database object that is essentially questions that we can ask the database?
Queries
Shoulder surfing and Dumpster diving are common forms of what?
Social engineering
Multiple computers configured to be able to communicate and share information with each other form a ____________.
Network
Databases, authentication, and user accounts are all part of a website's ______________.
Backend
On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment?
Settings
Formatted summary of information from a database.
Report
What kind of online attack involves pretending to be a legitimate company to get sensitive information?
Phishing
What connectors are used to terminate a Cat 5e and Cat 6a network cable?
RJ-45
Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.
Frontend
What dropdown menu command makes an application shortcut appear on the taskbar?
Pin to taskbar
Stores raw data in a relational database.
Table
What is the best countermeasure against social engineering?
User awareness training
What physical connection would you MOST likely use to connect a digital camera to a computer in order to transfer files?
USB
David is creating a cross-platform program using Python. Which of the following language types is Python?
Query
Interpreted
Markup
Compiled
Interpreted
Timothy is using a computer that's running a Windows OS. He wants to rename a file on his local hard drive. Which of the following tools should he use?
File Explorer
User-friendly interface for adding to or retrieving information from a database.
Form
An attacker intercepts communications between two network hosts by impersonating each host. This Describes what attack?
Man-in-the-Middle attack
Which of the following wireless technologies requires a distance of approximately 4 cm (1.5 inches) in order to establish a communications link between devices?
NFC
Which language type BEST describes Java?
Compiled
What category of system software provides a platform for application software to run on?
Operating System
Retrieves specific information from a database. Can also be used to update, edit, and delete information.
Query
What do cybercriminals frequently use to alter or compromise data integrity?
Malware attacks
2.4 GHz radio wireless and Ad hoc connections are characteristics of?
Bluetooth
A software developer is working on a website and has been tasked with adding interactive elements to it. What programming language would work BEST for this task?
JavaScript
Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC?
Task Manager