Select the correct answer. Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio? A. WMV B. MP3 C. JPEG D. MP4
When users store data on remote servers and access and share data through the internet, which storage method are they most likely using? A. Flash storage B. Networking storage C. DRAM storage D. Cloud storage
In what medium do web applications operate? Select one: ) Internet Telepresence Cloud Browser
def mystery (x,y) : return y+y result=mystery(3,2) print(result) square
Which statement about Rule-Based Access Control is true? a. It requires that a custodian set all rules. b. It dynamically assigns roles to subjects based on rules. c. It is considered a real-world approach by linking a user's job function with security. d. It is no longer considered secure.
What is the purpose of a choke point in a screened subnet configuration? To allow unrestricted access between the perimeter network and the LAN To facilitate better access control and easier monitoring To provide a direct connection to the Internet To eliminate the need for internal firewalls
Words that when clicked on can link to another website are called: a. protocols b. browsers c. hyperlinks d. explorer
Which of the following is not a comparison (relational) operator in Python 3? != o gt = ==
Computer Vocabulary.Question 3 of 4 What is the program you need to look at Web sites? A. both B. el explorador de Web C. el navegador
Construct the truth table for the following Boolean statements. 4. Clean your room and have a snack.
These two are not the same. Why not? The first tells the compiler to not check the parameter types at all. The second tells the compiler to not check the parameter types at all.
__ languages are fifth generation programming languages. Task-Oriented Problem and Constraint High-Level Procedural
What type of error occurs when a program is expecting an integer value and the user enters a string? NumberError ValueError InputError ZeroDivisionError
Louis has been tasked as the lead IT technician to setup a way to secure the company's data on the hard disk of the main macOS Desktop. They have requested it be a form of encryption that can only be accessed by logging in with a password or using a recovery key. What would allow Louis to secure the company data following the given requirements? FileVault Disk Utility Keychain Time Machine
Cesar is setting up his new MacBook for his job as a Service Desk Technician. He would like to setup his laptop in a way that would allow him to view and use another desktop. He uses the trackpad and swipes up using four of his fingers revealing the option that he wanted to use. What feature is Cesar using to have several desktops setup? Safe Mode Keychain Mission Control Software Update
A developer wishes to link to a database with a utility created in C. Which MySQL component does the developer use for the link? Connector API Command-Line Workbench
Algorithms are always complex. (1 point) True False
4. What did you do to verify the Windows Defender Policy configurations for Client1, Client2 and Client3?
35. What is a dictionary in Python and how is it different from a list? 36. Create a dictionary to store a person's name, age, and city.
Which of the following are accurate in regard to Linux? APPLY Linux has a reputation as an unstable OS. Linux is a free open source OS. Linux is for personal computers as well as web servers. Linux needs admin approval to be updated. Linux began in 2009.