Which of the following contains exactly four copper wires?
Which of the following would be best to use to store a project task list that will be updated by multiple team members?
Privacy expectations on a company intranet should be limited to:
Which of the following WiFi security options would create the MOST need for a VPN connection on the client
device?
Which of the following best describes when lo use an array?
Which of the following BEST describes an application running on a typical operating system?
Given the following pseudocode:
Which of the following would be the output of the program?
Which of the following best explains the reason for password expiration?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
Which of the following is most appropriate to list on a social media site about an employer?
Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
A company is concerned with ensuring its databases are highly available. Which of the following can be used to
increase database availability?
A technician has verified full system functionality. Which of the following actions should the technician take next?
Which of the following is an advantage of installing an application to the cloud?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
Which of the following does a NoSQL database use to organize data?
A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,
the data is stored on another drive, preventing data loss. Which of the following business continuity concepts
does this explain?
Which of the following storage devices have a spinning disk? (Choose two.)
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
Which of the following language types would a web developer MOST likely use to create a website?
Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
A UPS provides protection against:
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
Which of the following BEST describes the physical location of the data in the database?
An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following commands would most likely be used to add data to an existing database table?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).
Which of the following storage types uses platters to store data?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A game developer is purchasing a computing device to develop a game and recognizes the game engine
software will require a device with high-end specifications that can be upgraded. Which of the following
devices would be BEST for the developer to buy?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
Which of the following would be the most cost-effective method to increase availability?
Which of the following concerns does installing cross-platform software address?
Which of the following filesystems would a Linux computer MOST likely use?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
Which of the following would be used to send messages using the SMTP protocol?
A programmer uses DML to modify:
Which of the following commands can be used to remove a database permanently?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
The computer language that is closest to machine code is:
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
Which of the following is the exact number of bytes in a gigabyte?
A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
Which of the following database concepts would MOST likely use a CSV file?
Which of the following operating systems do not require extensions on files to execute a program? (Select
TWO).
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
Which of the following creates multifactor authentication when used with something you have?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following is an example of multifactor authentication?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following is the closest to machine language?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following defines a reusable value that can be reassigned?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following file extensions is used for a consolidated group of files?
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
SQL databases use primary and foreign keys to enable which of the following?
Which of the following protocols is used to relay email from a user's mail server?