database
Cybersecurity
Programming
Computer software
Networking
100

what is a way for programmers and others to make sense of complex business flows?


Data modeling 

100

In which of the following situations should you expect total privacy?


Financial transactions


100

Which of the following describes the declarative programming paradigm?


It uses a domain-specific language (DSL) to instruct the program what needs to be done.


100

Which category of system software provides a platform for application software to run on?


Operating System


100

Which of the following components is NOT required to create a network?


Wireless adapter


200

general term for software that creates and manages databases?


DBMS

200

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?


Delete the email without opening the attachment.


200

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?


JavaScript 

200

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?


Firmware 

200

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?


Modem

300

Which should not be used as a primary key in a table?


First Name 

300

What do biometrics use to perform authentication of identity?


Biological attributes 

300

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?


import random 

300

Which component gets things running until the operating system takes over?

BIOS

300

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

Firewall 

400

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?

Text-based flat file


400

Which of the following protocols can be enabled so email is encrypted on a mobile device?


SSL

400

On a flowchart, which of the following represents a decision?


Diamond

400

You need to test a version of macOS but only have a Windows computer. What technology could you use?


Virtualization

400

What is the biggest benefit to using a DHCP server in a large network?

They save time for the network administrator.


500

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.


Big data 

500

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?


VPN

500

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?


Looping

500

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?


Utility Software


500

Which of the following refers to digital content that is delivered over the internet?


World wide web