Clicking the Save button always saves a file to the hard drive. Yes No
A standard account gives you full access to add other accounts on the operating system. yes No
In order to run a program's source code.it must be translated into machine language. a. True b. False
On a desktop or laptop computer, you should uninstall a program or app by using your system's file management program to delete the folder containing the program's files. a. True b. False
Current Attempt in Progress Which of the following descriptive mining methods might be used to discover unexpected or atypical associations? Linear Regression Association Analysis Discriminant Analysis Association Analysis LDA
What would the body language or body posture be for a "Computer"? "I'm helpless" posture "I'm off somewhere else,doing my own thing posture "I'm calm, cool and collected" posture "I'm the boss with the power" posture
What is recommended for data that is being transmitted electronically? Only send on WiFi do not use wireless data That it be equipped with password protection Encrypt all data Check the file path when sharing
Mobile device management (MDM)provides the ability to do which of the following? Track thể device. Update apps as needed. Control data access. Remotely install apps.
Which method do you use to retrieve the error message from an exception object? getMessage getError retrieveError printError
Which keyword causes an exception to be created? throw throws try catch
Qué aplicación utilizamos para procesar textos? Calculadora Paint Microsoft : Word ) Todas las anteriores
What is the process of coding messages or information in such a way that only authorized parties can read it called? Encryption Phishing Podcasting Spoofing
True or False: If a Key Carrier is busy , it is okay for a Key Carrier to lend their key to a part-times Sales Associate so they can complete a specific register function. True Ealse
Computers only understand 2 states right and left on and off yes and no right and wrong
What is the function of the Domain Name System (DNS)? To sell website names to web developers To translate domain names into IP addresses To make sure that each IP address has one corresponding domain name To assign a unique domain name to every computer
Humidity Sensor Circuit 5. Create a truth table that captures the functionality of this room monitoring 6. Using the truth table that you just created, write the unsimplified logic expression for the ALERT light.
__ is a more sophisticated form of phishing in which the attacker gathers more information about the CHOOSE AN OPTION BELOW targets before attempting to scam them. Phishing Spear phishing Vishing All of these
Question 3 If the $IPV4CIDR$ address is $73.0.5.0/17$ how many bits are reserved for the host address? 17 32 16 15
Task 2 Incident Handling Plan Create an incident handling plan for the selected attack from the top 100 B $\square $ Space used(includes formatting): 0/30000
Matching 2 points Match the definition on the left to the correct term on the right: A(n) __ disappointed is a program that translates programs to a simpler language that the computer can execute. The __ is a program that supervises operation of the entire computer. $\square $ memory operating system processor algorithm The __ is the part of a computer that follows instructions.