Which of the following should the company use to BEST protect the logo?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).A . PatentB . CopyrightC . NDAD . TrademarkE . EULAView AnswerAnswer: BD
Which of the following should the user do to correct this issue?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?A . Ensure both devices are connected to the LAN.B . Enable task scheduling.C . Reset...
Which of the following is the BEST option for Internet service?
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?A . CellularB . SatelliteC . CableD . FiberView AnswerAnswer: B
Which of the following BEST describes an application running on a typical operating system?
Which of the following BEST describes an application running on a typical operating system?A . ProcessB . ThreadC . FunctionD . TaskView AnswerAnswer: A
Which of the following actions was performed?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?A . Data correlationB . Data manipulationC . Data gatheringD . Data definitionView AnswerAnswer: D
Which of the following computer components allows for communication over a computer network?
Which of the following computer components allows for communication over a computer network?A . RAMB . NICC . CPUD . NASView AnswerAnswer: B
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?A . Email previewingB . PatchingC . Clear browsing cacheD . Kill processView AnswerAnswer: B
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?A . Host-based firewallB . Strong administrator passwordC . Anti-malware softwareD . Full disk encryptionView AnswerAnswer: D
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?A . OutputB . StorageC . InputD . ProcessingView AnswerAnswer: C
Which of the following database concepts would MOST likely use a CSV file?
Which of the following database concepts would MOST likely use a CSV file?A . Data queryingB . Data reportsC . Data importingD . Data persistenceView AnswerAnswer: B