A user needs to read documentation on a device while walking around outdoors in bright sunlight.
Which of the following is the best type of device for this purpose?
C
Explanation:
E-readers use e-ink displays, which are highly readable in bright sunlight and have long battery life —
ideal for outdoor use.
Laptops, tablets, and smartphones often have glare or brightness issues in direct sunlight.
A user attempts to log in to a website and receives a prompt to update their password. Which of the
following is this an example of?
D
Explanation:
A prompt to update a password during login typically indicates that the password has expired based
on the system's policy.
Other options:
● Password history prevents reuse of old passwords,
● Password complexity sets rules for character requirements,
● Password privacy involves keeping the password confidential.
Which of the following types of AI is used to edit images?
D
Explanation:
Generative AI creates or modifies content, such as editing images, generating art, or producing
media.
Other options:
● Assistive AI supports tasks,
● Predictive AI forecasts outcomes,
● Chatbots simulate conversation but do not edit images.
Given the following pseudocode:
<BODY>
<P>This is a paragraph.</P>
</BODY>
Which of the following best represents the type of language used by this code?
A
Explanation:
The code shown uses HTML tags like <BODY> and <P>, which are part of a markup language. Markup
languages describe the structure and presentation of text, not logic or computation.
Other options:
● Query languages retrieve data (e.g., SQL),
● Compiled languages are turned into machine code (e.g., C++),
● Scripting languages execute instructions (e.g., Python, JavaScript).
Which of the following can be used to input commands for a computer to execute?
D
Explanation:
A console (or command-line interface) allows users to input commands for the computer to execute
directly.
Other options:
● Services run background tasks,
● Attributes describe properties of objects,
● Process refers to a running program, not a command input method.
Which of the following is the last tool that should be used when creating a custom-length network
cable?
A
Explanation:
The cable tester is used last to verify the cable functions correctly after cutting, attaching connectors
with a crimper, and assembling the Ethernet cable.
Wire cutter, Ethernet connector, and crimper are used earlier in the cable creation process.
Given the following pseudocode:
10 FOR Q=1 TO 100
20 PRINT Q
30 NEXT Q
40 EXIT
Which of the following best represents line 10?
D
Explanation:
Line 10 (FOR Q=1 TO 100) initializes a loop that iterates from 1 to 100.
Other options:
● Sequence refers to a straight execution of instructions,
● Branch involves decision-making (e.g., IF...THEN),
● Attribute is a descriptive property, not a control structure.
A user is logged in but unable to access a shared folder on the network. Which of the following
security concepts is in place?
B
Explanation:
Authorization determines what a user is allowed to access after they have logged in. The user is
already authenticated (logged in), but lacks permission to access the shared folder, indicating an
authorization issue.
Other options:
● Authentication verifies identity,
● Accounting tracks user actions,
● Non-repudiation ensures actions cannot be denied later.
Given the following table:
Which of the following fields best represents a primary key?
A
Explanation:
The ID field contains unique values for each record and is typically used as a primary key in a
database. A primary key uniquely identifies each row in a table.
Month, Day, Year, and Name may have duplicates and do not guarantee uniqueness.
A technician needs to install input devices while setting up a new desktop PC. Which of the following
should the technician install? (Choose two.)
B, C
Explanation:
A mouse and keyboard are standard input devices used to interact with a desktop PC.
Other options:
● Printer and speaker are output devices,
● CPU is a processing unit,
● SSD is a storage device.