Databases
Security
Infrastructure
Software Dev
Apps and Software
100

database object that is essentially questions that we can ask the database?

Queries

100

Shoulder surfing and Dumpster diving are common forms of what?

Social engineering

100

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

100

Databases, authentication, and user accounts are all part of a website's ______________.

Backend

100

On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment?

Settings

200

Formatted summary of information from a database.

Report

200

What kind of online attack involves pretending to be a legitimate company to get sensitive information?

Phishing

200

What connectors are used to terminate a Cat 5e and Cat 6a network cable?

RJ-45

200

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.

Frontend

200

What dropdown menu command makes an application shortcut appear on the taskbar?

Pin to taskbar  

300

Stores raw data in a relational database.

Table

300

What is the best countermeasure against social engineering?

User awareness training

300

What physical connection would you MOST likely use to connect a digital camera to a computer in order to transfer files?

USB

300

David is creating a cross-platform program using Python. Which of the following language types is Python?

Query

Interpreted

Markup

Compiled

Interpreted

300

Timothy is using a computer that's running a Windows OS. He wants to rename a file on his local hard drive. Which of the following tools should he use?

File Explorer

400

User-friendly interface for adding to or retrieving information from a database.

Form

400

An attacker intercepts communications between two network hosts by impersonating each host. This Describes what attack?

Man-in-the-Middle attack

400

Which of the following wireless technologies requires a distance of approximately 4 cm (1.5 inches) in order to establish a communications link between devices?

NFC

400

 Which language type BEST describes Java?

Compiled

400

What category of system software provides a platform for application software to run on?

Operating System

500

Retrieves specific information from a database. Can also be used to update, edit, and delete information.

Query

500

What do cybercriminals frequently use to alter or compromise data integrity?

Malware attacks

500

2.4 GHz radio wireless and Ad hoc connections are characteristics of?

Bluetooth

500

A software developer is working on a website and has been tasked with adding interactive elements to it. What programming language would work BEST for this task?

JavaScript

500

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC?

Task Manager