CompTIA ITF+ Practice Test - Questions and Answers Which of the following would work BEST stored as a flat file rather than stored in a database? A.
... [Show More] Contact list B. Movie theater locations C. Directions to doctor's office D. Store inventory An administrator grants permission for a user to access data in a database. Which of the following actions was performed? A. Data correlation B. Data manipulation C. Data gathering D. Data definition An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? A. Standalone application B. Client-server application C. Web application D. Cloud application Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? A. The power interruption caused the camera to malfunction B. Ann has a compatibility problem with the camera C. A firmware update needs to be applied to the camera D. Ann's internet connection and wireless router are still down A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data? A. Flat file B. Memory C. Relational database D. Solid state drive Which of the following intellectual property concepts BEST represents a legally protected slogan of a business? A. Contract B. Patent C. Copyright D. Trademark Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information? A. Infrared B. NFC C. Bluetooth D. WiFi The IT department has established a new password policy for employees. Specifically, the policy reads: Passwords must not contain common dictionary words. Passwords must contain at least one special character. Passwords must be different from the last six passwords used. Passwords must use at least one capital letter or number. Which of the following practices are being employed? (Select TWO) A. Password lockout B. Password complexity C. Password expiration D. Passwords history E. Password length F. Password age Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer? A. Email previewing B. Patching C. Clear browsing cache D. Kill process A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task? [Show Less]