FC0-U61 Practice Test Questions

75 Questions


A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?


A.

Ensure both devices are connected to the LAN.


B.

Enable task scheduling.


C.

Reset the proxy settings to their default values.


D.

Review the fault tolerance configurations.





A.
  

Ensure both devices are connected to the LAN.



Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?


A.

Renew the IP address


B.

Configure the browser proxy settings


C.

Clear the browser cache


D.

Disable the pop-up blocker





B.
  

Configure the browser proxy settings



When transferring a file across the network, which of the following would be the FASTEST transfer rate?


A.

1001Kbps


B.

110Mbps


C.

1.22Gbps


D.

123Mbps





C.
  

1.22Gbps



Which of the following are the basic computing operations?


A.

Input, process, output, and feedback


B.

Input, output, storage, and feedback


C.

Input, process, and output


D.

Input, process, output, and storage





D.
  

Input, process, output, and storage



A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?


A.

Patent


B.

Trademark


C.

Watermark


D.

Copyright





D.
  

Copyright



The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?


A.

Update from 802.11b to 802.11g.


B.

Ensure sources of EMI are removed.


C.

Enable WPA2-Enterprise


D.

Use WiFi Protected Setup.





B.
  

Ensure sources of EMI are removed.



Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?


A.

Loop


B.

Variable


C.

Constant


D.

Function





B.
  

Variable



Which of the following relational database constructs is used to ensure valid values are entered for a column?


A.

Schema


B.

Permissions


C.

Constraint


D.

Column





C.
  

Constraint



For which of the following is a relational database management system MOST commonly used?


A.

Building flowcharts


B.

Storing information


C.

Generating reports


D.

Creating diagrams





B.
  

Storing information



Which of the following describes something in a database that refers to the unique identifier in the parent table?


A.

Attribute


B.

Constraint


C.

Foreign key


D.

Schema





A.
  

Attribute



A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?


A.

127.0.0.1


B.

172.16.2.189


C.

192.168.257.1


D.

255.255.255.0





B.
  

172.16.2.189



Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).


A.

Windows 7


B.

Windows 8


C.

UNIX


D.

Windows Server 2012


E.

Android


F.

Linux





C.
  

UNIX



F.
  

Linux




Page 2 out of 7 Pages
Previous