Which of the following are the basic computing operations?
A.
Input, process, output, and feedback
B.
Input, output, storage, and feedback
C.
Input, process, and output
D.
Input, process, output, and storage
Input, process, output, and storage
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A.
Patent
B.
Trademark
C.
Watermark
D.
Copyright
Copyright
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A.
Update from 802.11b to 802.11g.
B.
Ensure sources of EMI are removed.
C.
Enable WPA2-Enterprise
D.
Use WiFi Protected Setup.
Ensure sources of EMI are removed.
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
A.
Loop
B.
Variable
C.
Constant
D.
Function
Variable
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A.
Schema
B.
Permissions
C.
Constraint
D.
Column
Constraint
Page 4 out of 15 Pages |
Previous |