A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
Which of the following is an advantage of a fiat file?
Which of the following is a value that uniquely identifies a database record?
Which of the following is an example of multifactor authentication?
A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A technician has verified full system functionality. Which of the following actions should the technician take next?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following
programming concepts does jump represent?
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following storage devices have a spinning disk? (Choose two.)
In which of the following situations should there be come expectation of privacy?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently
released new device. After configuring the new device utilizing the old SSID and key, some light switches are
no longer communicating. Which of the following is the MOST likely cause?
Which of the following programming concepts uses properties and attributes?
Which of the following is the most secure fllesystem?
Given the following pseudocode:
Which of the following is the output of the code?
A user logs into a laptop using a username and complex password. This is an example of:
A developer needs to add a table to a database. Which of the following database activities should the user
perform?
Which of the following would be the best reason to implement a host firewall?
Which of the following is a reason why complex passwords are required?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Which of the following are the basic computing operations?
Which of the following creates multifactor authentication when used with something you have?
Which of the following concerns does installing cross-platform software address?
A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
Which of the following interfaces is best for viewing database performance information?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following language types would a web developer MOST likely use to create a website?
A game developer is purchasing a computing device to develop a game and recognizes the game engine
software will require a device with high-end specifications that can be upgraded. Which of the following
devices would be BEST for the developer to buy?
Which of the following database concepts would MOST likely use a CSV file?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following storage types is MOST vulnerable to magnetic damage?
Which of the following is the slowest processing speed?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
When following the troubleshooting methodology, which of the following should be performed last?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?
A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
The computer language that is closest to machine code is:
A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
A UPS provides protection against:
Which of the following is both an input and output device?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
Privacy expectations on a company intranet should be limited to:
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
Which of the following would be the most cost-effective method to increase availability?
Which of the following computer components allows for communication over a computer network?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
Which of the following is most likely to disclose the data collection practices of an application?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following
programming constructs is BEST to use?
Which of the following is the closest to machine language?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
Which of the following is MOST likely used to represent international text data?
Which of the following contains exactly four copper wires?
Within a database, which of the following would be the best access method to use to display a subset of a table?