A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?
Which of the following operating systems is best used in creating and managing virtual machines?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Which of the following BEST explains the use of float over integer to store monetary values?
A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently
released new device. After configuring the new device utilizing the old SSID and key, some light switches are
no longer communicating. Which of the following is the MOST likely cause?
Which of the following would be considered the BEST method of securely distributing medical records?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?
Which of the following utilities has the ability to remove drivers and scan for hardware changes?
A developer needs to add a table to a database. Which of the following database activities should the user
perform?
Which of the following best describes the process of comparing MD5 values after downloading software?
A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
A technician has verified full system functionality. Which of the following actions should the technician take next?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?
A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?
For which of the following is a relational database management system MOST commonly used?
Which of the following would be the most cost-effective method to increase availability?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?
A user clicks a link to a web page to view a document, but nothing happens. Which of the following is most likely the issue?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following OS features would be best to use to remove unnecessary programs?
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of
application architectures did the employee use?
A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?
A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following
is the MOST likely cause?
A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
A company has installed an application that only requires a workstation to function. Which of the following
architecture types is this application using?
After creating a database, which of the following would a developer most likely use to put data in a table?
Which of the following data types should a developer use when creating a variable to hold a postal code?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?
A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?
A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
Which of the following language types most likely controls the way a web page looks?
A database administrator finds that a table is not needed in a relational database. Which of the following
commands is used to completely remove the table and its data?
Which of the following would be best to use to store a project task list that will be updated by multiple team members?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the
workspace, the employee requests that the laptop be installed with the cover closed. Which of the following
would be required to satisfy this request? (Choose two.)
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?
Which of the following are benefits of a security awareness training program9 (Select two).
Which of the following interfaces is best for viewing database performance information?
Given the following pseudocode:
Which of the following is the output of the code?
Which of the following operating systems is most likely to be used to provide the GUI for a workplace employee?
Which of the following commands would most likely be used to add data to an existing database table?
A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
Within a database, which of the following would be the best access method to use to display a subset of a table?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following database types would be best in which to place financial data?
Which of the following would most likely be used to verify a user is following an AUP?