Curious about Actual CompTIA IT Fundamentals+ (FC0-U61) Exam Questions?

Here are sample CompTIA IT Fundamentals+ Certification (FC0-U61) Exam questions from real exam. You can get more CompTIA IT Fundamentals+ (FC0-U61) Exam premium practice questions at TestInsights.

Page: 1 /
Total 358 questions
Question 1

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?


Correct : C

In object-oriented programming (OOP), a method is a function associated with an object and is used to perform operations on that object. When a programmer creates an object to retrieve customer names from a database, the operation that retrieves the names is typically encapsulated in a method. This method might be called something like getCustomerNames() and is responsible for querying the database and returning the results. Reference: Basic concepts of OOP, including objects and methods, are foundational topics in programming and are discussed in CompTIA IT Fundamentals and other programming guides.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

A technician is upgrading a company's Wi-Fi from 802.11a to support a range of 115ft (35m) indoors and a speed of 700Mbps. Which of the following should the technician select for the upgrade?


Correct : A

The 802.11ac standard supports higher data rates, improved capacity, and better performance in dense environments. It offers significant improvements over previous standards like 802.11a, 802.11b, 802.11g, and 802.11n, with support for speeds up to several gigabits per second under optimal conditions. For a range of 115ft indoors and a speed of 700Mbps, 802.11ac is the most suitable choice due to its enhanced capabilities to handle higher speeds and greater ranges than its predecessors. Reference: Details about various Wi-Fi standards including their range and speed capabilities are covered in IT certifications such as CompTIA Network+ and are essential knowledge for IT professionals.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Which of the following is an example of PI I? (Select two).


Correct : A, B

Personally Identifiable Information (PII) refers to data that can be used to identify, contact, or locate a single person, or to identify an individual in context. A full name and date of birth are classic examples of PII because they can directly identify a person. Other options listed may relate to a person's life but do not specifically and directly identify an individual in most contexts. Reference: The definition and examples of PII are part of data privacy topics covered under the CompTIA IT Fundamentals, which discusses security measures and identification data types.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?


Correct : A

To free up space on an HDD without deleting files, using the operating system's compression feature is the best approach. Compression reduces the size of files on the disk by using algorithms to minimize the space they take up, thus freeing up storage capacity while keeping the files accessible. Reference: File system management, including the use of compression to optimize storage, is a topic discussed in the CompTIA IT Fundamentals, which also covers system utilities and management practices.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Which of the following storage types presents the most likely security risk?


Correct : D

Cloud storage presents the most likely security risk among the options provided. While all storage types have their own security concerns, cloud storage is often seen as more risky because it involves storing data on servers managed by third parties. This means that the data is out of the direct control of the user, and security is largely dependent on the measures put in place by the cloud service provider.Additionally, data in the cloud can be accessed from anywhere with an internet connection, increasing the potential attack surface


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 72   
Total 358 questions