Practice Free FC0-U71 Exam Online Questions
Which of the following could be a letter, number, or symbol?
- A . String
- B . Boolean
- C . Char
- D . Integer
C
Explanation:
A char (character) represents a single letter, number, or symbol. It differs from a string, which is a sequence of characters.
“The char data type stores a single alphanumeric character or symbol.” ― CompTIA ITF+ Programming Fundamentals
Correct answer: C
Which of the following best describes information that is crucial to a large company for day-to-day operations?
- A . Monetized data
- B . Critical data
- C . Big data
- D . Correlated data
Which of the following must be configured to install a printer on a network?
- A . Physical address
- B . IP address
- C . MAC address
- D . Access point
B
Explanation:
To install and use a printer over a network, the printer must have an assigned IP address so that it can be located and communicated with by other devices on the same network.
“Network printers are assigned IP addresses so computers can locate and send print jobs to them over the network.” ― CompTIA ITF+ Networking Guide
Correct answer: B
Which of the following is used to measure the speed of a CPU?
- A . MHz
- B . MB
- C . Mbps
- D . MAC
A
Explanation:
CPU speed is measured in megahertz (MHz) or gigahertz (GHz), indicating how many million or billion cycles the processor can execute per second.
“CPU performance is commonly measured in megahertz (MHz) or gigahertz (GHz), representing the processor’s clock speed.” ― CompTIA ITF+
MB is for memory/storage size.
Mbps is for network speed.
MAC is a hardware address, not a performance metric.
Correct answer: A
A user needs to transfer a 100GB data file to a coworker, but the network is down.
Which of the following should the user most likely use instead?
- A . NAS
- B . Flash drive
- C . RAM
- D . Cloud
B
Explanation:
When the network is unavailable, portable storage like a flash drive (USB storage device) is suitable for transferring large files:
“Flash drives provide portable storage solutions capable of handling large data files.”
NAS (network-attached storage) requires a functioning network. RAM is volatile memory not used for file transfer, and cloud storage requires internet connectivity.
Reference: CompTIA ITF+ FC0-U71 Official Study Guide, Chapter 3 C Storage Devices.
Which of the following types of programming languages uses tags rather than code?
- A . Markup
- B . Assembly
- C . Query
- D . Compiled
A
Explanation:
Markup languages, such as HTML and XML, use tags (e.g., <p>, <title>, <body>) to define the structure and presentation of data. They are not programming languages in the traditional sense, as they don’t include logic or execution flow.
“Markup languages use tags to annotate and structure text. Common examples include HTML and XML.” ― CompTIA ITF+ Software Concepts
Correct answer: A
Which of the following is the number of bits in a byte of data?
- A . 2
- B . 4
- C . 8
- D . 16
C
Explanation:
A byte consists of exactly 8 bits. Bits (binary digits) are the smallest unit of data, and eight of them grouped together form one byte, which is used to represent characters and numbers in digital systems.
“A byte is made up of 8 bits and is the standard unit of data used to represent information such as characters in computing.” ― CompTIA ITF+ Fundamentals
Correct answer: C
Which of the following is an input device?
- A . Scanner
- B . Motherboard
- C . Printer
- D . Speaker
A developer creates the following code:
– If the light is red, then stop
– Else if the light is green, then go
Which of the following programming concepts is the developer using?
- A . Commenting
- B . Looping
- C . Object-oriented
- D . Branching
D
Explanation:
This structure uses branching, which allows a program to make decisions based on conditions using "if," "else if," and similar statements.
“Branching allows the flow of execution in a program to change based on decisions or conditions.” ― CompTIA ITF+ Programming Concepts
Correct answer: D
Users are discussing the birthdays and home addresses of notable public figures in a public chat room.
Which of the following security concepts is being compromised?
- A . Confidentiality
- B . Integrity
- C . Privacy
- D . Availability
C
Explanation:
Privacy involves protecting personal or sensitive information from being disclosed without consent. Sharing individuals’ birthdays and home addresses―even if they are public figures―violates the privacy principle.
“Privacy ensures that personal data is collected, used, and shared responsibly and legally. Exposing personal information in public forums can breach this principle.” ― CompTIA ITF+ Official Objectives
Correct answer: C
