CompTIA Tech+ Practice Test (FC0-U71)
Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Tech+ FC0-U71 (V6) Information
The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

Free CompTIA Tech+ FC0-U71 (V6) Practice Test
- 20 Questions
- Unlimited
- IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsData and Database FundamentalsSecurity
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Before you physically attach a brand-new USB printer to your Windows laptop, what should be your first action?
Determine whether Windows can install the printer automatically through Plug-and-Play.
Download and install the manufacturer's full driver package before connecting the printer.
Run a test print from a simple application to verify basic functionality.
Connect the USB cable and power on the printer so the laptop detects the device.
Answer Description
You should first confirm whether the operating system will recognize and install the printer automatically by using Plug-and-Play. If Windows can supply an in-box or Windows Update driver, no manual driver installation is required. If the printer is not Plug-and-Play compatible, you would instead obtain and install the correct driver package before making the connection. Simply connecting the cable, adding the printer manually, or printing a test page are later steps that assume driver availability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Plug-and-Play in Windows?
What happens if a printer is not Plug-and-Play compatible?
What types of printer drivers does Windows provide through Plug-and-Play?
A team is evaluating different data storage options for a project that will require holding a significant amount of information. Which unit of measure would be most appropriate for assessing larger data volume requirements?
Kilobytes (KB)
Gigabytes (GB)
Megabytes (MB)
Terabytes (TB)
Answer Description
The correct answer highlights terabytes (TB) as a suitable unit for larger datasets, such as those typically encountered in substantial projects. While gigabytes (GB) are also a measure of data, terabytes are used to describe much larger volumes, making them more applicable in this scenario. Choosing megabytes (MB) would be insufficient due to the relatively small size they represent, while kilobytes (KB) are far too small for substantial data needs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the relationship between terabytes (TB) and gigabytes (GB)?
Why are kilobytes (KB) and megabytes (MB) insufficient for large-scale projects?
What types of scenarios or projects typically use terabytes (TB) as a measure of data storage?
Which feature of a web browser should be used when you want to visit websites without saving the history, cookies, or temporary files related to your activities during that session?
Clearing cache
Popup blockers
Using extensions
Private browsing
Answer Description
Private browsing is a feature available in most web browsers that allows users to browse the internet without recording the history or storing cookies and temporary files that track their activities. When a private browsing session ends, this information is typically discarded. Clearing the cache happens after browsing, extensions can add functionality but do not erase session data by default, and popup blockers simply suppress unwanted windows; none of these provide the same privacy during the session.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does private browsing work?
What are the limitations of private browsing?
How is private browsing different from clearing the cache?
Which file system characteristic helps protect data integrity by recording intended changes in a dedicated log so the system can be quickly restored after a crash or power failure?
Disk mirroring
Compression
Journaling
File system fragmentation
Answer Description
Journaling file systems write the details or "intent" of each change to a special log (the journal) before committing the change to the main file system structures. If the system loses power or crashes mid-operation, the OS replays or rolls back the journal on reboot, bringing the file system back to a consistent state and greatly reducing the chance of corruption. Compression, fragmentation, and disk mirroring do not provide this transaction-style recovery capability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a journaling file system?
How does journaling help improve data recovery after a system crash?
How does journaling differ from disk mirroring?
Which feature of a database is essential for handling a growing number of users without performance degradation?
Multiple query options
Fixed data types
Scalability
Single user access
Answer Description
Scalability is the feature that allows a database to accommodate an increasing load of data or users. A scalable database can handle growth smoothly, maintaining performance and avoiding bottleneck issues. Flat file systems, which do not usually support multiple concurrent users or significant amounts of data, tend to lack scalability. Query options, while important for interacting with the database, do not directly relate to how well the database performs under larger loads.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is scalability in computing?
What is the difference between vertical scaling and horizontal scaling?
How do flat file systems differ from databases in terms of scalability?
Within basic program flow charts, a 'sequence' construct ensures that statements run one after another without any branching or looping. What does this term specifically describe?
The repetition of a set of instructions a certain number of times.
A decision point in a program that can lead to different instructions being executed.
The order in which instructions are executed in a program.
A collection of data items all of the same type.
Answer Description
Sequence describes the linear, top-to-bottom execution of instructions. Because a computer follows commands exactly in the order provided, changing that order can alter or break program behaviour. Recognising this construct is essential before adding control structures such as selection (branching) or iteration (looping).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are sequencing constructs in programming?
How is sequence different from branching?
Why is understanding sequence important before learning other control structures?
A technician is diagnosing a piece of hardware and finds a configuration value stored in a memory register. The value is represented as the hexadecimal number '2C'. What is the decimal equivalent of this value?
42
32
212
44
Answer Description
To convert the hexadecimal (base-16) number '2C' to decimal (base-10), each digit is multiplied by a power of 16. The rightmost digit ('C') is in the 160 position, and the next digit to the left ('2') is in the 161 position. The hexadecimal digit 'C' is equivalent to the decimal number 12. The calculation is (2 * 161) + (12 * 160), which equals (2 * 16) + (12 * 1), or 32 + 12 = 44.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an Integer more efficient than a Float for storing the number of clicks?
What happens if Alice accidentally uses a String to store the number of clicks?
Could a Boolean work if the count is limited to just two values?
A small law firm requires a solution that permits its staff to access and save client files from any workstation in the office. As a very small business they do not have any centralized servers or a data center. Which device best fits this requirement?
A modem with file sharing capabilities
A Network Attached Storage (NAS) device
A centralized storage management software on the main office workstation
A USB storage device shared through one user's workstation
Answer Description
A Network Attached Storage (NAS) device is specifically designed to connect to a network to provide access to files across multiple users simultaneously without the need for a direct connection to a central computing resource like a workstation or dedicated server. A flash drive is for single-user, local storage; a file server would necessitate a dedicated system; and a modem is a device that facilitates internet connections without providing file storage services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Network Attached Storage (NAS) device?
How is a NAS different from a USB storage device?
Can a NAS replace a dedicated server?
While copying a single 5 GB video file, a technician needs to ensure the USB flash drive has enough free space. Using the binary convention where 1 GB equals 1024 MB, approximately how many megabytes (MB) of space are required to store the file?
5120 MB
1024 MB
4096 MB
5000 MB
Answer Description
Under the binary convention, 1 GB = 1024 MB. 5 GB Ă— 1024 MB/GB = 5120 MB. Therefore, about 5120 MB of free space is needed. 5000 MB reflects a decimal conversion, 4096 MB equals only 4 GB, and 1024 MB equals 1 GB.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How is a digital product defined?
What differentiates a digital product from downloadable content?
Why isn’t the platform considered custom manufactured goods?
A technician is upgrading the storage system for a company's database server that requires a minimum of 1200 gigabytes of space. The company decided to purchase a new hard drive. Which of the following should the technician recommend?
1 TB hard drive
200 GB hard drive
500 GB hard drive
2 TB hard drive
Answer Description
Manufacturers use the decimal system, where 1 terabyte (TB) equals 1000 gigabytes (GB). A 1 TB drive therefore provides only about 1 000 GB, which is less than the 1200 GB minimum. A 2 TB drive supplies roughly 2 000 GB, meeting the requirement and leaving headroom for future growth. Drives of 500 GB or 200 GB fall far short of the needed capacity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does a 1 TB drive only provide roughly 1,000 GB of space?
Why might it be important to leave headroom when choosing storage capacity?
What other factors, besides storage size, should be considered when choosing a new hard drive?
What number does the binary representation '1010' correspond to in decimal?
5
8
12
10
Answer Description
The binary number '1010' represents the decimal number 10. Each position in a binary number corresponds to a power of 2, starting from the rightmost digit. So, in '1010', the leftmost '1' represents 23 (8), and the second digit '0' represents 22 (0), the third '1' represents 21 (2), and the last '0' represents 20 (0). Adding these together (8 + 0 + 2 + 0) gives us 10. The other options either represent different binary values or do not correspond correctly to '1010'.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do you convert a binary number to a decimal number?
What do the positions of binary digits represent?
Why is binary used in computers?
A small architecture firm requires a CAD software that will be used by various employees at different times, but never by more than one employee simultaneously. They are looking to minimize cost without violating any licensing agreements. Which licensing model should they consider?
Subscription license
Single use license
Concurrent license
Group use/site license
Answer Description
A concurrent license is ideal for the firm's situation because it allows a set number of copies of the software to be in use at the same time. Since the firm's employees will not be using the software simultaneously, this model provides a cost-effective solution that adheres to legal agreements. A single use license would not work for multiple users, even if used at different times. A group use/site license could be more expensive as it allows for more simultaneous usage than the firm requires. A subscription license might introduce unnecessary recurring fees.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a concurrent license in software licensing?
How does a concurrent license differ from a site license?
Why is a single use license not suitable for multiple users?
A technician receives a task to convert the hexadecimal number '1F' to its equivalent in binary. Given that each hexadecimal digit represents four binary digits, which binary number is the correct representation?
10011111
10111111
00011111
00111111
Answer Description
Hexadecimal digits can be directly converted to binary four-digit groupings. '1' in hexadecimal converts to '0001' in binary, and 'F' converts to '1111'. When combined, the binary representation of the hexadecimal '1F' is '00011111'.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is hexadecimal and how is it different from binary?
Why does each hexadecimal digit represent four binary digits?
How do you manually convert hexadecimal to binary?
Alice is working on a website that calculates the total cost of products selected by a user. She notices that she is repeatedly writing the same code to calculate the sum of prices. To make her code more efficient, she decides to group this repeated code in one place so that she can call it whenever she needs to perform the calculation. What is the programming concept Alice is utilizing to improve her code?
Variables
Functions
Arrays
Objects
Answer Description
Alice is using the concept of functions. Functions allow a programmer to create a reusable set of instructions. Instead of writing the same code over and over, a function can be defined once and called multiple times whenever the operation is needed. This enhances code readability and maintainability. The other options provided do not directly refer to grouping code for reusability; 'variables' store data values, 'arrays' hold multiple values in a single variable, and 'objects' encapsulate data and behavior but are not specifically for grouping and reusing a set of instructions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are functions in programming?
How do functions differ from objects in programming?
What are the benefits of using functions in programming?
In a relational database designed for a healthcare clinic, there are two tables: "Patients" and "Appointments." The "Patients" table has a "PatientID" field that uniquely identifies each patient. How should this field be properly used in the "Appointments" table to maintain a relationship between the two tables?
Copy all patient information into the "Appointments" table for each appointment
Include "PatientID" as a foreign key in the "Appointments" table
Generate a random unique identifier for each appointment separately from "PatientID"
Create a new "AppointmentID" field in the "Patients" table
Answer Description
In a relational database, a primary key uniquely identifies each record in its own table. To relate those records to another table, that primary key is stored in the other table as a foreign key. Adding the "PatientID" field to the "Appointments" table as a foreign key enforces referential integrity, ensuring that every appointment is linked to an existing patient. The other choices either duplicate data, add unnecessary fields, or fail to create this required link.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a primary key and a foreign key in a database?
What is referential integrity in databases?
Why is data duplication not recommended in relational databases?
Which of the following is the BEST method to restrict access to certain files on a computer to authorized users only?
Applying full disk encryption
Setting file permissions for user access
Adjusting firewall rules
Implementing biometric authentication
Answer Description
Setting proper file permissions is the best method to ensure that only authorized users have access to certain files. Permissions can be adjusted to grant specific rights, such as read, write, and execute, to specific users or groups of users, thereby effectively controlling who can access the files. Biometric authentication is more related to accessing the device itself rather than individual files. Firewall rules protect against external threats and manage network traffic but do not control access to files on a computer. Full disk encryption is essential for protecting the data if the device is stolen or lost, but it does not specifically restrict file access while the operating system is running.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do file permissions work in an operating system?
What are the types of file permissions?
How are file permissions different from full disk encryption?
When downloading software for your computer, what is a best practice to ensure the software is legitimate?
Download the software from a file-sharing service.
Download the software from the official vendor's website.
Download the software from a pop-up advertisement that appears while browsing.
Download the software from a link in your email.
Answer Description
Checking that the software is being downloaded from the official vendor's website is correct because official websites are the most reliable source for genuine, malware-free software. This practice reduces the risk of downloading malicious or counterfeit applications that can compromise a system's security. Distractors like pop-up advertisements, email links, and file-sharing services are common channels for distributing malware. These are untrusted sources that can lead to security breaches and should be avoided.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some risks of downloading software from untrusted sources?
How can you verify that a website is the official vendor's site before downloading software?
What tools or techniques can ensure software is safe after downloading it?
What should you do to protect your personal information when using social networking platforms?
Avoid using password or authentication features to simplify access.
Share your profile with everyone to gain more followers.
Post personal details as it increases online engagement.
Make your profile private and limit post sharing to friends or trusted contacts.
Answer Description
Making your profile private and limiting post sharing to friends or trusted contacts helps maintain your privacy and reduces the risk of your information being misused. The other practices provided can compromise your security by exposing more of your information than intended.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to make your social media profile private?
What are some examples of personal information you should avoid sharing publicly on social media?
How do multi-factor authentication (MFA) enhance security on social media platforms?
In object-oriented programming and general software development, what primary role does a method serve when the program calls it?
They provide the main structure and definition for objects in object-oriented programming.
They are used to store pieces of data for an object in object-oriented programming.
They define a set of instructions that perform a specific task when called upon in a program.
They are commands used to manipulate the user interface of an application.
Answer Description
A method groups together one or more instructions that carry out a defined task. When the program calls the method, those instructions execute, allowing code to be organized into reusable, logical units. A class, by contrast, provides the blueprint for objects, and a property stores data for an object. Methods therefore supply behavior, not structure or stored data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a method and a function in programming?
How do methods contribute to code reusability?
What is the relationship between methods and classes in object-oriented programming?
Which of the following best describes the primary function of word processing software?
Conducting video calls
Creating and editing documents
Managing and storing data in tables
Sending and receiving emails
Answer Description
The correct answer is 'Creating and editing documents.' This is the primary function because word processing software is designed to allow users to enter, modify, format, and output text, often with additional features like spell check and text formatting options. Other choices given might relate to functions available in different types of software. For instance, managing databases is a function associated with database software, not word processing software, and while functions like email or video calls can be performed on the same device, they are not the purpose of word processing software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of word processing software?
How is word processing software different from spreadsheet software?
Can you use word processing software for other tasks, like creating graphics or presentations?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.