One thousand bytes equals this measure.
What is a kilobyte?
The best application type for maintaining sales records and customer information for constant updates by multiple users
What is a database?
The primary purpose of a UPS is to protect against these.
What are power outages?
The time it takes to transfer a data packet from one computer to another.
What is latency?
These three properties make up the CIA Triad.
Confidentiality, Integrity, Availability
The FINAL step in the standard troubleshooting methodology
What is Documenting the solution
What is copyright?
This kind of wireless communication requires devices to be within six centimeters (2 inches) of each other to transfer information.
What is NFC?
These network protocols are used when receiving email on the internet.
What are IMAP and POP3?
This application should be installed to seek out and remove malicious software.
What is Antivirus?
A notational system used to represent an “on” or “off” state
What is binary
This software licensing model allows someone to modify the original code and release their own version of an application.
What is open source?
This device allows wireless devices to communicate to a wired network.
What is a wireless access point?
This standard is best for securing a wireless network.
What is WPA2?
This security model requires the administrator to configure permissions based on a user's position within the organization.
What is role-based access?
Reusable segment of code that returns a value.
What is a function?
This kind of software application makes use of the SMTP protocol.
What is email?
These connectors are found at the end of twisted pair network cables.
What are RJ-45?
This computing device provides a centralized means of distributing web services to clients on a LAN.
What is a server?
A shortened representation of data used to prove that a message has not been tampered with.
What is a cryptographic hash?
This programming command causes an action to continue as long as a condition is TRUE.
What is FOR...WHILE?
What is a constraint?
This program interacts directly with hardware to manage storage, networks, and virtual machines.
What is a Type 1 hypervisor?
This network component connects computers in an Ethernet LAN using network ports and cabling.
What is a switch?
Antivirus applications use these to identify malware and prevent it from executing (two items).
What are signatures and heuristics?