Which component gets things running until the operating system takes over?
What is BIOS?
Which of the following is a top cause of motherboard failure?
What is physical damage?
Multiple computers configured to be able to communicate and share information with each other form a ____________.
What is a network?
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
What is accounting?
Which data model focuses on high-level concepts?
What is conceptual?
You need to test a version of macOS but only have a Windows computer. What technology could you use?
What is virtualization?
Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?
What is document findings/lessons learned, actions, and outcomes?
Which of the following provides services to hosts on its network?
What is a server?
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?
What is multifactor authentication?
Which data type uses historical data to make decisions in the present?
What is analytical?
If you select a file on your desktop and delete it, what happens to the file?
It is moved to the recycle bin.
If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?
What is full control?
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
What is ethernet?
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
What is a power outage?
What is the general term for software that creates and manages databases?
What is DBMS?
Designations at the end of file names such as .docx and .html are called _____________.
What are file extensions?
Which of the following is often the hardest part of troubleshooting
What is reproducing the problem?
Which of the following is used on a wireless network to identify the network name?
What is an SSID?
What do biometrics use to perform authentication of identity?
What is biological attributes?
Which type of analytical data can help you make investment decisions?
What is market?
Which of the following operating systems require a file extension to execute a program?
What is windows?
Which of the following has the ability to store user data even if the power to the computer is off?
What is hard drive?
Which network type uses a coaxial cable to receive its signal?
What is cable?
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Delete the email without opening the attachment.
Which database object is essentially questions that we can ask the database?
What is queries?