The computer language that is closest to machine code is:
A. query language
B. scripting language
C. markup language
D. assembly language
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A. Antivirus
B. Anti-malware
C. Device Manager
D. Host firewall
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
A. drawing a value stream map.
B. developing pseudocode.
C. identifying functions.
D. compiling the language.
During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
A. Implement preventive measures.
B. Establish a plan of action.
C. Document findings/lessons learned.
D. Test the theory to determine the cause.
An administrator has found that a server has become corrupted. Which of the following will allow the administrator to recover the data?
A. Server UPS rack
B. Off-site backups
C. OS restore disks
D. Redundant NICs
An administrator must select a data storage program to support an application. The program should include a management system to maintain structured data. Which of the following will the administrator MOST likely use?
A. Relational
B. Spreadsheet
C. NoSQL
D. Flat file
Which of the following is the slowest processing speed?
A. 2.6GHz
B. 5000Kbps
C. 3.4MHz
D. 4Mbps
A user wants to minimize the risk of identity theft when making a purchase from the internet on a non-private computer. Which of the following browser options will most likely address this need?
A. Clearing browser cache
B. Script blocker extension
C. Private browsing
D. Use of a proxy server
A user is having trouble accessing an application. Which of the following should a help desk analyst do first?
A. Determine whether the trouble is an access or a network issue.
B. Check the user's permissions to ensure the user has access.
C. Reset the user's credentials for the application.
D. Document the solution and notify the user.
When working with storage, 1,000,000MB can also be notated as:
A. 0.01PB.
B. 1TB.
C. 100GB
D. 10,000,000KB.