Join the discussion
Question 1/104
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Correct Answer: B
A managed relational database is a type of database that is hosted and maintained by a cloud service provider such as Microsoft Azure or Amazon Web Services. A relational database is a type of database that organizes data into tables that are related to each other by common fields or attributes. A managed relational database would be the best option for allowing multiple users to create and edit reports at the same time because it can handle concurrent user requests, provide high availability and scalability, and perform complex queries and operations on the data. A text file on a shared drive, an informational intranet page, and locally installed productivity software are not options that can allow multiple users to create and edit reports at the same time because they cannot handle concurrent user requests, provide high availability and scalability, or perform complex queries and operations on the data. References: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 5: Database Fundamentals, page 197.
Add Comments
- Other Question (104q)
- Q1. Which of the following BEST describes a technology that allows multiple users to create an...
- Q2. A systems administrator wants to run a script at a certain time every day. Which of the fo...
- Q3. Which of the following are the primary functions of an operating system? (Choose two.)...
- Q4. Which of the following internal computing components is typically tasked with handling com...
- Q5. Which of the following is an advantage of installing an application to the cloud?...
- Q6. A new device has been installed on a wired network and can be accessed via the LAN but can...
- Q7. Which of the following is the BEST option for a developer to use when storing the months o...
- Q8. A user logs into a laptop using a username and complex password. This is an example of:...
- Q9. For a disaster recovery exercise, a company wants to ensure customer data is recovered bef...
- Q10. All users have access to an application at a company. The data from the application is sto...
- Q11. Employees must use a badge to enter and exit the building. Each time the badge is used, a ...
- Q12. Which of the following is the exact number of bytes in a gigabyte?...
- Q13. Which of the following would be the most cost-effective method to increase availability?...
- Q14. Given the following pseudocode: (Exhibit) Which of the following is the output of the code...
- Q15. Which of the following are the basic computing operations?...
- Q16. Which of the following can a company use to protect its logo?...
- Q17. Which of the following storage types uses platters to store data?...
- Q18. An employee is asked to generate a report on a student information system. The employee us...
- Q19. When following the troubleshooting methodology, which of the following should be performed...
- Q20. Which of the following BEST describes the practice of providing user credentials when logg...
- Q21. A user needs an interface that supports both video and dat a. Which of the following will ...
- Q22. Salespeople roam around a retail store conducting transactions. Which of the following com...
- Q23. A user installs a wireless router and opens a browser to modify the settings. Which of the...
- Q24. A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the followin...
- Q25. Which of the following can a company use to protect its logo?...
- Q26. Which of the following filesystems would a Linux computer MOST likely use?...
- Q27. Which of the following would be the easiest component to upgrade on a laptop that is exper...
- Q28. Which of the following is used to protect intellectual property while requiring the owner ...
- Q29. A technician is having trouble connecting multiple users' laptops to the internet wireless...
- Q30. Ann, a user, is experiencing difficulty getting her IP-based security camera to function a...
- Q31. A technician travels to a data center to review specifications on a new project. Which of ...
- Q32. Which of the following would be BEST to keep the data on a laptop safe if the laptop is lo...
- Q33. An online retailer experienced an outage. An investigation revealed that the server receiv...
- Q34. The broadcast signal from a recently installed wireless access point is not as strong as e...
- Q35. A company's team members have both old and new laptops. Which of the following connectors ...
- Q36. Which of the following would a company consider an asset?...
- Q37. Which of the following are the basic computing operations?...
- Q38. Which of the following BEST describes the purpose of a vector in programming?...
- Q39. For a disaster recovery exercise, a company wants to ensure customer data is recovered bef...
- Q40. Which of the following software license models allows a developer to modify the original c...
- Q41. A computer technician is assigned a ticket to install a laptop for a new employee. Due to ...
- Q42. An attacker is using subversive tactics to gain the trust of a target in order to obtain e...
- Q43. To establish a theory of probable cause, one technician investigates network issues in the...
- Q44. Which of the following statements BEST describes binary?...
- Q45. A computer user is downloading software from the Internet and notices the following at the...
- Q46. Given the following pseudocode: (Exhibit) If the Breakfast program ran on Sunday, which of...
- Q47. A technician is installing a new wireless network and wants to secure the wireless network...
- Q48. Consider the following statements: (Exhibit) Given the input (userin) of "analyst", to whi...
- Q49. An application developer needs to test multiple operating systems on one host. Which of th...
- Q50. Which of the following terms best describes the outcome of a text message that is encrypte...
- Q51. A company desires to implement a six-month survey site within a remote location. Which of ...
- Q52. A systems administrator wants to run a script at a certain time every day. Which of the fo...
- Q53. Which of the following connection types is typically used for a display monitor?...
- Q54. Which of the following describes the concept of a database record?...
- Q55. Which of the following BEST describes an application running on a typical operating system...
- Q56. A developer is creating specific step-by-step instructions/procedures and conditional stat...
- Q57. A small company wants to set up a server that is accessible from the company network as we...
- Q58. A computer user is downloading software from the Internet and notices the following at the...
- Q59. A technician is concerned that sensitive data transmitted over the Internet can be interce...
- Q60. Malware infections are being caused by websites. Which of the following settings will help...
- Q61. Which of the following relational database constructs is used to ensure valid values are e...
- Q62. Which of the following types of encryptions would BEST protect a laptop computer in the ev...
- Q63. An employee is asked to generate a report on a student information system. The employee us...
- Q64. Which of the following is the slowest processing speed?...
- Q65. Which of the following is the slowest processing speed?...
- Q66. Given the following pseudocode: (Exhibit) If the Breakfast program ran on Sunday, which of...
- Q67. In which of the following situations should there be come expectation of privacy?...
- Q68. To establish a theory of probable cause, one technician investigates network issues in the...
- Q69. A user revisits a website and receives a message that the site may not be secure. The user...
- Q70. A program needs to choose apples, oranges, or bananas based on an input. Which of the foll...
- Q71. A user is selecting software to use to prepare handouts for a presentation. The user would...
- Q72. A corporate network just implemented a 60-day password-warning banner. Which of the follow...
- Q73. A global variable called "age" will be created in a program and incremented through the us...
- Q74. A user at a company visits a weather website often during the day. The user browses to the...
- Q75. A network technician needs to ensure data on a network drive is fully backed up. Which of ...
- Q76. Which of the following is primarily a confidentiality concern?...
- Q77. A computer technician is assigned a ticket to install a laptop for a new employee. Due to ...
- Q78. Which of the following are the primary functions of an operating system? (Choose two.)...
- Q79. SQL databases use primary and foreign keys to enable which of the following?...
- Q80. A technician is concerned that sensitive data transmitted over the Internet can be interce...
- Q81. An employee's laptop does not connect to the Internet when it is used in a coffee shop. Wh...
- Q82. A computer user is downloading software from the Internet and notices the following at the...
- Q83. Which of the following is MOST likely used to represent international text data?...
- Q84. A help desk technician encounters an issue and wants to find out if a colleague has encoun...
- Q85. Meaningful and accurate reporting is essential to retailers in making business decisions w...
- Q86. A company wants its employee to use an email client that downloads and removes messages fr...
- Q87. Which of the following notational systems uses the most characters to represent the decima...
- Q88. Which of the following authorization techniques is used to assign permissions and authoriz...
- Q89. Which of the following internet service types is most susceptible to weather disruptions?...
- Q90. A corporate network just implemented a 60-day password-warning banner. Which of the follow...
- Q91. Which of the following storage devices have a spinning disk? (Choose two.)...
- Q92. Which of the following is a compiled language?...
- Q93. A regulation requires new applicants to provide a scan of their retinas in case of any fut...
- Q94. A technician has successfully verified full system functionality after implementing the so...
- Q95. Which of the following would be best to use to store a project task list that will be upda...
- Q96. A user inserts a USB flash drive into a computer tor the first time and sees a message on ...
- Q97. Which of the following should have the HIGHEST expectation of privacy?...
- Q98. A user needs an interface that supports both video and data. Which of the following will m...
- Q99. A user is selecting software to use to prepare handouts for a presentation. The user would...
- Q100. The sales department needs to keep a customer list that contains names, contact informatio...
- Q101. When developing a game, a developer creates a boss object that has the ability to jump. Wh...
- Q102. Which of the following BEST describes a technology that allows multiple users to create an...
- Q103. An attacker is using subversive tactics to gain the trust of a target in order to obtain e...
- Q104. Which of the following allows wireless devices to communicate to a wired network?...
