B.2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following transfer rates is the FASTEST? 1. 181 Mbps 2. 1,480 Mbps 3. 1.24 Gbps 4. 1,282 Kbps

1,480 Mbps

Which of the following is the correct binary representation of the number 2? 101 10 110 11

10

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.

8% Branching

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

CD or DVD installation

Which of the following SQL commands would you use to delete an entire table and all of its data?

DROP

Which of the following terms describes the set of SQL commands that change the structure or schema of a database, such as the DROP command?

Data Definition Language (DDL)

What group of database commands is used to define and modify metadata?

Data definition

A database administrator wants to export all the data in a database to a comma separated value file (.CSV) where it can be opened by spreadsheet software. Which of the following would be the EASIEST way to create the exported file?

Database dump

On a flowchart, which of the following represents a decision?

Diamond

Maintaining confidentiality in the workplace is important for building and maintaining trust and for ensuring an open and honest communication between customers, clients, and employees. Which of the following threatens data confidentiality?

Dumpster diving

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

Duplicate the problem, if possible

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?

Establish a theory of probable cause

In a relational database table, columns are better known as ________________.

Fields

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?

Firmware

Which of the following should not be used as a primary key in a table?

First name

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.

Frontend

Julien, a programmer, was fixing a bug in the programming code written by another developer. He discovered that the code with the bug was repeated several times. Instead of fixing the bug in multiple places, which of the following programming features should he use so the code is only located in one place?

Functions

Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates is the FASTEST for network switches available to consumers? Kbps Mbps Gbps Tbps

Gbps

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

Hard disk

Which of the following notational systems is MOST LIKELY used to represent a MAC address? Hexadecimal Octal Decimal Binary

Hexadecimal

What are the two main types of firewall? (select two)

Host-based Firewall Network Firewall

Which of the following BEST describes a flowchart?

It is a visual representation of the logic in a program.

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

JavaScript

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

Looping

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

Modify

The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?

Network share

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Non-repudiation

The idea of programming by modeling real-world things into computer code is called _____________.

Object-oriented programming

When protecting your online identity, which of the following is an internet security threat you need to be aware of?

Phishing attempts

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)

Processes Details

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

Programmatic access

Which of the following describes this code snippet? If COUNTER is less than ten: *Increase the value of COUNTER by 1 *Change the displayed number to new COUNTER value

Pseudocode

Which of the following access controls gives only backup administrators access to all servers on the network?

Role-based

What is malware that monitors a user's behavior without their knowledge?

Spyware

Which of the following BEST describes what a kilobyte is a measurement of? Data throughput Storage space CPU speed Power level

Storage Speed

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use?

String

What is the name of the protocol suite used on the Internet?

TCP/IP

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?

Text-based flat file

Anna, a user, downloaded a free pdf editing application from the internet. Now the laptop constantly displays desktop popups and several applications won't start. Anna was the victim of which of the following?

Trojan horse

What is the type of malware that is often disguised as legitimate software?

Trojan horse

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users.

Your company is exposed to litigation by violating the software license agreement. You risk losing your job.

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

import random

What is a type of malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself?

worm


Ensembles d'études connexes

managing pple and organization exam 2 T

View Set

The House of the Scorpion Final Exam Review

View Set

A Beka American Government Chapter 7 Sections 1 & 2

View Set

Le Corbusier: Elements of a Synthesis

View Set

Section V: NC Statues and Regulations Pertinent To Life

View Set

AP Human Geography Review - Unit Seven, AP Human Geography Review - Unit Seven

View Set

CH 51 Care Musculoskeletal Trauma

View Set