Pass the CompTIA IT Fundamentals FC0-U61 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?

Options:

A.

If employeesalary is greater than $15 per hour employeesalary = employeesalary * 1.032


B.

For all employees in the list making less than $15 per hour employeesalary = employeesalary * 1.032


C.

If employeesalary is less than $15 per hour employeesalary = employeesalary * 3.2


D.

For all employees in the list making greater than $15 per hour employeesalary = employeesalary * 3.2


Expert Solution
Questions # 72:

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.


B.

Verify full system functionality.


C.

Identify the problem.


D.

Implement the solution.


Expert Solution
Questions # 73:

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII


B.

Octal


C.

Hexadecimal


D.

Unicode


Expert Solution
Questions # 74:

Which of the following OS features would be best to use to remove unnecessary programs?

Options:

A.

Application management


B.

Disk management


C.

Process management


D.

Memory management


Expert Solution
Questions # 75:

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety


B.

To prevent someone from guessing them


C.

To make them harder to remember


D.

To reduce social engineering attacks


Expert Solution
Questions # 76:

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two


B.

Four


C.

Three


D.

Five


Expert Solution
Questions # 77:

Given the following pseudocode:

Question # 77

Which of the following is the output of the code?

Options:

A.

1


B.

9


C.

10


D.

11


Expert Solution
Questions # 78:

Which of the following is a characteristic of both a database and a flat file?

Options:

A.

Concurrent users


B.

Persistence


C.

Queries


D.

Data definition


Expert Solution
Questions # 79:

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack


B.

Social engineering


C.

On-path attack


D.

Eavesdropping


Expert Solution
Questions # 80:

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal


B.

Bacon and eggs


C.

Waffles


D.

Pancakes


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions