Sending or using more information than is necessary to handle an issue or concern is an example of what kind of security incident? Inappropriate access Loss of confidential information Inappropriate use Inappropriate receipt Malicious code
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly? A plug-in A flash drive A peripheral An attachment
A touch screen is classified as a special type of scanning device. false true
In MakeCode Arcade, what does each character in a set of data for an image represent? A. One pixel B. One condition C. One variable D. One full image
What is NOT determined by the computer's video card? Screen resolution options Number of colors used to display image Image format that the image is saved Number of monitors that can be connected to the computer
In a relational database for vehicles, a __ relationship occurs when each vehicle record may link to several repair records.but each repair can link to only one vehicle. A. simple query B. one-to-many C. many-to-many D. one-to-one
P2P networks are normally found in __ A. libraries B. universities C. corporations D. homes
Your organization is issued the IPv6 prefix of 2001:db8:130f:48 by your service provider.With this prefix, how many bits are available for your organization to create 164 subnetworks if interface ID bits are not borrowed? 128 8 80 16
You want to check a server for user accounts that have weak passwords. Which tool should you use? Retina Nessus OVAL John the Ripper
You use CSS to to specify the appearance of content on a webpage. False True
Click to add title How can you add a frame to a picture in Word? A. type "frame" B. Double click the picture, then the "frame"menu appears C. Drag the picture into the frame options window D. none of the above
How do you add copyright information when exporting an image from Photoshop? A By saving the image as a JPEG B By adding metadata in the File Info section before exporting C By embedding a watermark in the image D By flattening the image before exporting
Extra credit: a. Write a Python function called count lowercase()that takes a string as an argument and counts and returns the number of lowercase characters in the argument. b.Write a Python function called count digit() that takes a string as an argument and counts and returns the number of digits in the argument. c. Use the functions in part a. and part b. above to write a Python statement that can be used to validate a password where the password should have at least one lowercase character and one digit.
Complete the sentence. Solid-state storage uses $\square $ to store data. lasers sound magnetic polarity
Click on the correct term that fills in the following statement: I can download a paper format template from which of the following locations $\square $
Lake LazyDays The activities director at Lake LazyDays Resort wants to suggest appropriate activities to guests based on the weather: temp 80 or over:swimming temp 60-79: tennis temp 40-59: golf temp <40: skiing public String getAcsivity/in;temp Scring activity; // Decision structure to assign activity return activity based on the chart? Which decision structure would be best for determining the value of activity 1 point switch if if,else if..else (cascade) if..else
Question 6 (3.5 points) What is the best website to fingerprint a restricted website? a) www.archive.com b) www.alexa.com c) Yesware d) Netcraft
__ is used to add modify and delete data. Data Management Language Data Definition Language Data Control Language Data Manipulation Language
Which technology enables information to be synced,, shared, and accessed at any time by a device connected to the Internet? ) Social media ) Artificial intelligence Autonomous technology ) Cloud computing
If you want a sprite to travel straight down in App Inventor, what number will you use as the Heading property value? A 180 B 0 C None of the above values D 270 E 90