Which of the following would work BEST stored as a flat file rather than stored in a database?

Which of the following would work BEST stored as a flat file rather than stored in a database?A . Contact listB . Movie theater locationsC . Directions to doctor’s officeD . Store inventoryView AnswerAnswer: C Explanation: Directions to doctor’s office would work best stored as a flat file rather than...

January 30, 2025 No Comments READ MORE +

table?

Which of the following describes something in a database that refers to the unique identifier in the parent table?A . AttributeB . ConstraintC . Foreign keyD . SchemaView AnswerAnswer: C Explanation: A foreign key is a column or a set of columns in a table that refers to the unique...

January 28, 2025 No Comments READ MORE +

Which of the following applications should be used to create this list?

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?A . Database softwareB . Word processing softwareC...

January 24, 2025 No Comments READ MORE +

Which of the following components would accomplish this task?

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A Explanation: An optical drive is a component that can accomplish the task of...

January 23, 2025 No Comments READ MORE +

If the Breakfast program ran on Sunday, which of the following would be the output?

Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?A . OatmealB . Bacon and eggsC . WafflesD . PancakesView AnswerAnswer: D Explanation: The output of the Breakfast program if it ran on Sunday would be pancakes. The program uses an...

January 22, 2025 No Comments READ MORE +

Which of the following protocols would be the MOST secure?

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?A . WPAB . SSIDC . WEPD . WPA2View AnswerAnswer: D Explanation: WPA2 is the most secure protocol for securing a wireless...

January 21, 2025 No Comments READ MORE +

is being performed?

To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?A . QUESTION the obvious.B . Divide and conquer.C . Duplicate the problemD . Research the knowledge base.View AnswerAnswer:...

September 29, 2024 No Comments READ MORE +

Which of the following BEST describes the physical location of the data in the database?

Which of the following BEST describes the physical location of the data in the database?A . TableB . ColumnC . RAMD . HDDView AnswerAnswer: D Explanation: HDD (Hard Disk Drive) is a type of storage device that uses magnetic disks to store data permanently. The physical location of the data...

September 28, 2024 No Comments READ MORE +

Which of the following does a NoSQL database use to organize data?

Which of the following does a NoSQL database use to organize data?A . Primary keysB . SchemasC . Keys/valuesD . TablesView AnswerAnswer: C Explanation: : A NoSQL database is a type of database that does not use tables, rows, and columns to organize data. Instead, it uses keys and values...

September 28, 2024 No Comments READ MORE +

A programmer uses DML to modify:

A programmer uses DML to modify:A . filesB . permissionsC . dataD . backupsView AnswerAnswer: C Explanation: A programmer uses DML to modify data in a database. DML stands for Data Manipulation Language, which is a subset of SQL (Structured Query Language) that is used to manipulate or change data...

September 27, 2024 No Comments READ MORE +