subject

1. Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. What will happen? a .Windows will update the driver.

b. Windows cannot use the driver.

c. Windows will be able to run the driver as is.

d. Windows will run the driver in a compatibility mode.

2. Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive?

a. compression

b. encryption

c. journaling

d. permissions

3. During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of?

a. N- tier

b. wireless

c. cloud-hosted

d. local network hosted

4. In a three-tier application architecture example, which device runs the presentation layer?

a. application server

b. client computer

c. cloud server

d. file server

5. Your friend is on a Windows computer and is unable to open and view the file that you created in the Pages application on your Mac. Which is the best option to ensure that he can correctly view your file? (Note: Your friend does not need to edit the file.)

Copy the text from the file and email to your friend.

Take a picture of the file and send the picture to your friend.

Save the Pages file as a pdf and send the pdf file to your friend.

Retype the document into an application that is compatible with both Windows and Macs.

6. A locally installed application is an example of which application architecture?

N-tier

One tier

Two tier

Three tier

7. Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue?

Clear cache.

Install an add-on.

Remove an extension.

Disable client-side scripting.

Question: 8
You are purchasing a birthday gift for your sister. You both share a computer. How can you hide your searches?

Clear cache.

Turn on proxy settings.

Use private browsing.

Refuse security certificates.

Question: 9
Which of the following are saved even when in private browsing?

Cookies

Bookmarks

Temporary Files

Search Records

Question: 10
You have downloaded a program that can be run on Windows or on macOS. What term is used to describe this type of software?

Cross-platform

Open source

Proprietary Site licensed

Single-platform

Question: 11
Which statement is true about cross-platform software?

It must be open source.

Some features might vary.

It will work the same on every platform.

Some versions will work only in a cloud-based environment.

Question: 13
Which of the following file types would enable an audio file to work on both Windows and macOS?

AIFF

DOCX

MP3

WMA

Question: 14
You’d like to add features to a calendar app with the permission of the vendor without paying any licensing fees. What type of license is required to be able to do this?

Free

Open source

Site license

Subscription

Question: 15
Which of the following security features is put into place to ensure correct authorization?

Password policies

Automatic updates

Account permissions

Multi-factor authentication

Question: 16
An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert?

Antivirus Software

Data Backup

Operating System Patch

Software Update

Question: 17
You’ve been asked to filter and block certain sites for your younger sister. Which of the following can be used to filter which sites are allowed through to the browser?

cache

client-side scripting

private browsing mode

proxy settings

Question: 18
You notice that your browser is running a bit slow. Which of the following settings could be changed in order to increase your browsing speed?

Cache is enabled.

Pop ups are disabled.

Proxy settings are used.

Client-side scripting is disabled.

Question: 19
You are using the terminal to move through your computer’s folders. You’d like to get into the Cybersecurity folder. You type in pwd and find that your current folder path is ~/Users/student/Documents/Cybersecu rity/Images. Which of the following commands will place you inside the Cybersecurity folder?

cd ..

mv ..

cd Cybersecurity

mv Cybersecurity

Question: 20
Your computer is running slowly and you believe it is because of a program that is running in the background. Which terminal command will allow you to see all of the running programs and applications on your computer?

dir

kill

ls

ps

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 22:00
Formula that contains a nested function that first calculates the average of the values in range e6: p6 and uses the round function to round that average to the nearest 10 dollars. use -1 for the value of the number digit argument. would the formula be =round(average(e6: p6),0
Answers: 1
question
Computers and Technology, 23.06.2019 05:00
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most?
Answers: 2
question
Computers and Technology, 23.06.2019 12:00
Which of these is an example of an integrated presentation? a. a table created in powerpoint b. an image pasted into powerpoint c. a caption created in powerpoint d. an excel chart pasted into powerpoint
Answers: 1
question
Computers and Technology, 24.06.2019 00:00
The gene form of a trait is called a(n) 
Answers: 2
You know the right answer?
1. Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. Wha...
Questions
question
Chemistry, 30.10.2019 23:31
question
Mathematics, 30.10.2019 23:31
question
Mathematics, 30.10.2019 23:31
question
Mathematics, 30.10.2019 23:31
Questions on the website: 13722363