is being performed?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?A . QUESTION the obvious.B . Divide and conquer.C . Duplicate the problemD . Research the knowledge base.View AnswerAnswer:...
Which of the following BEST describes the physical location of the data in the database?
Which of the following BEST describes the physical location of the data in the database?A . TableB . ColumnC . RAMD . HDDView AnswerAnswer: D Explanation: HDD (Hard Disk Drive) is a type of storage device that uses magnetic disks to store data permanently. The physical location of the data...
Which of the following does a NoSQL database use to organize data?
Which of the following does a NoSQL database use to organize data?A . Primary keysB . SchemasC . Keys/valuesD . TablesView AnswerAnswer: C Explanation: : A NoSQL database is a type of database that does not use tables, rows, and columns to organize data. Instead, it uses keys and values...
A programmer uses DML to modify:
A programmer uses DML to modify:A . filesB . permissionsC . dataD . backupsView AnswerAnswer: C Explanation: A programmer uses DML to modify data in a database. DML stands for Data Manipulation Language, which is a subset of SQL (Structured Query Language) that is used to manipulate or change data...
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?A . Host-based firewallB . Strong administrator passwordC . Anti-malware softwareD . Full disk encryptionView AnswerAnswer: D Explanation: Full disk encryption would be the best way to keep the...
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?A . Rule-based access controlB . Mandatory access controlC . Role-based access controlD . Discretionary access controlView AnswerAnswer: C Explanation: Role-based access control is the authorization technique that is used...
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following would work BEST stored as a flat file rather than stored in a database?A . Contact listB . Movie theater locationsC . Directions to doctor’s officeD . Store inventoryView AnswerAnswer: C Explanation: Directions to doctor’s office would work best stored as a flat file rather than...
Which of the following is a valid IP address the technician should assign?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?A . 127.0.0.1B . 172.16.2.189C . 192.168.257.1D . 255.255.255.0View AnswerAnswer: B Explanation:
Which of the following database concepts would MOST likely use a CSV file?
Which of the following database concepts would MOST likely use a CSV file?A . Data queryingB . Data reportsC . Data importingD . Data persistenceView AnswerAnswer: C Explanation: A CSV file is a comma-separated values file that stores data in a tabular format. A CSV file can be used to...
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)A . SMTPB . POP3C . SNMPD . DHCPE . ICMPF . SFTPView AnswerAnswer: A, B Explanation: SMTP and POP3 are the most likely network protocols that will be used when sending...