Podcast
Questions and Answers
A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two)
A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two)
- VGA (correct)
- RJ45
- HDMI
- USB (correct)
- Bluetooth
- FireWire
A programmer uses DML to modify:
A programmer uses DML to modify:
- data (correct)
- permissions
- les
- backups
A technician is concerned about sensitive data transmitted over the Internet being intercepted during a MITM attack. What should the technician enable to reduce the risk?
A technician is concerned about sensitive data transmitted over the Internet being intercepted during a MITM attack. What should the technician enable to reduce the risk?
- TLS (correct)
- DLP
- ACL
- IPS
Given the pseudocode provided, what is the output of the code?
Given the pseudocode provided, what is the output of the code?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?
A software developer wants to protect a document with step-by-step instructions on how to use software. What should the developer use to BEST protect the document?
A software developer wants to protect a document with step-by-step instructions on how to use software. What should the developer use to BEST protect the document?
Which of the following database concepts would MOST likely use a CSV file?
Which of the following database concepts would MOST likely use a CSV file?
A help desk technician wants to find out if a colleague has encountered the same issue before. What should the technician do FIRST?
A help desk technician wants to find out if a colleague has encountered the same issue before. What should the technician do FIRST?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following allows wireless devices to communicate to a wired network?
Which of the following allows wireless devices to communicate to a wired network?
Which of the following computing devices provides a centralized means to distribute services on a LAN?
Which of the following computing devices provides a centralized means to distribute services on a LAN?
What describes something in a database that refers to the unique identifier in the parent table?
What describes something in a database that refers to the unique identifier in the parent table?
For which of the following is a relational database management system MOST commonly used?
For which of the following is a relational database management system MOST commonly used?
Which of the following BEST describes an application running on a typical operating system?
Which of the following BEST describes an application running on a typical operating system?
What action would BEST improve the signal strength of a weak wireless access point broadcast signal?
What action would BEST improve the signal strength of a weak wireless access point broadcast signal?
A user is getting an error message when trying to access a website. What troubleshooting step is the technician using by browsing to the same site?
A user is getting an error message when trying to access a website. What troubleshooting step is the technician using by browsing to the same site?
A user is attempting to print to a wireless printer but encounters an error. What should the user do to correct the issue?
A user is attempting to print to a wireless printer but encounters an error. What should the user do to correct the issue?
What relational database construct is used to ensure valid values are entered for a column?
What relational database construct is used to ensure valid values are entered for a column?
What should be set up to ensure data on a laptop cannot be accessed by unauthorized parties, even if the laptop is stolen?
What should be set up to ensure data on a laptop cannot be accessed by unauthorized parties, even if the laptop is stolen?
Which of the following is an example of a program that directly manages hardware for storage, networking, and virtual machines?
Which of the following is an example of a program that directly manages hardware for storage, networking, and virtual machines?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record?
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
Which of the following statements BEST describes binary?
Which of the following statements BEST describes binary?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this?
An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?
An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
Which of the following is an advantage of installing an application to the cloud?
Which of the following is an advantage of installing an application to the cloud?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A UPS provides protection against:
A UPS provides protection against:
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Which of the following BEST describes a kilobyte?
Which of the following BEST describes a kilobyte?
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?
Ann, the president of a company, needs Internet connectivity for her home in a remote location with no existing infrastructure. Which Internet service type should she MOST likely use?
Ann, the president of a company, needs Internet connectivity for her home in a remote location with no existing infrastructure. Which Internet service type should she MOST likely use?
Which of the following is MOST likely used to represent international text data?
Which of the following is MOST likely used to represent international text data?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Which of the following operating systems do not require extensions on files to execute a program? (Choose two)
Which of the following operating systems do not require extensions on files to execute a program? (Choose two)
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
Which of the following language types would a web developer MOST likely use to create a website?
Which of the following language types would a web developer MOST likely use to create a website?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A startup company has created a logo and wants to ensure no other entity can use it. Which of the following should the company use to BEST protect the logo? (Choose two)
A startup company has created a logo and wants to ensure no other entity can use it. Which of the following should the company use to BEST protect the logo? (Choose two)
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
In which of the following situations should there be some expectation of privacy?
In which of the following situations should there be some expectation of privacy?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following is the closest to machine language?
Which of the following is the closest to machine language?
A function is BEST used for enabling programs to:
A function is BEST used for enabling programs to:
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe
. What does the x86
part likely indicate?
A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe
. What does the x86
part likely indicate?
Which of the following are the basic computing operations?
Which of the following are the basic computing operations?
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following would work BEST stored as a flat file rather than stored in a database?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
An employee uses spreadsheet software and connects to a remote database to pull data for a report. Which type of application architecture did the employee use?
An employee uses spreadsheet software and connects to a remote database to pull data for a report. Which type of application architecture did the employee use?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function after a power interruption. What is the MOST likely problem?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function after a power interruption. What is the MOST likely problem?
A programmer needs to store output in a place that can be accessed quickly. The data does not need to remain persistent. What is the BEST option for storing the data?
A programmer needs to store output in a place that can be accessed quickly. The data does not need to remain persistent. What is the BEST option for storing the data?
Which intellectual property concept BEST represents a legally protected slogan of a business?
Which intellectual property concept BEST represents a legally protected slogan of a business?
What is a wireless communication that requires devices to be within 6 inches of each other to transfer information?
What is a wireless communication that requires devices to be within 6 inches of each other to transfer information?
The IT department has established a new password policy. Which practices are being employed? (Choose two.)
The IT department has established a new password policy. Which practices are being employed? (Choose two.)
Which method would MOST likely prevent malware sent via email from infecting a computer?
Which method would MOST likely prevent malware sent via email from infecting a computer?
A user wants to use a laptop outside the house and remain connected to the Internet. What would be the BEST choice to accomplish this task?
A user wants to use a laptop outside the house and remain connected to the Internet. What would be the BEST choice to accomplish this task?
If Joe's password for a social media site is compromised, what is Joe MOST likely performing when believing his email and banking accounts may also be compromised?
If Joe's password for a social media site is compromised, what is Joe MOST likely performing when believing his email and banking accounts may also be compromised?
A technician is securing a new wireless network. What protocol would be the MOST secure to prevent unauthorized access?
A technician is securing a new wireless network. What protocol would be the MOST secure to prevent unauthorized access?
Which network protocols would MOST likely be used when sending and receiving Internet email? (Choose two.)
Which network protocols would MOST likely be used when sending and receiving Internet email? (Choose two.)
A database administrator finds that a table is not needed in a relational database. What command is used to completely remove the table and its data?
A database administrator finds that a table is not needed in a relational database. What command is used to completely remove the table and its data?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
The computer language that is closest to machine code is:
The computer language that is closest to machine code is:
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
Which of the following is an example of an interpreted language?
Which of the following is an example of an interpreted language?
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
Which of the following filesystems would a Linux computer MOST likely use?
Which of the following filesystems would a Linux computer MOST likely use?
Which of the following concerns does installing cross-platform software address?
Which of the following concerns does installing cross-platform software address?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following BEST explains the use of float over integer to store monetary values?
Which of the following BEST explains the use of float over integer to store monetary values?
An IP address is 32 bits long. If converted to bytes, it would be:
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following BEST describes the purpose of a vector in programming?
Which of the following BEST describes the purpose of a vector in programming?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Which of the following statements BEST represents what 'x86.exe' means in the installation process?
Which of the following statements BEST represents what 'x86.exe' means in the installation process?
Which of the following would be used to send messages using the SMTP protocol?
Which of the following would be used to send messages using the SMTP protocol?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A global variable called 'age' will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A global variable called 'age' will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following should have the HIGHEST expectation of privacy?
Which of the following should have the HIGHEST expectation of privacy?
A company wants its employees to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
A company wants its employees to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
Which of the following storage devices have a spinning disk? (Choose two)
Which of the following storage devices have a spinning disk? (Choose two)
Which of the following computer components allows for communication over a computer network?
Which of the following computer components allows for communication over a computer network?
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
Which of the following would a company consider an asset?
Which of the following would a company consider an asset?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Given the input (userin) of analyst
, to which of the following would the clearance variable be set?
Given the input (userin) of analyst
, to which of the following would the clearance variable be set?
Which of the following is a reason why complex passwords are required?
Which of the following is a reason why complex passwords are required?
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
Which of the following storage types is MOST vulnerable to magnetic damage?
Which of the following storage types is MOST vulnerable to magnetic damage?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Which of the following are the primary functions of an operating system? (Choose two.)
Which of the following are the primary functions of an operating system? (Choose two.)
SQL databases use primary and foreign keys to enable which of the following?
SQL databases use primary and foreign keys to enable which of the following?
Which of the following is a logical structure for storing files?
Which of the following is a logical structure for storing files?
Which of the following is both an input and output device?
Which of the following is both an input and output device?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following contains exactly four copper wires?
Which of the following contains exactly four copper wires?
Flashcards are hidden until you start studying
Study Notes
Computer Systems and Security
- Confidentiality is primarily a concern of eavesdropping.
- A software developer can use a copyright to protect a document with step-by-step instructions on how to use the software.
- A CSV file is most likely used for data importing.
Help Desk and Troubleshooting
- When encountering an issue, a help desk technician should first check the Knowledge Base.
- A technician can use duplication to troubleshoot an issue by browsing to the same site as the user to see if the issue can be replicated.
Networking and Communication
- A wireless access point allows wireless devices to communicate with a wired network.
- An access point can improve the signal strength by removing sources of EMI.
- A server provides a centralized means of distributing services to a group of clients on a LAN.
Database Systems
- A relational database management system is commonly used for storing information.
- A foreign key in a database refers to the unique identifier in the parent table.
- Constraints are used in relational databases to ensure valid values are entered for a column.
Operating Systems and Programming
- An application running on a typical operating system is described as a process.
- Java is a compiled language.
- A variable is used to store a number that changes over the duration of a program's run.
Security and Data Protection
- Encryption should be set up to ensure data cannot be accessed by anyone, even if the laptop is stolen.
- Non-repudiation is an example of a regulation requiring new applicants to provide a scan of their retinas.
Cloud Computing
- An advantage of installing an application to the cloud is that data is not stored locally.
IT and Computing Concepts
- A UPS provides protection against power outages.
- If-else statements are used in programming to choose between different options based on an input.### Troubleshooting
- When troubleshooting a problem, after confirming a theory, the next step is to implement the solution.
- A technician should document lessons learned after implementing a solution.
Programming and Coding
- The pseudocode "If the Breakfast program ran on Sunday" would output "Waffles".
- A kilobyte is a measurement of storage (e.g., 100KB).
- Open source software allows developers to modify the original code and release their own version of the application.
- The basic computing operations are Input, Process, Output, and Storage.
Security
- A replay attack is a threat to confidentiality.
- Implementing a password policy that includes password complexity, password history, and password expiration can improve security.
- Patching can prevent malware sent as compromised files via email from infecting a person's computer.
- WPA2 is the most secure protocol for wireless networks.
Networking
- WLAN (Wireless Local Area Network) is the best choice for connecting to the Internet while outdoors.
- SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol version 3) are protocols used for sending and receiving internet email.
- Satellite Internet is the most suitable option for remote locations with no existing infrastructure.
Hardware and Software
- A USB cable is needed to connect a printer to a workstation.
- A driver is required for a workstation to recognize a printer.
- DVI (Digital Visual Interface) is used to connect a display to a workstation.
- Unicode is used to represent international text data.
Database and Storage
- A flat file is the best option for storing output that does not need to remain persistent.
- A relational database is suitable for storing data that needs to be accessed quickly.
- The command "DROP" is used to completely remove a table and its data from a relational database.
IT and Ethics
- A technician granting permission for a user to access data in a database is an example of data definition.
- Client-server architecture is used when a user connects to a remote database to pull data for a report.
- Password reuse can compromise email and banking accounts if a password is compromised.### Computer Systems and Programming
- A developer creates step-by-step instructions/procedures and conditional statements for a computer program to solve problems, which is known as developing an algorithm.
- A company can protect its logo by registering it as a trademark to prevent others from using it for any purpose.
Data and Security
- Full disk encryption is the best way to keep data on a laptop safe if the laptop is lost or stolen.
- A string data type is best used when creating a variable to hold a postal code.
- Assembly language is closest to machine language.
Networking and Internet
- A valid IP address is 172.16.2.189.
- A database is the best place to store data that needs to be analyzed, such as sales, inventory, marketing, and compensation data.
- SMTP protocol is used to send messages using email software.
- Configuring prompting before downloading content can help prevent malware infections caused by Internet browsing.
Information and Data Management
- A company should handle customer data of birth in a sensitive manner.
- Database software is the best application to use when multiple people need to edit a list at the same time.
Hardware and Software
- A workstation is the best device for a game developer who needs high-end specifications that can be upgraded.
- x86.exe installation file is specific to 32-bit CPU architecture.
- Email software is used to send messages using the SMTP protocol.
Security and Privacy
- Trademark is used to protect a company's logo from being used by others.
- Encrypting data is the best method of securely distributing medical records.
- A user has a high expectation of privacy when storing a locally stored word processing document.
- Role-based access control is used to assign permissions and authorize a user based on job title or function.
- A concurrent license allows a certain number of users to use the software at any point in time.
Computer Components and Peripherals
- A NIC (Network Interface Card) is a computer component that allows for communication over a computer network.
- A satellite connection is the best option for Internet service in a remote location.
- A GPU (Graphics Processing Unit) performs processing on a graphics card.
Software and Licensing
- A concurrent license allows a certain number of users to use the software at any point in time.
- A company can assign permissions and authorize a user based on job title or function using role-based access control.
Data Storage and Management
- A corrupted cache is the most likely cause of a website displaying outdated information.
- IMPORT is the action used to populate a database with large amounts of data from an external source.
Business and Ethics
- A company should handle customer data of birth in a sensitive manner.
- A written policy is the best way to document a change in a company's policy, such as allowing staff to work from home.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.