Sending or using more information than is necessary to handle an issue or concern is an example of what kind of security incident? Inappropriate access Loss of confidential information Inappropriate use Inappropriate receipt Malicious code
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly? A plug-in A flash drive A peripheral An attachment
A touch screen is classified as a special type of scanning device. false true
In MakeCode Arcade, what does each character in a set of data for an image represent? A. One pixel B. One condition C. One variable D. One full image
What is NOT determined by the computer's video card? Screen resolution options Number of colors used to display image Image format that the image is saved Number of monitors that can be connected to the computer
In a relational database for vehicles, a __ relationship occurs when each vehicle record may link to several repair records.but each repair can link to only one vehicle. A. simple query B. one-to-many C. many-to-many D. one-to-one
P2P networks are normally found in __ A. libraries B. universities C. corporations D. homes
Your organization is issued the IPv6 prefix of 2001:db8:130f:48 by your service provider.With this prefix, how many bits are available for your organization to create 164 subnetworks if interface ID bits are not borrowed? 128 8 80 16
You want to check a server for user accounts that have weak passwords. Which tool should you use? Retina Nessus OVAL John the Ripper
You use CSS to to specify the appearance of content on a webpage. False True
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product
Question 7 Unity can be used to create which of the following? Games Animations VR Applications Mobile Applications