what is a way for programmers and others to make sense of complex business flows?
Data modeling
In which of the following situations should you expect total privacy?
Financial transactions
Which of the following describes the declarative programming paradigm?
It uses a domain-specific language (DSL) to instruct the program what needs to be done.
Which category of system software provides a platform for application software to run on?
Operating System
Which of the following components is NOT required to create a network?
Wireless adapter
general term for software that creates and manages databases?
DBMS
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Delete the email without opening the attachment.
A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?
JavaScript
Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?
Firmware
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
Modem
Which should not be used as a primary key in a table?
First Name
What do biometrics use to perform authentication of identity?
Biological attributes
Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?
import random
Which component gets things running until the operating system takes over?
BIOS
Which of the following is the best device to deploy to protect your private network from an untrusted public network?
Firewall
An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?
Text-based flat file
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
On a flowchart, which of the following represents a decision?
Diamond
You need to test a version of macOS but only have a Windows computer. What technology could you use?
Virtualization
What is the biggest benefit to using a DHCP server in a large network?
They save time for the network administrator.
The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.
Big data
Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?
VPN
Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?
Looping
Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?
Utility Software
Which of the following refers to digital content that is delivered over the internet?
World wide web