Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).A . Windows 7B . Windows 8C . UNIXD . Windows Server 2012E . AndroidF . LinuxView AnswerAnswer: C,F
Which of the following should the developer use to BEST protect the document?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use . Which of the following should the developer use to BEST protect the...
Which of the following would be the BEST choice to accomplish this task?
A user wants to use a laptop outside the house and still remain connected to the Internet . Which of the following would be the BEST choice to accomplish this task?A . Thunderbolt cableB . Bluetooth moduleC . Infrared portD . WLAN cardView AnswerAnswer: D
Which of the following is the closest to machine language?
Which of the following is the closest to machine language?A . Scripted languagesB . Compiled languagesC . Query languagesD . Assembly languagesView AnswerAnswer: D
Which of the following types of application architectures did the employee use?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report . Which of the following types of application architectures did the employee use?A . Standalone applicationB . Client-server applicationC ....
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?A . 1001KbpsB . 110MbpsC . 1.22GbpsD . 123MbpsView AnswerAnswer: C
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?A . Rule-based access controlB . Mandatory access controlC . Role-based access controlD . Discretionary access controlView AnswerAnswer: C
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following would be considered the BEST method of securely distributing medical records?A . Encrypted flash driveB . Social networking sitesC . FaxD . FTP file sharingView AnswerAnswer: A
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?A . Document the solution and cause.B . Create a new theory of cause.C . Research the problem online.D . Implement preventive measures.View AnswerAnswer: A
Which of the following should have the HIGHEST expectation of privacy?
Which of the following should have the HIGHEST expectation of privacy?A . A picture posted to a social media websiteB . A presentation saved to a corporate file serverC . A locally stored word processing documentD . A spreadsheet emailed to a business clientView AnswerAnswer: C