Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record?A . Foreign keyB . Public keyC . Primary keyD . Private keyView AnswerAnswer: C Explanation: A primary key is a value that uniquely identifies a database record or a row in a table. A primary key can...
Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A Explanation: An optical drive is a component that can accomplish the task of...
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data.
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:A . redundancy.B . replication.C . prioritization.D . fault tolerance.View AnswerAnswer: C Explanation: Prioritization is the example of a disaster recovery exercise that involves ensuring customer data is recovered...
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).A . Windows 7B . Windows 8C . UNIXD . Windows Server 2012E . AndroidF . LinuxView AnswerAnswer: C, F Explanation: UNIX and Linux are the examples of operating systems that do not...
Which of the following is the output of the code?
Given the following pseudocode: Which of the following is the output of the code?A . 1B . 9C . 10D . 11View AnswerAnswer: B Explanation: The code uses a for loop to iterate from 1 to 3, and assigns the value of i to the variable x. Then, it adds...
Which of the following BEST describes an application running on a typical operating system?
Which of the following BEST describes an application running on a typical operating system?A . ProcessB . ThreadC . FunctionD . TaskView AnswerAnswer: A Explanation: An application running on a typical operating system is an example of a process, which is a program or a set of instructions that is...
Which of the following programming constructs is BEST to use?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?A . VariableB . IfC . DatatypeD . CommentView AnswerAnswer: B Explanation: An if statement is a programming construct that is best to use when a program needs...
Which of the following is the BEST way for the company to document this change?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?A . Written procedureB . Written policyC . Written emailD . Written memoView AnswerAnswer: B Explanation: A written policy is...
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following would be considered the BEST method of securely distributing medical records?A . Encrypted flash driveB . Social networking sitesC . FaxD . FTP file sharingView AnswerAnswer: A Explanation: An encrypted flash drive would be the best method of securely distributing medical records among the given options....
Which of the following has Joe MOST likely performed?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?A . Password reuseB . SnoopingC . Social engineeringD . PhishingView AnswerAnswer: A...