What is the CPU?
Runs software programs. Software is comprised of many simple instructions. It is also reference or known as the “brains”
What does the computer software do for your computer
It tells the computer how to work and allows the computer to communicate with the user.
Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?
Prioritization
A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?
Primary key.
A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?
JavaScript
Robert is deciding between getting an HDD or an SSD. Which storage types should he get if he wants faster speeds?
SSD.
What's the difference between a firewall and an antivirus?
A firewall is a security network that can be either hardware or software, or both, and is meant to protect computer systems and networks from harmful intrusions. Antivirus is a software utility application that protects a system against internal attacks such as viruses, trojan horses, spyware, and so on.
Why is it better to use a credit card than a debit card for online purchases?
Credit cards have better fraud protection.
Patricia, a database system manager for a large hotel chain, is setting up a relational database to track customer hotel registrations for each hotel. The table in the database currently includes fields (columns) for First Name, Last Name, Phone, Email, License Plate #, and Check-in Date.
What can Patricia do to make sure that each record (row) in the database is unique?
Create an additional Check-in ID.
What is the term for code that keeps running as long as a certain condition is met?
While loop
What are the parts needed for a PC? (multiple answers).
Monitor.
Motherboard.
Keyboard.
Mouse.
CPU
What are the two types of computer software?
Commercial and Open Source
An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. What should the accountant use to send the email?
Cipher Text
Which data type uses historical data to make decisions in the present?
Analytical
Which of the following logic components is being used and how much is the interest if the amount is 5,000?
Branching, and 8%
Missing slot covers on a computer cause what?
Overheating problems
What is Application Software?
Software that allows users to perform specific task on their computers.
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Accounting
April is a database manager who wants to insert some new records (rows) into the company's customer contact database. Instead of using a database client to insert the records, she wants to use a command.
Which of the following languages provides a command for inserting records into a database?
DML (Data Manipulation Language)
A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?
JavaScript
Which connector on the back of a computer is used to attach a mouse to a modern PC system?
USB A
A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?
Use Task Manager to end task
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Delete the email and ignore the attachments.
A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?
Programmatic access
Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?
Algorithm