more for this test Flashcards
1 Gigabit equals how much of a Gigabyte
1/8th
Which of the following is the BEST course of action for Sarah if she suspects her mobile device, containing sensitive information, has been stolen?
Inform her colleagues and the IT department about the missing device
So they can remotely wipe the device and store stuff
Which of the following features in a file system prevents loss of data during power failure?
Journaling
What device converts data from a digital format, suitable for a computer, to a format suitable for transmission over a standard phone line?
Modem
When working with databases, which definition BEST describes a table?
The structure consisting of rows and columns that holds data
What application architecture best utilizes multiple layers and allows for better flexibility and maintainability in a system
n-tier
What is the primary purpose of fields (or columns) in a Database Management System (DBMS)?
They represent specific categories of data in a table
(remember columns are attributes)
Which type of NIC provides network connectivity through physical cables?
Wired NIC
What is the primary difference between the Unicode and ASCII?
Unicode can represent a larger number of characters
while ASCII is limited to a set of 128 characters
What does the task scheduler utility do
Automating tasks
Which of the following is an example of an IP-based peripheral device?
Network Printer
(own IP address)
what is an independent units of software that are responsible for one well-defined task within an operating system and run in the background, often without direct user interaction?
Services
( run in the background)
Which of the following storage type offers web-based access, and can be easily scaled based on requirements?
Cloud storage service
(google drive etccc)
Which control models follow the principle of least privilege which only gives users permissions required for their tasks?
Role-based access control (RBAC)
What’s the difference between a LAN and a WAN?
A LAN connects devices in a single location
WAN connects devices from multiple locations
what is the main purpose of a method within an object in Object-Oriented Programming (OOP)?
To provide a means to interact with and manipulate an object’s data
Which of the following types of malware is designed to conceal itself within seemingly legitimate software
Trojans
Which among the following units is commonly used to measure the processing speed of a computer?
Hertz (Hz)
3.80 GHz cpu
Which factor is important in both subscription and one-time purchase software licenses?
Need for product keys and serial numbers
Continuous updates
Which installation practice helps mitigates compatibility concerns?
Reading instructions
what allows customization of installation
advanced options
What is the difference between a procedure and a function in programming?
A function returns a value
procedure performs actions but does not return a value
What feature of an antivirus software allows users to configure regular system scans at specific times or intervals?
Scheduled scans
Which of the following BEST describes semi-structured data?
Semi-structured data has some organized elements but doesn’t strictly adhere to a tabular format
(Shemedium)
Unauthorized information alteration does what
prevents unauthorized modification or tampering of data within the organization’s systems
What is the primary goal of restoring access during disaster recovery?
To ensure business continuity