Which of the following applications should be used to create this list?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time . Which of the following applications should be used to create this list?A . Database softwareB . Word processing...
Which of the following is the BEST option for Internet service?
A company desires to implement a six-month survey site within a remote location . Which of the following is the BEST option for Internet service?A . CellularB . SatelliteC . CableD . FiberView AnswerAnswer: B
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?A . Email previewingB . PatchingC . Clear browsing cacheD . Kill processView AnswerAnswer: B
Which of the following requires the MOST frequent updating to remain effective?
Which of the following requires the MOST frequent updating to remain effective?A . AntivirusB . Host firewallC . Web browserD . Device driversView AnswerAnswer: A
Which of the following actions should be used to get the database populated?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?A . EXPORTB . IMPORTC . SELECTD . ALTERView AnswerAnswer: B
Which of the following devices would be BEST for the developer to buy?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded . Which of the following devices would be BEST for the developer to buy?A . LaptopB . ServerC . Game consoleD...
Which of the following devices would MOST likely be used to store the data?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network . Which of the following devices would MOST likely be used to store the data?A . ServerB . Tape libraryC . External HDDD . WorkstationView...
Which of the following actions was performed?
An administrator grants permission for a user to access data in a database . Which of the following actions was performed?A . Data correlationB . Data manipulationC . Data gatheringD . Data definitionView AnswerAnswer: D
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)A . SMTPB . POP3C . SNMPD . DHCPE . ICMPF . SFTPView AnswerAnswer: A,B
Which of the following would be used to send messages using the SMTP protocol?
Which of the following would be used to send messages using the SMTP protocol?A . Document sharing softwareB . Instant messaging softwareC . Conferencing softwareD . Email softwareView AnswerAnswer: D