In which of the following situations should there be come expectation of privacy?
In which of the following situations should there be come expectation of privacy?A . Posting a comment on a friend’s social media pageB . Submitting personal information on a school enrollment siteC . Posting a comment on a video sharing siteD . Sending email and pictures to a close relativeView...
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?A . Text file on a shared driveB . Managed relational databaseC . Informational intranet pageD . Locally installed productivity softwareView AnswerAnswer: B
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?A . LaptopB . WorkstationC . Mobile phoneD . ServerView AnswerAnswer: D
business?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?A . ContractB . PatentC . CopyrightD . TrademarkView AnswerAnswer: D
Which of the following relational database constructs is used to ensure valid values are entered for a column?
Which of the following relational database constructs is used to ensure valid values are entered for a column?A . SchemaB . PermissionsC . ConstraintD . ColumnView AnswerAnswer: C
The computer language that is closest to machine code is:
The computer language that is closest to machine code is:A . query languageB . scripting languageC . markup languageD . assembly languageView AnswerAnswer: D
Which of the following should the technician do FIRST?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before . Which of the following should the technician do FIRST?A . Check Knowledge Base.B . Search local logs.C . Research possible theories.D . QUESTION NO: users.View AnswerAnswer: A
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?A . Password and passphraseB . Fingerprint and retina scanC . Hardware token and smartphoneD . Smart card and PINView AnswerAnswer: D
Which of the following business continuity concepts does this explain?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss . Which of the following business continuity concepts does this explain?A . File backupB . Data restorationC . Fault toleranceD...
Which of the following concepts is this an example of?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?A . Non-repudiationB . AuthenticationC . IntegrityD . AccountingView AnswerAnswer: B