Go Over Again Flashcards

1
Q

Which of the following BEST describes the software elements that enable an OS to interact directly with a connected hardware device?

A) Proess. B) Thread. C)Driver. D) utinility

A

C) Driver - are to act as underneath between the Os and the hardware device. Without the appreciate drive the OS wouldn’t know how to properly interact with the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the listed date types BEST describe operators that can link multiple search terms together ?
A) Strings B) Floats. C)Booleans. D) integers

A

C) Booleans - the context of seacrch terms (AND, OR, NOT )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user struggles to access the internet via a web browser, yet they can receive email and instant messages. Which of the following actions should the user take to BEST address the problem?
A). Validate website certificates
B). Verify the proxy configuration settings
C). Disable pop up blockers
D). Clear the browser cache

A

B- verify the proxy configuration settings.

A misconducted proxy can prevent a web browser from accessing the internet while other services , like email and instant messaging , remain unaffected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A programmer inserted a query within a software application. A query will be used by the application to retrieve date from a database. This scenario illustrates:
A) database manual access. B). Database utility access. C) Database programmatic access D). Database import

A

C) Database programmatic access D- refers to the ability of software applications to interact with a database using the embedded queries or commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Each row in a relational database represents a unique record. Which of following defines the role of the columns?
A) tables b) indexes c) attributes d) views

A

C) attributes - this is the characteristic that would have the data that is supposed to be captured. (Ex: database of employees = rows, salary = columns )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following commands can be executed in a database to initiate a query?
A) create. B) insert. C) select. D) update

A

C) Select - the command is a fundamental SQL statement used to retrieve date from a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following OS utilities would be used to extend the size of a primary partition?

A

A) disk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company provides additional compensation to a software developer at the close of each year for any additional servers that have been deployed. Which of the following licensing models is the company MOST likely using?
A) subscription service. B) site license. C) concurrent license. D ) single use license

A

A) subscription service - typically requires periodic payments often based on servers /devices utilizing the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of programming languages is typically used for manipulating a database?

A) interpreted. B) scripted. C) compiled.
D) query

A

SQL - query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following internal computing components is MOST prone to overheating ?

A) HDD. B) GPU. C) Motherboard. D) SSD

A

B) graphics processing unit - GPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A CSV file is most commonly associated with which of the following database concepts ?
A) Data reports b) data deletion. C) data importing. D) data queries

A

C) Data importing - is the process of bringing data into a database from external sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following pertains to an element in a database that points to the unique identifier of its parent table ?
A) attribute. B ) row. C) foreign key. D) constraint

A

C) foreign key, it is unique to the identifier to ensure integrity and establish a Relationship between related data sets in different tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The broadcast signal from a newly set up wireless access point is weaker than anticipated. Which of the following steps would be MOST effective at enchanting the signal strength ?
A) switch from 802.11b to g
B) remove any sources of EMI
C) enable WPA2
D) enable WPS

A

Remove any sources of EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of programming languages interacts directly with hardware to manage storage, network connectivity, and virtual machines?
A) SAN. B) embedded OS. C) NAS. D) type 1 hypervisor

A

D) Type 1 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a UPS offer protection against?
A) DoS attack. B) man in the middle attack
C) power outages. D) eavesdropping

A

C ) power outages - UPS stands for uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A desktop technician has connected a printer to a work station, however the work stations doesn’t recognize the printer. What is the workstation MOST likely lacking to ensure the printer functions correctly?
A) permission. B) toner. C) OS reset. D) driver

A

D) Driver - without the correct driver the workstation cannot recognize or communicate effectively with the devices

17
Q

A database administrator grants permissions for an employee to view information held within a database. What actions has been taken ?
A) data correlation. B ) data capture. C) data manipulation. D) data definition

A

D) Data definition - specifies the structure of a database and the operations that can be performed on it.

18
Q

A developer wants to save a programs output in a location that offers rapid access. Also data persistence is not necessary. Which storage option is MOST suitable for this purpose?
A)database b) memory. C ) HDS. D) SSD

A

B) memory - in this case would be RAM, random access memory

19
Q

Which 2 network protocols are commonly utilized for transmitting and retrieving emails over the internet ?

A

1) SMTP- simple mail transfer protocol
2)POP3 - post office protocol 3

20
Q

A technician is tasked with setting up wireless router for a customer that has a maximum throughout speed of 11mbps and works on the 2.4ghz frequency band. Which router type was selected for this installation?

A

802.11b is the best for up to 11mbps speed and on 2.4ghz

21
Q

In addition to a mark up language , which kind of programming language would a web developer most likely use to create a website ?
A) interpreted
B) query
C) completed
D) assembly

A

A) interpreted. Just as JavaScript are commonly used for web development to run directly with the browser.

22
Q

A software developer is working on an e- commerce platform where users input their postal codes during checkout. The developer needs to choose an appropriate data type for storing these postal codes within the system. Which of the following date types should the developer select for this purpose?

A) integer. B) string. C) float. D) Boolean

A

B) string