Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
A. Laptop
B. Workstation
C. Mobile phone
D. Server
Which of the following are the basic computing operations?
A. Input, process, output, and feedback
B. Input, output, storage, and feedback
C. Input, process, and output
D. Input, process, output, and storage
Which of the following is MOST likely used to represent international text data?
A. ASCII
B. Octal
C. Hexadecimal
D. Unicode
Which of the following is an example of multifactor authentication?
A. Password and passphrase
B. Fingerprint and retina scan
C. Hardware token and smartphone
D. Smart card and PIN
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
A. Cellular
B. Satellite
C. Cable
D. Fiber
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
A. confidentiality concerns.
B. accounting concerns.
C. integrity concerns.
D. availability concerns.
Which of the following should be used to store a list of strings?
A. Array
B. Constant
C. Variable
D. Branch
Which of the following has the longest range?
A. NFC
B. Bluetooth
C. WiFi
D. Infrared
A company wants a solution with an easily searchable method of storing information and files associated with a customer. Which of the following should be used to implement this business case?
A. Flat file
B. Fileshare
C. Database
D. Spreadsheet
The data set that is supporting an application utilizes commas to separate records. Which of the following describes the data set?
A. Relational
B. Flat file
C. NoSQL
D. Spreadsheet