Domain 1: Concepts and Terminlogy

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is the correct binary representation of the number 22? 11000 10101 10111 10110

10110

What is the first step of the data analytics process? Creating a data report Using statistical tools to analyze data Generating information Collecting raw data

Collecting raw data

The basic (and smallest) unit of computer information is the bit (binary digit). Memory and file sizes are commonly measured in multiples of bits. What is the first multiple of a bit called? Decimal Kilobyte Kbps Byte

byte

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process? Input Output Storage Processing

processing

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store? 4 gigabytes 8 megabytes 3 terabytes 1,024 kilobytes

3 terabytes

Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem? Check for obvious or common issues. Test your theories to verify the cause of the problem. Divide and conquer to find a possible cause. Check with others to see if they can duplicate the problem.

Check for obvious or common issues.

Which of the following BEST describes computer data processing? A graphic image is displayed on a screen. Data is saved to a hard disk. A document is scanned by a user. Data in memory is converted to information.

Data in memory is converted to information.

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first? Replace the motherboard Calibrate the battery Replace the video card Plug in an external monitor

Plug in an external monitor

You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue? Uninstall the last application or system update that was installed. Search for the error in Microsoft's knowledgebase. Check the voltage levels on the DC side of the power supply. Update the BIOS. Remove all memory modules and replace them one at a time until the error reappears.

Search for the error in Microsoft's knowledgebase.

Firewalls, data encryption, backups, and passwords are designed to protect computing devices. These technologies are all examples of what? Secure transactions File compression Security controls Data protection

Security controls

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use? Trademark Copyright Intellectual property Patent

Trademark

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first? (Select two.) Replace the sound card with a known-good spare. Verify that the volume isn't muted. Verify that speakers are plugged into the correct jack and are powered on. Download and install the latest sound card drivers. Verify that no IRQ or I/O port address conflicts exist between the card and other devices in the system.

Verify that the volume isn't muted. Verify that speakers are plugged into the correct jack and are powered on.

Which of the following are security controls you can use to help protect the data on your network? (Select three.) Fault tolerance Natural language processing Transaction processing Access controls Backups Analytics Reporting

Backups Access controls Fault tolerance

Which of the following is available in Windows to provide usage restrictions for data files? Settings App NTFS Permissions Windows Registry Disk Management

NTFS Permissions

Which of the following transfer rates is the FASTEST? 181 Mbps 1,282 Kbps 1.24 Gbps 1,480 Mbps

1,480 Mbps 1,480 Mbps is equal to 1.48 Gbps, and so it is the fastest transfer rate listed because it is greater than 1.24 Gbps. In summary, 1,480 Mbps > 1.24 Gbps > 181 Mbps > 1,282 Kbps.

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals? Bar chart Pie chart Excel table Line graph

line graph

Mark wants to include a string in his computer program that lets users know they have selected the correct option. He wants to include the option in double quotes. However, the entire string also needs to be delimited by double quotes. Which of the following is the string Mark should use to include the option in double quotes? "Congratulations! \"Launch Audit\" is the correct option." "\Congratulations! "Launch Audit" is the correct option.\" "\Congratulations! "Launch Audit" is the correct option.\" \"Congratulations! "Launch Audit" is the correct option.\"

"Congratulations! \"Launch Audit\" is the correct option."

In the decimal number system, you can think of each digit representing a place (or column) in the number. For example, in the decimal number 652, the two, the five, and the six are all in different places and each place can be expressed as 10 to a specific power. Which power of 10 does 6 in the above example represent? 10 to the second power 10 to the first power 10 to the third power 10 to the zero power

10 to the second power

Arrange the following from smallest to largest. Megabyte, gigabyte, terabyte, kilobyte

A kilobyte is the same as 1024 bytes. A megabyte is about a million bytes, or 1024 kilobytes. A gigabyte is about a billion bytes, or 1024 megabytes. A terabyte is about a trillion bytes, or 1024 gigabytes.

What common method do file systems use to keep track of which users can read, write, move, or delete a file or folder? File formats Access Control List File sharing Naming rules

ACL File systems use an Access Control List, or ACL, for each file and folder in the system. The ACL keeps track of which users can read, write, move, or delete each file. Most file systems allow users to share folders saved on their hard drive with users who are connected to the same local network or by setting up a network share. However, this is not a system for keeping track of rights to a file.

Which of the following is a significant difference between and a trademark? Patents use a wide variety of symbols, while trademarks only use one. Patents exist to protect creators, while trademarks exist to protect consumers. Trademarks require a creator to submit an application to the federal government, while patents do not. Trademarks require that the public know the details of how a product works, while patents make it easy for people to know who makes the product.

B

As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system. What should your plan of action include? Escalating the problem Detailing steps and the resources needed to implement the solution Identifying possible causes of the problem Addressing multiple problems individually

Detailing steps and the resources needed to implement the solution

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this? Float Integer String Boolean

Boolean

April, a programmer, wants to convert the binary number 1111001101011011 to a hexadecimal number. What is the recommended first step to perform this conversion manually? Break up the binary number into chunks of two digits. Break up the binary number into chunks of four digits. Convert the binary number to a decimal number. Find the hex value for each chunk of binary digits.

Break up the binary number into chunks of four digits.

Sharon works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Which of the following is the first step Sharon needs to perform in the analysis process? Report the data. Correlate the data. Capture the data. Store the data.

Capture the data.

Which of the following describes using data analytics to inform business operations? Data-driven business decisions Research analysis Market analysis Raw data analysis

Data-driven business decisions

A network host has an IPv4 address of 192.168.12.155. Which of the following notational systems is used to represent this IP address? Binary Hexadecimal Decimal Octal

Decimal

When you are identifying possible causes of a problem, which of the following are troubleshooting methods you should try? (Select two.) Consider using multiple approaches. Test any theories you might have. Research knowledge bases and the internet. Escalate the problem. Check for simple, obvious, and common problems.

Consider using multiple approaches Check for simple, obvious, and common problems

What is the general purpose and use of software? Create knowledge from information Create information from data Create data from information Create data from knowledge

Create information from data

which of the following describes the process of turning data points into useful information? Raw data collection Market analysis Data-driven business decisions Data analytics

D

Given the numerical value 1010101.11, which of the following number systems is MOST likely represented? Hexadecimal Binary Octal Decimal

Decimal 1010101.11 represents a decimal number with two decimal places that consist of 1s and 0s. The binary number system uses two digits - 1 and 0. In practice, binary numbers do not use decimal points. In fact, the word "decimal" in decimal point refers to the decimal number system. The hexadecimal number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. Octal is a base-8 number system and uses the digits 0 through 7.

A network engineer needs to convert the binary number 1101100110110011 to a hexadecimal number. Which of the following is the correct hexadecimal number? D3B9 D9B3 C9D3 D3C9

D9B3 You can calculate the conversion by breaking down the binary number into sets of four digits (1101, 1001, 1011, and 0011). Then you convert each set of four digits into its hexadecimal equivalent (1101 = D, 1001 = 9, 1011= B, and 0011 = 3).

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect? Servers Data and information Trademarks Facilities

Data and information

Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products. Which of the following describes this step of the analytics process? Data correlation Product design Risk assessment Data query

Data correlation

A system administrator has a problem with a network server dropping its connection to the network on a regular basis. The administrator decides to list all the probable causes for the issue and then test each one individually to try and isolate what is causing the issue. Which of the follow BEST describes this troubleshooting technique? Identify the problem. Divide and conquer. Create an action plan. Document the process.

Divide and conquer.

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values? String Integer Float Boolean

Float The float data type is used for numbers that have decimal places. It's called "float" because the computer stores two values behind the scenes: the digits in the number and the location of the decimal point, which can "float" around to any location within the number. The integer data type is used for whole numbers. The Boolean data type consists of exactly two values: True and False. The string data type is used to store more than one character, such as a word or sentence.

Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates currently available to consumers is the FASTEST for network switches? Tbps Kbps Mbps Gbps

Gbps

Which of the following lists the throughput rates (bits per second) from slowest to fastest? Gbps, Kbps, Mbps, Tbps Kbps, Mbps, Gbps, Tbps Tbps, Gbps, Mbps, Kbps Mbps, Kbps, Tbps, Gbps

Kbps, Mbps, Gbps, Tbps

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.) Make sure the power cord is plugged into the wall. Make sure the surge protector is turned on. Open the computer and replace the power supply. Make sure the keyboard and mouse are plugged in. Use a multimeter to test the power supply.

Make sure the power cord is plugged into the wall. Make sure the surge protector is turned on.

Which of the following does a computer use to make sure that people, hardware, and software can interface with each other? Application and hardware interface GUI (graphical user interface) OS (operating system) Device driver

OS

One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process? Peripheral device Output Speaker Input

Output

When Jacob first starts his computer, he hears several warning beeps and nothing else happens. Which of the following is sending out the beeps? Power source Operating system (OS) Power-On Self-Test (POST) Heat sink

POST

Which of the following are examples of input devices? (Select two.) Touch Screens Projectors Speakers Monitors Keyboards

Touch Screens Keyboards

Which of the following exist to help consumers know what products they're buying? Trademarks Copyrights Patents Fair Use

Trademarks

How many bits are in a single byte? four eight twelve sixteen

eight

Dan is using Search on his web browser to find Clearwater Beach, which could be in Alabama or Florida. Which of the following search phrases would help Dan find the beach location MOST effectively? "Clearwater Beach" Alabama +Florida "Clearwater Beach Alabama +Florida" "Clearwater Beach" Alabama OR Florida Clear* Beach Alabama OR Florida

"Clearwater Beach" Alabama OR Florida

Emily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi. Which of the following search phrases will help her find exactly what she needs? "Mississippi pecan pie" Mississippi OR pecan pie +Mississippi pecan pie -Mississippi pecan pie

"Mississippi pecan pie"

Which of the following is the binary number equivalent of the hexadecimal number F5C8? 1010010011010001 1101000110100100 1101001110111001 1111010111001000

1111010111001000 D

Which of the following is the best definition of a bit? An electrical signal in a wire A measure of computer graphics and sound A single 1 or 0 in a digital signal A physical signal that becomes a digital signal

A single 1 or 0 in a digital signal

A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users. Which of the following is the BEST approach to solving these problems? Approach each problem separately. Try to find the relationship between the problems. Back up the system hosting the financial application. Create an action plan for each problem.

Approach each problem separately.

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements? Excel table Line graph Pie chart Bar graph

Bar graph

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________. Business Data Metadata Big Data Omni Data

Big data

Which of the following are specifically designed to help protect digital products? (Select two.) US Patent and Trademark office Fair use Trademarks Digital Rights Management (DRM) tools Technological Protection Measures (TPM)

Digital Rights Management (DRM) tools Technological Protection Measures (TPM) Digital Rights Management tools are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data. Technological Protection Measures are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data. Fair Use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. Fair use does not provide protections for digital products. A trademark is any word, picture, or symbol that is used to distinguish a good from other similar goods--for example, the name of a company or the logo used by a company. Trademarks do not specifically provide protections for digital products. The US Patent and Trademark office processes patent licenses and registered trademarks, but does not specifically focus on protections for digital products.

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step? Establish a plan of action Establish a theory of probable cause Duplicate the problem, if possible Identify symptoms

Duplicate the problem, if possible

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology? Test the theory to determine the cause Establish a plan of action to solve the problem Identify the problem Establish a theory of probable cause

Establish a theory of probable cause

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting? General Welfare Beck's Defense The Ninth Amendment Fair Use

Fair Use

While both the integer data type and float data type can be used for whole numbers, what advantage does the float data type have over integers? Floats can store a word or sentence. Floats can include decimal places. Floats use less storage than an integer. Floats represent two values - True or False.

Floats can include decimal places.

Which of the following processing speeds runs at one billion cycles per second? GHz MB GB MHz

GHz

Which of the following lists the basic computing and processing steps in order? Input/output, processing, and storage Input, retrieval, output, and storage Input, processing, output, and storage Input, retrieval, processing, and storage

Input, processing, output, and storage

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose? Boolean Float String Integer

Integer The integer data type is used for whole numbers. These include both positive and negative numbers, as well as zero. A float is used for numbers that contain decimal precision and would not be the best choice for whole numbers because whole numbers do not require decimal precision. String is used to store multiple characters. Boolean is used to store a true or false value.

Which of the following makes sure that all the computer system hardware is in working order before loading the operating system? Basic Input/Output System (BIOS) Unified Extensible Firmware Interface (UEFI) Device drivers Power-On Self-Test (POST)

POST

What is the collective name for creations that are not the intellectual property of anybody? Royalty Free Unclaimed Works Public Domain Federal Reserve

Public Domain

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis? Forms Reports Queries Tables

Reports Forms, tables, and queries are other key features of Microsoft Access. However, they do not provide the data analysis that reports can offer.

A system administrator has completed the entire troubleshooting process. Some employees at the office were plugging their Ethernet cable into the wrong port and not getting access to network resources. Although the administrator tested the solution, a couple weeks later other employees begin help tickets for the same issue. Which of the following BEST describe what the administrator might have missed doing during the troubleshooting process? Escalating the problem. Ensuring that the solution did not cause any new problems. Taking preventative actions. Documenting the solution and process.

Taking preventative actions

Which of the following throughput transmission units is frequently used when linking data centers, cities, and countries? Incorrect response: Mbps Tbps Kbps Gbps

Tbps

Jonathan has a computer with an older PC bus interface and is getting a fiber optic connection for his home office. Which of the following BEST describes the processing speed environment? The older PC bus runs at a KHz processing speed, while the fiber optic network equipment runs at a MHz processing speed. The older PC bus runs at a MHz processing speed, while the fiber optic network equipment runs at a GHz processing speed. Both the older PC bus and the fiber optic equipment run at a KHz processing speed. Both the older PC bus and the fiber optic equipment run at a MHz processing speed.

The older PC bus runs at a MHz processing speed, while the fiber optic network equipment runs at a GHz processing speed.

The legal protection of rights to ideas and discoveries is called a copyright. What are the other ways that intellectual property can be legally protected? (Select two.) Trademarks Patents Open-source Fair use Public domain

Trademarks Patents

Which of the following Unicode character encoding standards is MOST commonly used for building web pages? Correct Answer: UTF-8 UTF-16 UTF-32 UTF-64

UTF-8

Which of the following encoding schemes would MOST likely be used to represent an emoji? ASCII Hexadecimal Unicode Binary

Unicode

Which of the following statements BEST describes a firewall? A firewall is a peripheral device attached to your computer that restricts the flow of data between the computer and a network. A firewall blocks all traffic between computers and networks. A firewall restricts the flow of data between hosts and networks by checking data packets to make sure they are safe. A firewall filters data packets between a computer and the internet.

A firewall restricts the flow of data between hosts and networks by checking data packets to make sure they are safe. A firewall restricts how hosts and network applications are accessible to each other by checking each bit of data (called a packet) that tries to enter your network to make sure that it is safe. A firewall is software. It is not an attached peripheral device. A firewall is not designed to block all data traffic (although it can). It is designed to filter packets of information flowing between computers and networks to make sure they are safe. A firewall can filter data packets flowing between a computer and the internet, but it is also designed to filter all data traffic flowing to and from a computer from any network.

A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value? Boolean Char String Single

Char Char is used to hold a single character. String is used to store multiple characters. A string can contain a single character; however, char is the best choice when the value the developer is storing will always be a single character. Single is a numeric data type used to contain floating-point values. Boolean is used to store a true or false value and cannot be used to store a single character.

Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem? Check with others to see if they can duplicate the problem. Check for obvious or common issues. Divide and conquer to find a possible cause. Test your theories to verify the cause of the problem.

Check for obvious or common issues.

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed? Establish a plan of action to solve the problem and identify potential effects Verify full system functionality and, if applicable, implement preventive measures Document findings/lessons learned, actions, and outcomes Implement the solution or escalate as necessary

Document findings/lessons learned, actions, and outcomes

A system administrator has been troubleshooting a problem with a database server not providing the information necessary to generate reports from a customer application. The administrator has tried testing several theories, but nothing seems to resolve the issue. Which of the following describes the MOST effective action the administrator should take next to try to resolve the problem? Consult with other system administrators in the company. Keep a record of the testing attempts to include in the action plan. Research the company knowledge base and the internet. Escalate the problem to the database engineer.

Escalate the problem to the database engineer.

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform? Verify full system functionality and, if applicable, implement preventive measures Implement the solution or escalate as necessary Document findings/lessons learned, actions, and outcomes Establish a plan of action to solve the problem and identify potential effects

Establish a plan of action to solve the problem and identify potential effects

A network administrator is following the troubleshooting process to try and resolve a third-party application problem. After researching the issue and backing up the system, what is the next step in the troubleshooting process for the administrator? Document the solution and process. Create an action plan. Establish a theory of probably cause. Test any theories.

Establish a theory of probably cause.

What is the number of instructions a CPU can perform per second measured in? Bytes Ohms Hertz Bits

Hertz CPU cycles are measured in hertz. Data transfer is measured in bits per second. Data size is measured in bytes. Resistance is measured in ohms.

Which of the following notational systems is MOST likely used to represent a MAC address? Decimal Hexadecimal Octal Binary

Hexadecimal

Identifying the problem is the first step in CompTIA's troubleshooting model. Which of the following are tasks associated with this step? (Select three.) Question the obvious Escalate as necessary Identify symptoms Duplicate the problem Question users Consider multiple approaches

Identify symptoms Duplicate the problem Question users

Which of the following accurately describes the characteristics of patents? (Select two.) Patent holders use a symbol (such as a logo) to make it easy for people to know who created their invention. Anything that is owned by a patent holder is called intellectual property. Patent holders are required to provide the public with details about how their invention works. Patent holders can prevent other people from making or selling their patented invention for a limited time. Patents are automatically given to patent holders without the need to apply for the patent.

Patent holders are required to provide the public with details about how their invention works. Patent holders can prevent other people from making or selling their patented invention for a limited time.

Which of the following tools would you use to check connectivity between two computers? Ping Tracert DHCP TCP/IP

Ping The ping command verifies connectivity between two nodes on a network. TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols that facilitate internet communication. Dynamic Host Configuration Protocol (DHCP) is a network management protocol that handles assigning IP addresses on a network. The tracert command shows the exact path a packet takes between two hosts on different networks.

Mary is a data analyst for a large pharmaceutical company. The company wants to know how their new organic line of over-the-counter cold relief medications is being perceived by customers and what they can do to better promote the product. Mary has collected a significant amount of raw data and has analyzed it to find connections and links between the data points. The insights are significant, and now she needs to inform company management. What is Mary's next step in the data analytics process? Prepare a PowerPoint presentation to inform company management. Provide meaningful reporting with a system that includes search features, charts, and graphs. Present the insights to company management in a conference call. Share the raw data and insights with company management in an official report.

Provide meaningful reporting with a system that includes search features, charts, and graphs.

Greg is a network administrator for a medical supply company and has identified a problem with an access control list (ACL) failing to filter out data packets that have been restricted. What is the next step Greg should take to troubleshoot the ACL problem? Back up the ACL and related systems. Research knowledge bases and the internet for information related to the problem. Identify a theory of probable cause. Create an action plan.

Research knowledge bases and the internet for information related to the problem.

Which of the following are exclusively associated with copyright protection? (Select three.) Right to lend a work Right to make derivatives of a work Right to use a trademark Right to reproduce a work Right to apply for a patent Right to reproduce small excerpts of a work Right for anyone to display a work

Right to lend a work Right to make derivatives of a work Right to reproduce a work Copyright includes the rights to reproduce, lend, and make derivatives of a work. Fair use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. It is not exclusive to copyright protection. The right to use a trademark is simply the ability to use any word, symbol, or picture to distinguish a good from other similar goods. It is not part of copyright protection. The right to apply for a patent is available to inventors to receive a temporary monopoly, or protection, on their invention. It is not part of copyright protection.

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations? Statistical tools and formulas Data points Data-driven business decisions Databases

Statistical tools and formulas

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time? Microchip Transistor Processing Storage

Storage

Which of the following BEST describes what a kilobyte is a measurement of? Data throughput Storage space CPU speed Power level

Storage space

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use? String Integer Boolean Float

String

The first step in data analytics is to collect raw data and summarize the information. What is the next step in data analytics? The business makes data-driven decisions based on the data information. The business applies for a trademark or patent to protect the data information. The analysts create reports that help them make informed business decisions. The analysts use statistical tools and formulas to look for trends, patterns, and data correlations.

The analysts use statistical tools and formulas to look for trends, patterns, and data correlations.

Which of the following are features of using an Excel table to store data? (Select two.) Range Graphing Data correlation Total row Column sorting

Total row, column sorting


Conjuntos de estudio relacionados

AP Biology The Chemistry of Life

View Set

chapter 7 accounting for receivables book material

View Set

Learning and Transfer of Training

View Set

6. Fyziologie oběhu krve a lymfy

View Set

12. Salesforce Platform Developer 1(450)

View Set