The concept of COV is a process where device B notifies device A that data has changed by an amount deemed to be significant and it is now time for that data to be transferred from device B to device A. A) True B) False
When a vendor chooses BACnet for a new system design, they must choose only one network type for the entire system. A) True B) False
ABBB will include a collection of one or more services and is useful in the specification of a BACnet compliant system. A) True B) False
This is one or more statements that are always executed after the try block has executed and after any catch blocks have executed if an exception was thrown. try block finally block protected block catch block
You are tasked with setting up a virtualization environment for a team of developers who need to test applications on their existing desktop computers. The developers require the ability to run multiple operating systems simultaneously without replacing their current OS. Which type of hypervisor would be the most appropriate for this scenario? Type1 (Bare Metal Hypervisor) Type 2 (Host-based Hypervisor) Container virtualization Virtual Desktop Infrastructure (VDI)
A cloud administrator configures a cloud instance to increase its resources during times of high utilization and decrease its resources when peak utilization times end. What cloud characteristic does this represent? Scalability HA Metered utilization Rapid elasticity
Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system? A zombie B virus C worm D Trojan horse
What does URL stand for? Uniform Resource Language Understand Resource Language Uniform Resource Locator Ultimate Resource Locator
Choose the correct answer. Each portion of a PowerPoint presentation is an individual __ page slide clip frame
Which key advantages do containers have over virtual machines? (Select two.) Smaller size and may only require a few megabytes Portability between hypervisor environments Hardware optimization Faster start times for containerized applications The ability to.run legacy software on an updated operating system
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product