Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
Answer : C
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation
MOST likely need for the printer to function?
Answer : D
Which of the following BEST describes a kilobyte?
Answer : A
Which of the following security concerns is a threat to confidentiality?
Answer : A
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Answer : C
Which of the following are the basic computing operations?
Answer : D
Which of the following would work BEST stored as a flat file rather than stored in a database?
Answer : A
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Answer : D
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
Answer : B
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Answer : D
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
Answer : A
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Answer : D
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
Answer : B
The IT department has established a new password policy for employees. Specifically, the policy reads:
✑ Passwords must not contain common dictionary words
✑ Passwords must contain at least one special character.
✑ Passwords must be different from the las six passwords used.
✑ Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Choose two.)
Answer : BD
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us