ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 35

Question list
Search
Search

Which of the following is something that would likely need a copyright?

A.
A new commercial software program
A.
A new commercial software program
Answers
B.
A company's brand name
B.
A company's brand name
Answers
C.
A copy of a business contract
C.
A copy of a business contract
Answers
D.
An idea for computer communication
D.
An idea for computer communication
Answers
Suggested answer: A

Explanation:

A new commercial software program would likely need a copyright because it is a tangible expression of creativity and intellectual effort in the form of code and user interface design. Copyrights protect such creative works from being copied or used without permission, ensuring that creators or owners have exclusive rights to distribute and modify their creations.

Reference: CompTIA IT Fundamentals study guides discuss intellectual property rights in the context of IT, focusing on how copyrights protect software and other digital content from unauthorized reproduction or use.

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

A.
NFC
A.
NFC
Answers
B.
Infrared
B.
Infrared
Answers
C.
Wi-Fi
C.
Wi-Fi
Answers
D.
Bluetooth
D.
Bluetooth
Answers
Suggested answer: A

Explanation:

NFC (Near Field Communication) technology requires devices to be within 6 inches (15.24 cm) of each other to communicate. This short range facilitates secure communications for tasks such as contactless payments, quick data transfers, and connection setups between devices.

Reference: In the sections dealing with wireless technologies and data exchange methods, CompTIA IT Fundamentals documentation outlines the operational characteristics of NFC, including its very limited range, which supports its use for secure, close-proximity communications.

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

A.
Presentation software
A.
Presentation software
Answers
B.
Conferencing software
B.
Conferencing software
Answers
C.
Project management software
C.
Project management software
Answers
D.
Visual diagramming software
D.
Visual diagramming software
Answers
Suggested answer: A

Explanation:

In a scenario where an executive is sharing slides in a conference room, the most likely application used is presentation software. Presentation software allows users to create slideshows that typically include a variety of elements such as text, images, and videos, which are ideal for delivering information clearly and engagingly during meetings or presentations. Examples include Microsoft PowerPoint, Google Slides, and Apple Keynote.

Reference: This is consistent with common IT knowledge and practices as understood in IT fundamentals and further verified by CompTIA A+ and CompTIA IT Fundamentals documentation.

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

A.
Performance Monitor
A.
Performance Monitor
Answers
B.
Disk Management
B.
Disk Management
Answers
C.
Event Viewer
C.
Event Viewer
Answers
D.
Device Manager
D.
Device Manager
Answers
Suggested answer: D

Explanation:

Device Manager in Windows is a system utility used to view and control the hardware attached to the computer. It allows users to uninstall, disable, and update device drivers, as well as scan for hardware changes. This utility is essential for managing the interactions between a computer's operating system and its hardware components.

Reference: This functionality is outlined in various IT certification materials, including CompTIA's documentation which emphasizes understanding system utilities for effective IT support.

Which of the following data types would be best for storing data representing a phone number?

A.
String
A.
String
Answers
B.
Integer
B.
Integer
Answers
C.
Float
C.
Float
Answers
D.
Char
D.
Char
Answers
Suggested answer: A

Explanation:

Phone numbers, although made up of digits, are best stored as strings in most programming and database contexts. This is because phone numbers may contain leading zeros, separators (such as dashes or spaces), and international codes that are not used in calculations as numeric values would be. Storing phone numbers as strings preserves the exact formatting and data integrity.

Reference: Basic data type handling is a fundamental topic in IT education, as discussed in CompTIA IT Fundamentals and other programming foundational guides.

Which of the following is the largest storage capacity?

A.
1PB
A.
1PB
Answers
B.
100TB
B.
100TB
Answers
C.
9,000GB
C.
9,000GB
Answers
D.
9,900MB
D.
9,900MB
Answers
Suggested answer: A

Explanation:

Comparing storage capacities requires understanding the magnitude of each unit. The hierarchy from smallest to largest is megabytes (MB), gigabytes (GB), terabytes (TB), and then petabytes (PB). 1 PB (petabyte) = 1,000 TB (terabytes) 100 TB = 100 terabytes 9,000 GB = 9 terabytes 9,900 MB = 0.0099 terabytes Therefore, 1 petabyte (PB) is significantly larger than the other options listed.

Reference: Storage capacity units and conversions are covered in IT fundamental courses and materials, including those by CompTIA.

Which of the following OS features would be best to use to remove unnecessary programs?

A.
Application management
A.
Application management
Answers
B.
Disk management
B.
Disk management
Answers
C.
Process management
C.
Process management
Answers
D.
Memory management
D.
Memory management
Answers
Suggested answer: A

Explanation:

The best way to remove unnecessary programs from a computer system using the operating system's features is through 'Application management.' This feature typically provides a user interface that allows users to view, manage, and uninstall applications installed on the system. Using this feature, you can select the programs that are not needed and choose to uninstall them, thereby freeing up system resources and storage space.

Reference: This is in line with the functions of application management features found in common operating systems like Windows and macOS, which are included in the CompTIA IT Fundamentals curriculum for understanding software management.

After creating a database, which of the following would a developer most likely use to put data in the database?

A.
UPDATE
A.
UPDATE
Answers
B.
ALTER
B.
ALTER
Answers
C.
INSERT
C.
INSERT
Answers
D.
SELECT
D.
SELECT
Answers
Suggested answer: C

Explanation:

To add data into a database after its creation, the SQL command 'INSERT' is used. This command allows you to insert data into specific columns of a table in the database. The syntax of the INSERT command specifies the table to insert into, the columns to populate, and the values to enter into those columns. This is fundamental in database management and manipulation, critical for developers working with databases.

Reference: INSERT is a basic and essential SQL command covered under database operations in CompTIA IT Fundamentals and other foundational IT curricula focusing on software development and database management.

Which of the following would be the most secure password reset process?

A.
Ask users for their date of birth over the phone and reset their password.
A.
Ask users for their date of birth over the phone and reset their password.
Answers
B.
Ask users to answer custom questions and send reset codes via text.
B.
Ask users to answer custom questions and send reset codes via text.
Answers
C.
Ask users for their mother's maiden name and email them a reset link.
C.
Ask users for their mother's maiden name and email them a reset link.
Answers
D.
Ask users for their phone number and call them back with a PIN.
D.
Ask users for their phone number and call them back with a PIN.
Answers
Suggested answer: B

Explanation:

The most secure password reset process among the given options is to ask users to answer custom questions and then send a reset code via text. This method combines something the user knows (the answer to a custom question) with something the user has (access to a personal device that can receive a text), which aligns with the security principle of two-factor authentication, increasing the security of the reset process.

Reference: This method is frequently recommended in security best practices, including those covered by CompTIA IT Fundamentals, which emphasizes the importance of multi-factor authentication to enhance security.

Which of the following describes plug-and-play installation?

A.
Managed driver installation
A.
Managed driver installation
Answers
B.
Assisted driver installation
B.
Assisted driver installation
Answers
C.
Automatic driver installation
C.
Automatic driver installation
Answers
D.
Manual driver installation
D.
Manual driver installation
Answers
Suggested answer: C

Explanation:

Plug-and-play installation refers to the technology that allows the operating system to detect and configure new devices automatically as soon as they are connected to the computer, without the need for user intervention. This typically involves the automatic installation of the necessary drivers that enable the operating system to communicate with the hardware device, making the device ready for use quickly and efficiently.

Reference: Plug-and-play technology is a fundamental concept in understanding hardware and operating system interactions, as covered in the CompTIA IT Fundamentals and other basic IT educational materials.

Total 425 questions
Go to page: of 43