What software acts as the computer's software administrator by managing integrating, and controlling application software and hardware? Answer a. Operating system b. Anti-malware c. Utility d. Electronic health record e. Telecommunication
Pretexting involves hacking into a system through technical vulnerabilities. True False
Data mining can discover patterns and insights, such as association rules, that are not evident in raw data. True False
Which of the following is the characteristic of a vector image shape? A The image shape has a convex near field. B All of the scan lines originate from a common point of origin. C The image shape is rectangular. D The image shape has a flat top and sloped sides.
eventing Unsafe Conditions Elements for correcting unsafe conditions: #1 H3 square square Recognize Eliminate or Control Evaluate
25. Doctor's Smart Phone Patient information will be protected by: Automatically Office Manager Reception Team Each worker
22. Our Internal database will be protected by: Closing the program when not in use Daily Back -up Storing the program in the Administrator's home Not applicable
What is a loop in programming? A conditional statement A block of code that is executed repeatedly A function definition A data structure
Which of the following are common data types in programming? String Boolean Integer All of the above
Hard disks store and organize files using all the following, except __ blank. tracks sectors cylinders paths
These two are not the same. Why not? The first tells the compiler to not check the parameter types at all. The second tells the compiler to not check the parameter types at all.
__ languages are fifth generation programming languages. Task-Oriented Problem and Constraint High-Level Procedural
What type of error occurs when a program is expecting an integer value and the user enters a string? NumberError ValueError InputError ZeroDivisionError
Louis has been tasked as the lead IT technician to setup a way to secure the company's data on the hard disk of the main macOS Desktop. They have requested it be a form of encryption that can only be accessed by logging in with a password or using a recovery key. What would allow Louis to secure the company data following the given requirements? FileVault Disk Utility Keychain Time Machine
Cesar is setting up his new MacBook for his job as a Service Desk Technician. He would like to setup his laptop in a way that would allow him to view and use another desktop. He uses the trackpad and swipes up using four of his fingers revealing the option that he wanted to use. What feature is Cesar using to have several desktops setup? Safe Mode Keychain Mission Control Software Update
A developer wishes to link to a database with a utility created in C. Which MySQL component does the developer use for the link? Connector API Command-Line Workbench
Algorithms are always complex. (1 point) True False
4. What did you do to verify the Windows Defender Policy configurations for Client1, Client2 and Client3?
35. What is a dictionary in Python and how is it different from a list? 36. Create a dictionary to store a person's name, age, and city.
Which of the following are accurate in regard to Linux? APPLY Linux has a reputation as an unstable OS. Linux is a free open source OS. Linux is for personal computers as well as web servers. Linux needs admin approval to be updated. Linux began in 2009.