Which regulatory compliance mandates the protection of personally identifiable information (PII) for European Union (EU) citizens?

  • COPPA
  • FERPA
  • GDPR
  • HIPAA
The General Data Protection Regulation (GDPR) is a regulation in EU law that mandates the protection of personally identifiable information (PII) for EU citizens. It sets strict rules for data privacy and security.

Which term refers to the practice of writing code in short, consistent cycles, often with paired programming and frequent communication with stakeholders?

  • Agile Development
  • Big Bang Integration Testing
  • Code Refactoring
  • Waterfall Methodology
'Agile Development' is a software development approach that involves writing code in short, consistent cycles called iterations or sprints. It emphasizes collaboration with stakeholders, adaptability, and continuous delivery.

Which architectural pattern in mobile app development separates an application's UI, data, and logic into three separate layers?

  • Factory Method Pattern
  • Model-View-Controller (MVC)
  • Observer Pattern
  • Singleton Pattern
The Model-View-Controller (MVC) architectural pattern separates a mobile app into three interconnected components: Model (data and logic), View (UI), and Controller (manages user input). This separation enhances code maintainability and scalability in app development.

With the rise of digital channels, a retail company wants to enhance its customer experience. What strategic initiative should they prioritize to achieve a seamless omnichannel experience?

  • Increasing Traditional Store Footprint
  • Manual Inventory Management and Reporting
  • Restricted Payment Options and Checkout
  • Unified Customer Data and Personalization
Prioritizing 'Unified Customer Data and Personalization' is crucial for achieving a seamless omnichannel experience. It involves leveraging data to provide a personalized experience across all channels, which can enhance customer satisfaction and drive business growth.

What term is used to describe a collection of data elements that have a specific order and can be indexed?

  • Array
  • Function
  • String
  • Variable
An 'array' is a data structure in programming that allows you to store a collection of data elements in a specific order, and each element can be accessed using an index.

An organization's IT department is often seen as a cost center and not a strategic partner. Which approach can help shift this perception and position IT as a driver of business value?

  • Business Alignment and Innovation
  • Cost Cutting and Outsourcing
  • Legacy Systems and Maintenance
  • Siloed Operations and Autonomy
To change the perception of IT, 'Business Alignment and Innovation' is essential. This approach involves aligning IT strategies with the business objectives and focusing on innovation to show how IT can directly contribute to business success, making it a strategic partner.

What term is used to describe a collection of data elements that have a specific order and can be indexed?

  • Array
  • Function
  • String
  • Variable
An 'array' is a data structure in programming that allows you to store a collection of data elements in a specific order. Each element in an array can be accessed using an index, which is a numerical reference. Arrays are commonly used for organizing and manipulating data efficiently.

To reduce latency and improve load times for global users, companies use a cloud service called _______.

  • Content Delivery Network (CDN)
  • Domain Name System (DNS)
  • Internet Service Provider (ISP)
  • Web Hosting Service
Companies use a 'Content Delivery Network (CDN)' to reduce latency and improve load times for global users. CDNs distribute content to edge servers around the world, ensuring faster access to content for users.

What is the primary goal of penetration testing?

  • To audit financial records
  • To design secure systems
  • To discover all vulnerabilities
  • To exploit vulnerabilities
The primary goal of penetration testing is 'To design secure systems.' It aims to identify weaknesses in a system's security and provide insights to improve and design a more secure infrastructure.

Which scheduling algorithm in operating systems gives the shortest job the highest priority?

  • First-Come-First-Served (FCFS)
  • Priority Scheduling
  • Round Robin
  • Shortest Job Next (SJN)
The scheduling algorithm that gives the shortest job the highest priority is "Shortest Job Next" (SJN). This approach minimizes waiting time and helps to execute shorter tasks quickly, leading to optimal resource utilization.