Which of the following should be set up to accomplish this?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?A . EncryptionB...
Which of the following actions was performed?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?A . Data correlationB . Data manipulationC . Data gatheringD . Data definitionView AnswerAnswer: D Explanation: Data definition is the process of creating, modifying, or deleting the structure and objects of...
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?A . Proprietary softwareB . Commercial softwareC . Open-source softwareD . Cross-platform softwareView AnswerAnswer: C Explanation: Open source software is software that allows anyone to access, modify, and...
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following would work BEST stored as a flat file rather than stored in a database?A . Contact listB . Movie theater locationsC . Directions to doctor’s officeD . Store inventoryView AnswerAnswer: C Explanation: Directions to doctor’s office would work best stored as a flat file rather than...
table?
Which of the following describes something in a database that refers to the unique identifier in the parent table?A . AttributeB . ConstraintC . Foreign keyD . SchemaView AnswerAnswer: C Explanation: A foreign key is a column or a set of columns in a table that refers to the unique...
Which of the following applications should be used to create this list?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?A . Database softwareB . Word processing softwareC...
Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A Explanation: An optical drive is a component that can accomplish the task of...
If the Breakfast program ran on Sunday, which of the following would be the output?
Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?A . OatmealB . Bacon and eggsC . WafflesD . PancakesView AnswerAnswer: D Explanation: The output of the Breakfast program if it ran on Sunday would be pancakes. The program uses an...
Which of the following protocols would be the MOST secure?
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?A . WPAB . SSIDC . WEPD . WPA2View AnswerAnswer: D Explanation: WPA2 is the most secure protocol for securing a wireless...
is being performed?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?A . QUESTION the obvious.B . Divide and conquer.C . Duplicate the problemD . Research the knowledge base.View AnswerAnswer:...