Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which item information should be stored in a database to determine a student's previous academic year's course load?

A.

Course level

B.

Course grade

C.

Course identification number

D.

Course name

What is a common characteristic of a proprietary software license?

A.

A business gains the right to distribute the software freely.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to modify the software's source code.

Which method is frequently used to protect software?

A.

Copyrights

B.

GNU General Public License

C.

Fair use

D.

Trademarks

Which computing term describes a collection of hardware and software components that work together to meet the needs of the user?

A.

A hard drive

B.

An operating system

C.

A computer system

D.

A motherboard

What is a step for considering risk during the planning phase of project management?

A.

Prioritizing by severity and likelihood

B.

Comparing project progress to milestones

C.

Listing each possible cause of failure

D.

Establishing clear and attainable goals

What is a component of disaster recovery strategies?

A.

Service variety

B.

User authentication

C.

Parallel processing

D.

Off-site storage

What is one example of a professional organization in the IT industry?

A.

National Security Agency NSA

B.

Institute for Telecommunication Sciences ITS

C.

Federal Communications Commission FCC

D.

Computer Professionals for Social Responsibility CPSR

Which two actions are included in the role of a Domain Name System (DNS)?

Choose 2 answers

A.

Stores IP addresses and aliases in a table on the server

B.

Transfers files between TCP/IP servers on the web

C.

Enables telnet communication between clients and servers

D.

Translates human-friendly aliases into IP addresses

Which piece of network equipment extends the cable range and allows connections to be made by increasing the signal strength?

A.

Switch

B.

Repeater

C.

Router

D.

Firewall

How can the organizational culture support ethical guidelines?

A.

By outlining the protocols to support security and privacy of data

B.

By creating the system requirements for computers in the organization

C.

By creating the government regulations that apply to the organization

D.

By outlining the roles of IT specialists in the organization