Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record?A . Foreign keyB . Public keyC . Primary keyD . Private keyView AnswerAnswer: C
Which of the following BEST describes a kilobyte?
Which of the following BEST describes a kilobyte?A . A kilobyte is a measurement of storage (e.g., 100KB).B . A kilobyte is a measurement of throughput (e.g.,100Kbps).C . A kilobyte is a measurement of power (e.g., 100KW).D . A kilobyte is a measurement of processor speed (e.g., 2.4KHz).View AnswerAnswer: A
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?A . LaptopB . WorkstationC . Mobile phoneD . ServerView AnswerAnswer: D
Which of the following allows wireless devices to communicate to a wired network?
Which of the following allows wireless devices to communicate to a wired network?A . ModemB . SwitchC . FirewallD . Access pointView AnswerAnswer: D
commands should the administrator use?
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?A . SELECTB . INSERTC . DELETED . UPDATEView AnswerAnswer: A
Which of the following should the technician do FIRST?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?A . Check Knowledge Base.B . Search local logs.C . Research possible theories.D . users.View AnswerAnswer: A
Which of the following actions would BEST improve the signal strength?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?A . Update from 802.11b to 802.11g.B . Ensure sources of EMI are removed.C . Enable WPA2-Enterprise.D . Use WiFi Protected Setup.View AnswerAnswer: B
network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?A . OutputB . StorageC . InputD . ProcessingView AnswerAnswer: C