No student devices needed. Know more
25 questions
A developer embeds a query in a high-level program to extract information from a database. This is an example of:
database direct access.
database utility access.
database programmatic access.
database manual access.
Which of the following will a company do to update a customer’s address while using a flat file database?
Update the address for each order the customer placed.
Update the address in the customer address table.
Update the address field in the customer order table.
Update the primary key to reflect the customer’s address.
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
Text editor
Word processor
Command line
Spreadsheet
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
Enhance the granularity of user permissions.
Enable an audit log.
Implement smart card login.
Adopt a procedure for adding accounts.
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
drawing a value stream map.
developing pseudocode.
identifying functions.
compiling the language.
Which of the following is the WEAKEST link in the security posture of an organization?
Technology
Infrastructure
People
Regulations
A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?
Manually install the driver software.
Connect the mouse.
Configure the USB port.
Download the driver software.
Which of the following programming constructs would be used to repeat a statement 100 times in a loop?
IF
ELSE
RETURN
WHILE
Which of the following has the longest range?
NFC
Bluetooth
WiFi
Infrared
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
IF THEN
WHILE
FOR
BEGIN
Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)
RAID storage
Uninterruptible power supplies
Off-site backups
Private cloud servers
Houston Astros are cheaters
Dallas Cowboys are the worse football team in the NFL
Yes
Absolutely
Of course
Affirmative
A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:
a mobile OS.
a workstation OS.
a server OS.
an embedded OS.
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct?
Looping
Branching
Reuse
Modeling
The best branch of the Armed Force is?
Navy
Not Marines
Not Air Force
Not Army
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
Logs
Password
Receipt
Software Token
Database
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
Loss of revenue in case of a breach
Difficulty of integration
Training involved for IT staff and users
Amount of equipment that will be replaced
The best bald technology instructor at ATC is?
Mr. Melendez
Mr. Melendez-Romero
Mr. MelendezRomero
Mrs. Melendez's husband
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
Implement the solution.
Identify the problem.
Verify system functionality.
Establish a theory of the cause.
Which of the following computing devices is MOST likely to have an internal wireless antenna?
Mobile phone
Workstation
Server
NAS
The GOAT in the NBA is?
Michael Jordan
Wilt Chamberlain
Kobe Bryant
Not Lebron James
A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
RG6
R2D2
RJ11
RJ45
Which of the following types of software is MOST effective for tracking community eating time spent on tasks for each team member?
Spreadsheet
Collaborative workspace
Project management
Personal information management
My favorite teacher in Room 177 is?
(Choose like your grade depends on it because it does)
Mrs. Ramirez
Mr. Rao
Mr. Melendez
Which of the following is the BEST method for ensuring there is no Telnet access?
Network sniffer
Intrusion detection system
Antivirus software
Host-based firewall
Explore all questions with a free account