CompTIA Tech+ Practice Test (FC0-U71)
Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Tech+ FC0-U71 (V6) Information
The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

- Free CompTIA Tech+ FC0-U71 (V6) Practice Test
- 20 Questions
- Unlimited
- IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsData and Database FundamentalsSecurity
You plug a brand-new USB mouse into a Windows laptop that has never used this device before. Which type of installation process will the operating system most likely perform to make the mouse immediately usable?
- Web-based configuration steps 
- Manual driver installation from a CD 
- Plug-and-play 
- IP-based installation 
Answer Description
Plug-and-play installation is correct because it refers to the capability of a computer system to automatically detect and configure a newly attached device without requiring the user to supply or install drivers manually. When you connect a plug-and-play-compatible mouse, the operating system recognizes the human-interface device class and loads a built-in driver, so the mouse is ready for use within seconds. The other options describe methods typically used for more complex or network-attached peripherals and are not common for standard mice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is plug-and-play technology?
Why do operating systems have built-in drivers for plug-and-play devices?
What happens if a device is not plug-and-play compatible?
Which feature of a web browser should be used when you want to visit websites without saving the history, cookies, or temporary files related to your activities during that session?
- Popup blockers 
- Clearing cache 
- Using extensions 
- Private browsing 
Answer Description
Private browsing is a feature available in most web browsers that allows users to browse the internet without recording the history or storing cookies and temporary files that track their activities. When a private browsing session ends, this information is typically discarded. Clearing the cache happens after browsing, extensions can add functionality but do not erase session data by default, and popup blockers simply suppress unwanted windows; none of these provide the same privacy during the session.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does private browsing work?
What are the limitations of private browsing?
How is private browsing different from clearing the cache?
A system administrator is configuring a new Windows server that must maintain data integrity during unexpected power failures. Which of the following file systems should the administrator choose to meet this requirement?
- NTFS, because of its journaling capability 
- Ext4, because it can handle large volumes of data 
- FAT32, because of its high compatibility with other operating systems 
- HFS+, because it is used by modern Apple hardware 
Answer Description
NTFS (New Technology File System) is the correct choice because its journaling feature is specifically designed to maintain data integrity and allow for rapid recovery after a system crash or power failure. It keeps a log of changes that are about to be made, ensuring the file system can be restored to a consistent state. FAT32 does not support journaling, making it unsuitable for a server where data integrity is critical. Ext4 is a journaling file system for Linux and is not natively supported by Windows. HFS+ is the file system used by Apple's macOS and is also not a suitable option for a Windows server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is journaling in a file system?
Why is NTFS preferred over Ext4 in Windows environments?
How does FAT32 differ from NTFS in terms of data reliability?
What notational system is used by computers to represent data and perform calculations?
- Binary 
- ASCII 
- Hexadecimal 
- Decimal 
Answer Description
Binary is the correct answer because computers use the binary system, which consists of just two numbers, 0 and 1, to represent data and carry out operations. In binary, each digit represents a power of 2. Decimal, while commonly used in everyday life, represents numbers in base 10 and is not directly used by computers for operations. Hexadecimal is often used to represent binary data in a more human-readable form, but it is not the primary system computers use to process data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do computers use the binary system instead of the decimal system?
What is the difference between binary and hexadecimal systems?
How does ASCII relate to binary in computing?
An IT employee is preparing a company-issued smartphone and recalls that most smartphones use a low-power CPU architecture to maximize battery life. Which CPU architecture is most common in smartphones?
- ARM 
- x86 
- 64-bit 
- Complex Instruction Set Computing (CISC) 
Answer Description
ARM architecture is optimized for low power and high efficiency, making it ideal for battery-powered devices like smartphones. Nearly all modern smartphones, whether Android or iOS, run on ARM-based system-on-chips. x86 processors dominate desktop and laptop PCs, CISC describes a broad design style rather than a specific mobile CPU family, and 64-bit refers only to data width, not the underlying instruction set used in most phones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is ARM architecture used in mobile phones?
What are the main differences between ARM and x86 architectures?
What is the role of 32-bit vs. 64-bit architecture in ARM CPUs?
Which of the following is used to interact with a relational database to retrieve, insert, update, or delete data?
- Java 
- Cascading Style Sheets (CSS) 
- Hypertext Markup Language (HTML) 
- Structured Query Language (SQL) 
Answer Description
Structured Query Language (SQL) is designed specifically to communicate with relational database management systems. It provides commands such as SELECT, INSERT, UPDATE, and DELETE that allow users to manipulate and query data. Java is a general-purpose programming language, CSS handles the presentation of web content, and HTML defines the structure of web pages; none of these languages are intended for direct database manipulation in the same way SQL is.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SQL, and how is it used in databases?
What is the difference between SQL and Java?
How does SQL differ from HTML and CSS?
You have been tasked with ensuring the secure use of mobile applications within your company. Which of the following practices should be enforced to minimize the risk of data compromise?
- Sharing app login credentials among team members is acceptable for ease of access. 
- Employees should be encouraged to download apps from any source if it meets their business needs. 
- Employees should be required to regularly update all mobile applications to the latest version. 
- It's advisable to use mobile applications over unsecured public Wi-Fi networks to save company data usage. 
Answer Description
Regularly updating mobile applications is necessary to ensure that any security vulnerabilities are patched and that the app maintains compatibility with the latest security protocols. This can prevent many types of attacks on confidentiality and integrity of the company data. Using apps from unofficial sources may introduce malware, sharing credentials can compromise security, and using unsecured Wi-Fi opens the door for potential eavesdropping or man-in-the-middle attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it necessary to regularly update mobile applications?
What are the risks of downloading apps from unofficial sources?
How can using unsecured public Wi-Fi networks compromise mobile app security?
In a non-relational database environment, when tasked with handling a data model primarily composed of complex hierarchical structures with multiple one-to-many relationships and the need for flexible schema changes, which database is the BEST fit?
- Key/value stores 
- Document databases 
- Graph databases 
- Wide-column stores 
Answer Description
The correct answer is Document databases because they are well-suited for handling hierarchical data structures due to their document-oriented nature, where each document can contain nested information that represents such one-to-many relationships. They also offer schema flexibility, allowing for easy adjustments and evolution of the data structure as requirements change. Graph databases are excellent for relationship traversal but do not inherently offer the same hierarchical document storage model. Wide-column stores can handle large amounts of data with some flexibility, but they are not optimized for deeply nested hierarchical data. Key/value stores are highly performant for simple data models but lack the necessary querying capabilities to efficiently manage complex hierarchies with frequent schema changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a document database, and why is it suited for hierarchical data?
How does schema flexibility benefit document databases compared to relational databases?
What are common use cases for document databases?
If a software application needs to count the number of times a specific button is pressed, which data type should be chosen to store this count accurately?
- int 
- string 
- float 
- char 
Answer Description
The 'int' data type should be chosen because it is specifically designed to store whole numbers and perfect for countable items such as button presses. 'float' is typically used for numbers that have a fractional part, which isn't needed here. 'char' is intended for single characters and 'string' for sequences of characters; neither is suitable for arithmetic operations typically performed on counts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is 'int' a better choice than 'float' for counting button presses?
What is the difference between a 'char' and a 'string' data type?
When should you use an 'int' instead of other numeric data types?
Maria is designing a small office network. To block unauthorized external access to internal resources, which device should she place at the network boundary to monitor and control incoming and outgoing traffic according to defined security rules?
- Firewall 
- Access point 
- Switch 
- Router 
Answer Description
A firewall is the correct answer because it is specifically designed to monitor and control incoming and outgoing network traffic based on security rules. This prevents unauthorized access to internal resources. A switch primarily connects devices within a network and manages data flows between them. A router connects multiple networks and routes traffic between them. An access point allows wireless devices to connect to a wired network, but it does not regulate traffic with security rules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a firewall and how does it work?
What are the differences between a firewall and a router?
Can a switch or an access point improve security in a network like a firewall?
A marketing analyst is compiling data from a recent survey. They want to create a report that gives meaningful insights into customer preferences for the company's products. What is this process of turning survey data into valuable information referred to as?
- Data Exfiltration 
- Data encryption 
- Data Compression 
- Data analysis 
Answer Description
The process of turning data, which are raw facts, into information involves organizing, analyzing, and interpreting that data to make it useful. The analyst is engaging in data analysis to create a report that provides insights, which can be used by the company to make informed decisions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data analysis?
How does data analysis differ from data encryption?
What tools are commonly used for data analysis?
Which of the following statements BEST describes the main purpose of data persistence within a database system?
- To ensure data remains available and unchanged over time, regardless of system state changes or reboots. 
- To allow multiple concurrent users to have temporary copies of data for offline usage. 
- To increase the speed at which data can be accessed and queried in the database. 
- To provide a variety of data types and structures for more complex querying options. 
Answer Description
Data persistence is the property that ensures information is written to non-volatile storage so it remains available and unchanged after power outages, system reboots, or crashes. Databases rely on this durability so that records are retained permanently until explicitly modified or deleted. Other characteristics-such as faster access, offline copies for users, or supporting diverse data types-may be desirable, but they are not what defines persistence.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between data persistence and data caching?
How do databases ensure data persistence during power failures?
What types of databases are typically used for ensuring data persistence?
A company wants to improve its sales performance by analyzing customer purchase patterns. Which reporting method would best help them visualize this data to make informed decisions?
- Presenting the raw sales data in a spreadsheet format 
- Using charts or graphs to represent data visually 
- Providing a written report summarizing sales figures 
- Sending out a basic email with sales numbers 
Answer Description
The correct answer is effective because visual aids such as charts and graphs allow decision-makers to quickly interpret complex data. Other options, while they might provide some data, do not communicate the trends and patterns as clearly as visual reports do. For instance, raw data or text summaries can be cumbersome, making it harder to identify actionable insights.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are charts and graphs more effective for visualizing data?
What types of charts are best for sales performance analysis?
What tools can be used to create charts and graphs for data visualization?
Which type of CPU allows a laptop to effectively utilize more than 4GB of RAM?
- 64-bit 
- ARM 
- 32-bit 
- Dual-core 
Answer Description
A 64-bit CPU can handle more than 4GB of RAM because it uses larger bit widths, memory addresses, and other associated hardware to process more data at a time and access more memory. A 32-bit CPU has a limit of 4GB addressable memory and therefore cannot effectively utilize RAM beyond this limit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does a 64-bit CPU support more than 4GB of RAM?
What is the difference between 64-bit and 32-bit in terms of performance?
What other benefits does a 64-bit CPU provide beyond increased RAM usage?
A technician is explaining to a new computer user why they cannot use characters like / or * in a filename. Which of the following statements best describes the primary purpose of these types of naming restrictions in a file system?
- To ensure file names do not exceed a specific character length 
- To allow a wider range of characters in file names for better description 
- To enforce a rule that all file names must begin with a letter 
- To prevent the use of special characters that can disrupt file system operations 
Answer Description
Naming restrictions prevent the use of special characters (such as /, , :, *, ?, ", <, >, |) that could disrupt file system operations. These characters are often reserved by the operating system for specific functions, like separating directories in a file path or acting as wildcards. While other restrictions, such as limits on filename length, also exist, the primary goal of character restrictions is to avoid errors and ambiguity when the system parses file paths. Adhering to these rules is essential for ensuring files can be saved, accessed, and shared reliably across different systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are special characters restricted in file names?
What happens if a file name exceeds the maximum length?
Why do different file systems have unique naming restrictions?
A web developer is tasked with writing a code snippet that needs to be executed directly by the browser without the need for a separate compilation step. Which category of programming languages is most suitable for this task?
- Compiled programming languages 
- Query languages 
- Interpreted programming languages 
- Assembly language 
Answer Description
Interpreted languages, such as scripting languages, are executed directly by the browser without the need for a separate compilation step. This is because the code is processed at runtime by an interpreter, which is ideal for web development tasks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are interpreted programming languages?
How does interpreted code differ from compiled code?
Why are interpreted languages preferred for web browser tasks?
Within a relational database table, which statement BEST describes the purpose of the column designated as the primary key?
- A column that is used to establish a link between two tables. 
- A tool to enhance the speed of data retrieval within the table. 
- A combination of two or more columns to guarantee a unique record identifier. 
- A column that uniquely identifies each record within the table. 
Answer Description
A primary key is a unique identifier for each record in a table, ensuring that no two rows have the same value in this column. This uniqueness is crucial for quickly locating individual records and maintaining data integrity. While a foreign key is used to link two tables together, and a composite key combines multiple columns to create a unique identifier, the primary key's main role is to provide a unique ID for each row in its own table. Indexes are used to improve search performance but are not unique identifiers for records.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a Primary Key and a Foreign Key?
Can a Primary Key contain more than one column?
Why is data integrity important when using a Primary Key?
You have been tasked with modifying the structure of an existing employee database to add a new column named 'PhoneNumber' that will store the employees' contact numbers. Which SQL command should you use to accomplish this task?
- MODIFY TABLE Employees ADD COLUMN PhoneNumber VARCHAR(10); 
- ALTER TABLE Employees ADD COLUMN PhoneNumber VARCHAR(10); 
- CREATE TABLE Employees ADD PhoneNumber VARCHAR(10); 
- UPDATE Employees SET PhoneNumber VARCHAR(10); 
Answer Description
The ALTER TABLE command is used to modify the existing structure of a database table, such as adding a new column. In this scenario, the correct command to add a new column to an existing table is ALTER TABLE Employees ADD COLUMN PhoneNumber VARCHAR(10);. The incorrect options presented involve either SQL commands for other operations or incorrect syntax.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does ALTER TABLE do in SQL?
What is VARCHAR in SQL, and why use it for PhoneNumber?
How do you verify if a column was added successfully in SQL?
Modern implanted medical devices, such as pacemakers and insulin pumps, are often classified as part of the Internet of Things (IoT). Which statement best explains this classification?
- They are sterile medical devices implanted by surgeons in a hospital environment. 
- They operate using internal batteries that eliminate the need for external power cables. 
- They are manufactured using silicon-based microelectronics similar to smartphones. 
- They include wireless interfaces that allow the device to transmit data to healthcare systems and receive remote configuration updates. 
Answer Description
Connected pacemakers and insulin pumps contain wireless radios (for example, Bluetooth Low Energy or proprietary RF) that send device and patient data to external receivers and allow clinicians to push configuration changes or firmware updates. The ability to exchange data over a network is the defining characteristic of an IoT device. The other statements describe features that do not, by themselves, justify the IoT label.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is IoT and how does it relate to medical devices?
How do wireless radios in IoT medical devices work?
Why is wireless connectivity critical for IoT medical devices?
When you use a calculator to add two numbers together, the calculator performs a function. What is this function called in the context of computing?
- Inputting 
- Outputting 
- Saving 
- Processing 
Answer Description
In computing, the execution of such a function where data is manipulated to produce a result is known as processing. This is one of the basic operations a computer performs after receiving input (the numbers you want to add) before delivering an output (the sum of those numbers).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does processing mean in computing?
What is the role of the CPU in processing?
How does processing differ from input or output in computing?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.