00:20:00

CompTIA Tech+ Practice Test (FC0-U71)

Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Tech+ FC0-U71 (V6)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Tech+ FC0-U71 (V6) Information

The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

CompTIA Tech+ FC0-U71 (V6) Logo
  • Free CompTIA Tech+ FC0-U71 (V6) Practice Test

  • 20 Questions
  • Unlimited
  • IT Concepts and Terminology
    Infrastructure
    Applications and Software
    Software Development Concepts
    Data and Database Fundamentals
    Security
Question 1 of 20

You plug a brand-new USB mouse into a Windows laptop that has never used this device before. Which type of installation process will the operating system most likely perform to make the mouse immediately usable?

  • Web-based configuration steps

  • Manual driver installation from a CD

  • Plug-and-play

  • IP-based installation

Question 2 of 20

Which feature of a web browser should be used when you want to visit websites without saving the history, cookies, or temporary files related to your activities during that session?

  • Popup blockers

  • Clearing cache

  • Using extensions

  • Private browsing

Question 3 of 20

A system administrator is configuring a new Windows server that must maintain data integrity during unexpected power failures. Which of the following file systems should the administrator choose to meet this requirement?

  • NTFS, because of its journaling capability

  • Ext4, because it can handle large volumes of data

  • FAT32, because of its high compatibility with other operating systems

  • HFS+, because it is used by modern Apple hardware

Question 4 of 20

What notational system is used by computers to represent data and perform calculations?

  • Binary

  • ASCII

  • Hexadecimal

  • Decimal

Question 5 of 20

An IT employee is preparing a company-issued smartphone and recalls that most smartphones use a low-power CPU architecture to maximize battery life. Which CPU architecture is most common in smartphones?

  • ARM

  • x86

  • 64-bit

  • Complex Instruction Set Computing (CISC)

Question 6 of 20

Which of the following is used to interact with a relational database to retrieve, insert, update, or delete data?

  • Java

  • Cascading Style Sheets (CSS)

  • Hypertext Markup Language (HTML)

  • Structured Query Language (SQL)

Question 7 of 20

You have been tasked with ensuring the secure use of mobile applications within your company. Which of the following practices should be enforced to minimize the risk of data compromise?

  • Sharing app login credentials among team members is acceptable for ease of access.

  • Employees should be encouraged to download apps from any source if it meets their business needs.

  • Employees should be required to regularly update all mobile applications to the latest version.

  • It's advisable to use mobile applications over unsecured public Wi-Fi networks to save company data usage.

Question 8 of 20

In a non-relational database environment, when tasked with handling a data model primarily composed of complex hierarchical structures with multiple one-to-many relationships and the need for flexible schema changes, which database is the BEST fit?

  • Key/value stores

  • Document databases

  • Graph databases

  • Wide-column stores

Question 9 of 20

If a software application needs to count the number of times a specific button is pressed, which data type should be chosen to store this count accurately?

  • int

  • string

  • float

  • char

Question 10 of 20

Maria is designing a small office network. To block unauthorized external access to internal resources, which device should she place at the network boundary to monitor and control incoming and outgoing traffic according to defined security rules?

  • Firewall

  • Access point

  • Switch

  • Router

Question 11 of 20

A marketing analyst is compiling data from a recent survey. They want to create a report that gives meaningful insights into customer preferences for the company's products. What is this process of turning survey data into valuable information referred to as?

  • Data Exfiltration

  • Data encryption

  • Data Compression

  • Data analysis

Question 12 of 20

Which of the following statements BEST describes the main purpose of data persistence within a database system?

  • To ensure data remains available and unchanged over time, regardless of system state changes or reboots.

  • To allow multiple concurrent users to have temporary copies of data for offline usage.

  • To increase the speed at which data can be accessed and queried in the database.

  • To provide a variety of data types and structures for more complex querying options.

Question 13 of 20

A company wants to improve its sales performance by analyzing customer purchase patterns. Which reporting method would best help them visualize this data to make informed decisions?

  • Presenting the raw sales data in a spreadsheet format

  • Using charts or graphs to represent data visually

  • Providing a written report summarizing sales figures

  • Sending out a basic email with sales numbers

Question 14 of 20

Which type of CPU allows a laptop to effectively utilize more than 4GB of RAM?

  • 64-bit

  • ARM

  • 32-bit

  • Dual-core

Question 15 of 20

A technician is explaining to a new computer user why they cannot use characters like / or * in a filename. Which of the following statements best describes the primary purpose of these types of naming restrictions in a file system?

  • To ensure file names do not exceed a specific character length

  • To allow a wider range of characters in file names for better description

  • To enforce a rule that all file names must begin with a letter

  • To prevent the use of special characters that can disrupt file system operations

Question 16 of 20

A web developer is tasked with writing a code snippet that needs to be executed directly by the browser without the need for a separate compilation step. Which category of programming languages is most suitable for this task?

  • Compiled programming languages

  • Query languages

  • Interpreted programming languages

  • Assembly language

Question 17 of 20

Within a relational database table, which statement BEST describes the purpose of the column designated as the primary key?

  • A column that is used to establish a link between two tables.

  • A tool to enhance the speed of data retrieval within the table.

  • A combination of two or more columns to guarantee a unique record identifier.

  • A column that uniquely identifies each record within the table.

Question 18 of 20

You have been tasked with modifying the structure of an existing employee database to add a new column named 'PhoneNumber' that will store the employees' contact numbers. Which SQL command should you use to accomplish this task?

  • MODIFY TABLE Employees ADD COLUMN PhoneNumber VARCHAR(10);

  • ALTER TABLE Employees ADD COLUMN PhoneNumber VARCHAR(10);

  • CREATE TABLE Employees ADD PhoneNumber VARCHAR(10);

  • UPDATE Employees SET PhoneNumber VARCHAR(10);

Question 19 of 20

Modern implanted medical devices, such as pacemakers and insulin pumps, are often classified as part of the Internet of Things (IoT). Which statement best explains this classification?

  • They are sterile medical devices implanted by surgeons in a hospital environment.

  • They operate using internal batteries that eliminate the need for external power cables.

  • They are manufactured using silicon-based microelectronics similar to smartphones.

  • They include wireless interfaces that allow the device to transmit data to healthcare systems and receive remote configuration updates.

Question 20 of 20

When you use a calculator to add two numbers together, the calculator performs a function. What is this function called in the context of computing?

  • Inputting

  • Outputting

  • Saving

  • Processing