & The chair is not properly adjusted to Joe's needs.
Which of the following are core peripherals needed to use a desktop PC? (Select THREE).
Monitor, Keyboard, Mouse
A user purchases a new desktop computer and requires assistance setting it up. Which of the following describes the BEST resource the user should reference?
Which of the following is used for telepresence?
Which of the following storage media provides the FASTEST speeds when backing up large data files?
Locally attached storage
Which of the following security threats is classified as license theft?
Entering the neighbor's software key
A technician is creating a WiFi network to which anyone can connect without entering a key. With which of the following should the technician configure the wireless network?
A user is staying at a hotel on a trip and has the option to connect to multiple Wi-Fi networks. Which of the following networks is the BEST to use?
One secured with WPA2
A user receiver a message that requests login information and claims to be from the user's IT department. This is an example of:
Ann, a user, is redirected to a shopping website every time she searches for items in any search engine she uses. Which of the following BEST describes the cause of this problem?
Which of the following connector types are similar in physical appearance? (Select two.)
Thunderbolt & FireWire
Which of the following allows users to print to another user's local printer?
Which of the following is used by an email account to receive email?
Which of the following is true about a user wanting to run a 64-bit software program on a 32-bit OS?
The program cannot run natively on a 32-bit OS.
To ensure that a user is hardening computer resources properly, the user should do which of the following? (Select two.)
Install and update threat prevention software & Use a password-protected screen saver
Which of the following are examples of mobile OSs for cellular services? (Select two.)
iOS & Android
Which of the following connection methods requires line-of-sight to be effective?
When logging in to a laptop, which of the following is an example of multifactor authentication?
Logging on via key fob, password, and fingerprint reader
An employee who is working for a small business would like to prevent shoulder surfing. Which of the following should the employee do?
Purchase a privacy screen.
A company needs an application that filters unwanted network traffic. Which of the following should be configured?
Ann, a user, is using a mobile device at a local coffee shop where she connects to an open Wi-Fi hotspot. Which of the following is a risk that should be considered while using the hotspot?
Data is not encrypted
Which of the following items need to be disposed of properly to avoid hazardous materials in landfills? (Select two.)
Batteries & Toner
Which of the following storage types has no moving parts?
Solid state drive
Which of the following can be considered a basic function of a desktop OS?
Provide an environment for software to function.
Which of the following are common audio file extensions? (Select two.)
.mp3 & .m4a
A user has recently installed a new version of antivirus software on a workstation. Which of the following steps should be taken to reduce the risk of infection?
Update the definitions
Which of the following describes sleep mode for a computer?
Low energy usage with session data stored in RAM
A technician needs to connect a user's computer to the network. Which of the following device types would the technician install?
YOU MIGHT ALSO LIKE...
TCC IT Fundamentals Part 2
IT Fundamentals Practice Test Questions
IT Fundamentals Practice Test Questions
OTHER SETS BY THIS CREATOR
Internet Safety 2018
IT Project Management Acronyms (PKO-004)
Networking Hardware 2018
TCP/IP Model 2018
THIS SET IS OFTEN IN FOLDERS WITH...
Basic IT Literacy 1-CompTIA IT Fundamentals (FCO-U51) Certification Exam
Software-CompTIA IT Fundamentals (FCO-U51) Certification Exam
Acronyms-CompTIA IT Fundamentals (FCO-U51) Certification Exam
Hardware-CompTIA IT Fundamentals (FCO-U51) Certification Exam