A user wants to access books and does not need printed, physical copies. The solution should be portable and lightweight. Which of the following is the best solution?
A systems administrator requires access to a user’s laptop over a VPN for troubleshooting. Which of the following software types should the systems administrator use?
A user is reviewing the following data set:

Which of the following is this data set an example of?
A user finds a USB device and plugs it into a laptop. The laptop does not detect the USB device. Which of the following is the most likely cause of this issue?
Which of the following should be checked to ensure a user is authenticated by a web server?
An employee is working on a database and wants to retrieve specific information. Which of the following should the employee use?
A database administrator creates a new database and assigns the primary key. Which of the following database types has the administrator created?
A user is configuring a server OS. Which of the following should the user do after setting up the system?
Which of the following is used to terminate a Cat 6 cable to an RJ45 connector?
A user is unable to load the most recent version of a web page. The old page loads each time the screen is refreshed. Which of the following would the user most likely do to resolve the issue?
A developer creates the following code:
If the light is red, then stop
Else if the light is green, then go
Which of the following programming concepts is the developer using?
Which of the following internet service types is delivered using an SFP connector?
A user needs to transfer a 100GB data file to a coworker, but the network is down. Which of the following should the user most likely use instead?
Which of the following is used to measure the speed of an internet connection?
Which of the following units of measurement is used when describing a gaming monitor?
An application stops working after 30 days and then prompts the user to input some information. Which of the following will fix this issue?
A user receives a notification about a new software vulnerability. Which of the following is the best way to secure the software?
Given the following pseudocode:
10 FOR Q=1 TO 100
20 PRINT Q
30 NEXT Q
40 EXIT
Which of the following best represents line 10?
A programmer wants to write code that will be more efficient when executed at runtime. Which of the following language types should the programmer use?
A user needs to securely access a remote network from home. Which of the following should the user utilize for secure remote access?
A user's internet speed is slow. The user logs in to the router's administrator portal and sees that unauthorized devices are connected to the network. Which of the following actions should the user take to prevent unauthorized use of the network?
Which of the following types of programming languages uses tags rather than code?
A development team needs a coding environment that is easy to manage. Which of the following services best meets this requirement?
A user attempts to log in to a website and receives a prompt to update their password. Which of the following is this an example of?
A user is trying to view a report via a hyperlink on a website. When the user clicks on the hyperlink, nothing happens. Which of the following must be configured to view the report?
Which of the following is the best example of protection against social engineering?
Which of the following can best protect a computer when an infected file has been downloaded?
All relational databases utilize unique identifiers. Which of the following is the best term for an identifier?
Which of the following is the last tool that should be used when creating a custom-length network cable?
Which of the following programming languages can be used to package a program?