subject

1. Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. What will happen? a .Windows will update the driver.

b. Windows cannot use the driver.

c. Windows will be able to run the driver as is.

d. Windows will run the driver in a compatibility mode.

2. Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive?

a. compression

b. encryption

c. journaling

d. permissions

3. During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of?

a. N- tier

b. wireless

c. cloud-hosted

d. local network hosted

4. In a three-tier application architecture example, which device runs the presentation layer?

a. application server

b. client computer

c. cloud server

d. file server

5. Your friend is on a Windows computer and is unable to open and view the file that you created in the Pages application on your Mac. Which is the best option to ensure that he can correctly view your file? (Note: Your friend does not need to edit the file.)

Copy the text from the file and email to your friend.

Take a picture of the file and send the picture to your friend.

Save the Pages file as a pdf and send the pdf file to your friend.

Retype the document into an application that is compatible with both Windows and Macs.

6. A locally installed application is an example of which application architecture?

N-tier

One tier

Two tier

Three tier

7. Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue?

Clear cache.

Install an add-on.

Remove an extension.

Disable client-side scripting.

Question: 8
You are purchasing a birthday gift for your sister. You both share a computer. How can you hide your searches?

Clear cache.

Turn on proxy settings.

Use private browsing.

Refuse security certificates.

Question: 9
Which of the following are saved even when in private browsing?

Cookies

Bookmarks

Temporary Files

Search Records

Question: 10
You have downloaded a program that can be run on Windows or on macOS. What term is used to describe this type of software?

Cross-platform

Open source

Proprietary Site licensed

Single-platform

Question: 11
Which statement is true about cross-platform software?

It must be open source.

Some features might vary.

It will work the same on every platform.

Some versions will work only in a cloud-based environment.

Question: 13
Which of the following file types would enable an audio file to work on both Windows and macOS?

AIFF

DOCX

MP3

WMA

Question: 14
You’d like to add features to a calendar app with the permission of the vendor without paying any licensing fees. What type of license is required to be able to do this?

Free

Open source

Site license

Subscription

Question: 15
Which of the following security features is put into place to ensure correct authorization?

Password policies

Automatic updates

Account permissions

Multi-factor authentication

Question: 16
An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert?

Antivirus Software

Data Backup

Operating System Patch

Software Update

Question: 17
You’ve been asked to filter and block certain sites for your younger sister. Which of the following can be used to filter which sites are allowed through to the browser?

cache

client-side scripting

private browsing mode

proxy settings

Question: 18
You notice that your browser is running a bit slow. Which of the following settings could be changed in order to increase your browsing speed?

Cache is enabled.

Pop ups are disabled.

Proxy settings are used.

Client-side scripting is disabled.

Question: 19
You are using the terminal to move through your computer’s folders. You’d like to get into the Cybersecurity folder. You type in pwd and find that your current folder path is ~/Users/student/Documents/Cybersecu rity/Images. Which of the following commands will place you inside the Cybersecurity folder?

cd ..

mv ..

cd Cybersecurity

mv Cybersecurity

Question: 20
Your computer is running slowly and you believe it is because of a program that is running in the background. Which terminal command will allow you to see all of the running programs and applications on your computer?

dir

kill

ls

ps

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:00
When is an original work considered public domain? a. when posted via social media b. when it is posted on the internet c. when a copyright symbol is not included with the piece of work d. when explicit permission is given by the author / owner
Answers: 1
question
Computers and Technology, 22.06.2019 19:30
The following is an excerpt from a slide presentation. today we will inverse operations solving equations using inverse operations solving inequalities using inverse operations from which part of the presentation does the slide most likely come from? a. introduction b. outline c. body d. conclusion
Answers: 1
question
Computers and Technology, 23.06.2019 09:30
Write a function called checkfactor that takes two arrays of positive numbers, firstnumberrow and secondnumberrow. checkfactor checks if the first entry in firstnumberrow is divisible by the first entry in secondnumberrow, and performs the same operation on the next array elements until all entries have been checked. all the numbers are positive and the number of entries in the arrays are the same. the function should return the identified divisible numbers in two row arrays named firstdivisible and seconddivisible.restrictions: branches or loops should not be used. the code must use the internal mod and logical functions.hint: the mod function should be used to determine if two numbers are divisible. ex: for num1 and num2 if mod(num1,num2) is 0, then the two numbers are divisible.this is matlab
Answers: 2
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. peter has launched a website that features baby products. however, clients often find they are unable to access the website because the server is down. which feature of cybersecurity should peter focus on for his website? a. data authenticity b. data privacy c. data availability d. data integrity e. data encryption
Answers: 3
You know the right answer?
1. Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. Wha...
Questions
question
Computers and Technology, 24.02.2021 18:00
question
Mathematics, 24.02.2021 18:00
question
Mathematics, 24.02.2021 18:00
Questions on the website: 13722361