A systems administrator wants to return results for a time range within a database. Which of the following com
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? A. SELECT B. INSERT C. DELETE D. UPDATE
Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record? A. Foreign key B. Public key C. Primary key D. Private key
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following actions is the FINAL step in the standard troubleshooting methodology? A. Document the solution and cause. B. Create a new theory of cause. C. Research the problem online. D. Implement preventive measures.
Which of the following is a compiled language?
Which of the following is a compiled language? A. Perl B. JScript C. Java D. PowerShell
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and v
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: A. a storage area network. B. an embedded OS. C. network attached storage. D. a Type 1 hypervisor.
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. Th
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? A. Encryption B. Compression C. Permissions D. […]
Which of the following relational database constructs is used to ensure valid values are entered for a column?
Which of the following relational database constructs is used to ensure valid values are entered for a column? A. Schema B. Permissions C. Constraint D. Column
A user is attempting to print a document to a wireless printer and receives an error stating the operation cou
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue? A. Ensure both devices are connected to the LAN. B. Enable task scheduling. C. Reset the proxy settings to their […]
A user is getting an error message when trying to go to a website. A technician asks the user a few questions
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by […]
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of th
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? A. Update from 802.11b to 802.11g. B. Ensure sources of EMI are removed. C. Enable WPA2-Enterprise. D. Use WiFi Protected Setup.