Not all computers can be affected by spills,some computers are spill proof. True False
Software do not require updates, once you install a software/application, you are set. True False
What if your computer does not have ability to connect to WiFi what can you do? Select all that apply Use an internet cable Use a WiFi Adapter Buy another computer Get it Serviced
Select the correct answer from each drop-down menu. Which tool performs the features described in the text? The square is a free-form selection tool. You can use the square tool to darken areas of the image. square marquee lasso
A smart thermostat can accomplish which of the following? Select all that apply. A. detect room occupancy B. receive instructions from a smartphone app C. unlock your front door D. adjust room temperature based on the weat outside
Which of the following are good practices when making passwords Select all that apply.
Which of the following are clues that a phone call may be a voice phishing attack?Select all that apply.
Vivian just received a voicemail asking for her username and password, in order for the IT department to add new software to her computer. What should she do?
13. In a communication system which among the following convert messages into packets that can travel across the communication channel? Connection devices Sending and receiving devices Storage devices Secondary devices
A user-defined type is defined in terms of a __ type. complex simple built-in base
These two are not the same. Why not? The first tells the compiler to not check the parameter types at all. The second tells the compiler to not check the parameter types at all.
__ languages are fifth generation programming languages. Task-Oriented Problem and Constraint High-Level Procedural
What type of error occurs when a program is expecting an integer value and the user enters a string? NumberError ValueError InputError ZeroDivisionError
Louis has been tasked as the lead IT technician to setup a way to secure the company's data on the hard disk of the main macOS Desktop. They have requested it be a form of encryption that can only be accessed by logging in with a password or using a recovery key. What would allow Louis to secure the company data following the given requirements? FileVault Disk Utility Keychain Time Machine
Cesar is setting up his new MacBook for his job as a Service Desk Technician. He would like to setup his laptop in a way that would allow him to view and use another desktop. He uses the trackpad and swipes up using four of his fingers revealing the option that he wanted to use. What feature is Cesar using to have several desktops setup? Safe Mode Keychain Mission Control Software Update
A developer wishes to link to a database with a utility created in C. Which MySQL component does the developer use for the link? Connector API Command-Line Workbench
Algorithms are always complex. (1 point) True False
4. What did you do to verify the Windows Defender Policy configurations for Client1, Client2 and Client3?
35. What is a dictionary in Python and how is it different from a list? 36. Create a dictionary to store a person's name, age, and city.
Which of the following are accurate in regard to Linux? APPLY Linux has a reputation as an unstable OS. Linux is a free open source OS. Linux is for personal computers as well as web servers. Linux needs admin approval to be updated. Linux began in 2009.