2.0 Infrastructure
3.0 Apps and Software
4.0 Software Development
5.0 Data and Databases
6.0 Cybersecurity
100

Which of the following is a GPU an example of?

Processing

100

What AI type is used for predictive text?

Generative

100

What is an Integer?

Whole Number

100

What is a key characteristic of the Primary Key?

Must be unique
100

A user finds a USB device and plugs it into a laptop. The laptop does not detect the USB device. Which of the following is the most likely cause of this issue?

Disabled port or USB Lock

200

Which of the following is a GPU an example of?

NvME

200

A user wants to graphically depict the steps of a process. Which of the following types of software should the user utilize?

Diagramming

200

What could be a letter, number, or symbol?

Character (Char)

200

An employee is working on a database and wants to retrieve specific information. Which of the following should the employee use?

Query 

200

A technician is reviewing log files to track the number of times that a specific user has logged on to the networks. Which of the following security concepts is being used?

Accounting

300

Which of the following device categories includes smart thermostats?

IoT (Internet of Things)

300

A user wants to use virtualization on a local workstation. What best describes the technology that will be used?

Hypervisor 

300

A user is creating a simple, static web page. Which of the following language types should the user use?

Markup Language

300

Given the following pseudocode:

 

SELECT row FROM table WHERE column EQUALS value

Query

300

A user is logged in but unable to access a shared folder on the network. Which of the following security concepts is in place?

Authorization

400

Which of the following is commonly used to measure the RAM capacity of a smartphone?

GB

400

A user downloads an application from a website and intends to modify the application's code. What license types does the user need for this task?

Open-Source

400

Which of the following is used to create a repetitive process within code?

Loop

400

A database administrator created a database and identified an internal reference field that does not allow duplicate values. Which of the following did the administrator create?

Primary Key 

400

Which of the following is used to securely transfer files over the internet?

Encryption

500

A user's device is experiencing slow processing performance when multiple applications are running at the same time. Which of the following components is causing this issue?

RAM

500

A systems administrator requires access to a user’s laptop over a VPN for troubleshooting. Which of the following software types should the systems administrator use?

Remote Assistance

500

Given the following pseudocode:

10 FOR Q=0 to 10

20 PRINT Q

30 NEXT Q

40 EXIT

Which of the following does the code best represent?

Loop

500

Which of the following can help an organization better understand a large amount of its data?

Big Data

500

A user needs to securely access a remote network from home. Which of the following should the user utilize for secure remote access?

VPN