Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A Explanation: An optical drive is a component that can accomplish the task of...
If the Breakfast program ran on Sunday, which of the following would be the output?
Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?A . OatmealB . Bacon and eggsC . WafflesD . PancakesView AnswerAnswer: D Explanation: The output of the Breakfast program if it ran on Sunday would be pancakes. The program uses an...
Which of the following protocols would be the MOST secure?
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?A . WPAB . SSIDC . WEPD . WPA2View AnswerAnswer: D Explanation: WPA2 is the most secure protocol for securing a wireless...
is being performed?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?A . QUESTION the obvious.B . Divide and conquer.C . Duplicate the problemD . Research the knowledge base.View AnswerAnswer:...
Which of the following BEST describes the physical location of the data in the database?
Which of the following BEST describes the physical location of the data in the database?A . TableB . ColumnC . RAMD . HDDView AnswerAnswer: D Explanation: HDD (Hard Disk Drive) is a type of storage device that uses magnetic disks to store data permanently. The physical location of the data...
Which of the following does a NoSQL database use to organize data?
Which of the following does a NoSQL database use to organize data?A . Primary keysB . SchemasC . Keys/valuesD . TablesView AnswerAnswer: C Explanation: : A NoSQL database is a type of database that does not use tables, rows, and columns to organize data. Instead, it uses keys and values...
A programmer uses DML to modify:
A programmer uses DML to modify:A . filesB . permissionsC . dataD . backupsView AnswerAnswer: C Explanation: A programmer uses DML to modify data in a database. DML stands for Data Manipulation Language, which is a subset of SQL (Structured Query Language) that is used to manipulate or change data...
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?A . Host-based firewallB . Strong administrator passwordC . Anti-malware softwareD . Full disk encryptionView AnswerAnswer: D Explanation: Full disk encryption would be the best way to keep the...
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?A . Rule-based access controlB . Mandatory access controlC . Role-based access controlD . Discretionary access controlView AnswerAnswer: C Explanation: Role-based access control is the authorization technique that is used...
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following would work BEST stored as a flat file rather than stored in a database?A . Contact listB . Movie theater locationsC . Directions to doctor’s officeD . Store inventoryView AnswerAnswer: C Explanation: Directions to doctor’s office would work best stored as a flat file rather than...