Which of the following is primarily a confidentiality concern?
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering - ** VERIFIED ANSWERS🔰 ✔✔A. Eavesdropping
A software developer develops a software program and writes a document with step-by-step
instructions on how to use the software. The developer wants to ensure no other person or
company will publish this document for public use. Which of the following should the
developer use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright - ** VERIFIED ANSWERS🔰 ✔✔D. Copyright
Which of the following database concepts would MOST likely use a CSV file?
A. Data querying
B. Data reports
C. Data importing
D. Data persistence - ** VERIFIED ANSWERS🔰 ✔✔B. Data reports
A help desk technician encounters an issue and wants to find out if a colleague has
encountered the same issue before. Which of the following should the technician do FIRST?
,A. Check Knowledge Base.
B. Search local logs.
C. Research possible theories.
D. Question users. - ** VERIFIED ANSWERS🔰 ✔✔A. Check Knowledge Base
Which of the following BEST describes the practice of providing user credentials when
logging onto the network?
A. Output
B. Storage
C. Input
D. Processing - ** VERIFIED ANSWERS🔰 ✔✔C. Input
Which of the following allows wireless devices to communicate to a wired network?
A. Modem
B. Switch
C. Firewall
D. Access point - ** VERIFIED ANSWERS🔰 ✔✔D. Access Point
Which of the following computing devices would be used to provide a centralized means to
distribute services to a group of clients and usually possesses a role on a LAN?
A. Laptop
B. Workstation
C. Mobile phone
D. Server - ** VERIFIED ANSWERS🔰 ✔✔D. Server
Which of the following describes something in a database that refers to the unique identifier
in the parent table?
A. Attribute
,B. Constraint
C. Foreign key
D. Schema - ** VERIFIED ANSWERS🔰 ✔✔A. Attribute
For which of the following is a relational database management system MOST commonly
used?
A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams - ** VERIFIED ANSWERS🔰 ✔✔B. Storing Information
Which of the following BEST describes an application running on a typical operating
system?
A. Process
B. Thread
C. Function
D. Task - ** VERIFIED ANSWERS🔰 ✔✔A. Process
The broadcast signal from a recently installed wireless access point is not as strong as
expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup. - ** VERIFIED ANSWERS🔰 ✔✔B. Ensure Sources of EMI
Are Removed
A user is getting an error message when trying to go to a website. A technician asks the user
a few questions to find out more about the issue. The technician opens a browser locally and
, browses to the same site as the user. Which of the following troubleshooting steps is the
technician using by browsing to the same site?
A. Establish a plan of action.
B. Gather information
C. Duplicate the problem.
D. Find the root cause. - ** VERIFIED ANSWERS🔰 ✔✔C. Duplicate The Problem
A user is attempting to print a document to a wireless printer and receives an error stating
the operation could not be completed. Which of the following should the user do to correct
this issue?
A. Ensure both devices are connected to the LAN.
B. Enable task scheduling.
C. Reset the proxy settings to their default values.
D. Review the fault tolerance configurations. - ** VERIFIED ANSWERS🔰 ✔✔A. Ensure
Both Devices Are Connected To The LAN
Which of the following relational database constructs is used to ensure valid values are
entered for a column?
A. Schema
B. Permissions
C. Constraint
D. Column - ** VERIFIED ANSWERS🔰 ✔✔C. Constraint
A user is buying a laptop. The user will have a lot of personal and confidential information
on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the
laptop is stolen. Which of the following should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Schoolplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.49. You're not tied to anything after your purchase.