Which of the following actions was performed?
An administrator grants permission for a user to access data in a database . Which of the following actions was performed?A . Data correlationB . Data manipulationC . Data gatheringD . Data definitionView AnswerAnswer: D
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)A . SMTPB . POP3C . SNMPD . DHCPE . ICMPF . SFTPView AnswerAnswer: A,B
Which of the following would be used to send messages using the SMTP protocol?
Which of the following would be used to send messages using the SMTP protocol?A . Document sharing softwareB . Instant messaging softwareC . Conferencing softwareD . Email softwareView AnswerAnswer: D
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).A . Windows 7B . Windows 8C . UNIXD . Windows Server 2012E . AndroidF . LinuxView AnswerAnswer: C,F
Which of the following should the developer use to BEST protect the document?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use . Which of the following should the developer use to BEST protect the...
Which of the following would be the BEST choice to accomplish this task?
A user wants to use a laptop outside the house and still remain connected to the Internet . Which of the following would be the BEST choice to accomplish this task?A . Thunderbolt cableB . Bluetooth moduleC . Infrared portD . WLAN cardView AnswerAnswer: D
Which of the following is the closest to machine language?
Which of the following is the closest to machine language?A . Scripted languagesB . Compiled languagesC . Query languagesD . Assembly languagesView AnswerAnswer: D
Which of the following types of application architectures did the employee use?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report . Which of the following types of application architectures did the employee use?A . Standalone applicationB . Client-server applicationC ....
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?A . 1001KbpsB . 110MbpsC . 1.22GbpsD . 123MbpsView AnswerAnswer: C
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?A . Rule-based access controlB . Mandatory access controlC . Role-based access controlD . Discretionary access controlView AnswerAnswer: C