Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following computer components allows for communication over a computer network?

A.

RAM

B.

NIC

C.

CPU

D.

NAS

For which of the following is a relational database management system MOST commonly used?

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Which of the following is both an input and output device?

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

On which of the following distinct numbers of digits is the hexadecimal numbering system based?

A.

2

B.

8

C.

10

D.

16

A user is trying to set up a new wireless access point. Which of the following should the user do first?

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?

A.

Identifying the problem

B.

Establishing a plan of action to resolve the issue

C.

Researching the issue

D.

Testing the theory to determine the cause

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.