need me more brain juice Flashcards
when wanting to implement an application that works solely on the user’s computer. Which type of application architecture model should she select?
One tier
(all elements are integrated)
When wanting to set up a NAS what would you most likely use
Web-based configuration
(for setting up IP etc…)
when wanting to limit the storage space a certain application can use you use what
Disk management
What allows for easier cross-platform programming
Interpreted languages
What describes the purpose of data correlation
Identifying patterns and relationships within a dataset
What is the base-10 system, using ten unique digits (0-9), and serves as the most commonly used numbering system in everyday life and mathematics
Decimal
What is the recommended minimum length of a password for an ordinary user account?
Passwords of 9-12 characters
How does looping and branching components allow the execution flow to be controlled and altered
Looping as it repeats a section of code until a condition is met
Branching allows to be controlled by giving the code different paths
Which step in the troubleshooting methodology involves questioning the obvious?
Establish a theory of probable cause
If having trouble with a certain application but other applications are working fine what could be the problem
Check if its even compatible with his website/ device
In a dense apartment setting, multiple networks operating on the same frequency can cause what
Bad signal
An OS does not do what
Design and create applications
If you want to calculate something that is consistent where would you store it
Constant
(because what you are working with will not change)
What is the difference between a NAS and a File Server
NAS is a standalone device, while a file server requires a separate computer
what is a primary goal of implementing RAID 5
To enable data recovery in case of a single disk failure without losing the whole array
What is accountable for correctly and efficiently assigning memory to applications
Memory management
If you want to access a Geo-Restricted service from abroad what should you do and why
Configure proxy settings
(proxy can disguise the actual location by providing a new IP address)
What is used to verify the integrity of data or a document
Cryptographic hashes
Name some portable and internet-enabled devices to complete tasks on the go
Mobile phones, tablets, and laptops