A corporate technician has been tasked with providing a thin client PC for a new employee. Which of the following configurations would be the MOST appropriate?

A. A PC with the maximum amount of supported RAM
B. A PC equipped with high end audio and video cards
C. A PC that meets the minimum requirements for running an OS
D. A PC with the most powerful processor


Answer: C. A PC that meets the minimum requirements for running an OS

Computer Science & Information Technology

You might also like to view...

During a forensic investigation, a systems administrator indicates that she is in possession of a copy backup of the compromised system. This backup was taken a few hours before an attack disabled the system. You must decide whether to use the copy backup to restore the system. What is this type of backup?

A. a backup that backs up all the files similar to full backups but does not reset the file's archive bit B. a backup which uses a file's time stamp to determine if it needs archiving C. a backup in which all files that have been changed since the last full backup will be backed up and the archive bit for each file is not cleared D. a backup in which all files that have been changed since the last full or incremental backup will be backed up and the archive bit for each file is cleared

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 12-1Sheng has been asked to provide data from the Inventory database of a regional auto parts store to the store's regional manager. He has been given specific requirements to narrow the data based on the information the manager needs. Sheng will apply filters to the tables in the Inventory database to provide his manager with the requested information. Sheng's regional manager may ask for the same information again at a later date so Sheng would like to save one of his filters for use later.  What is the best option for saving the filter?

A. save the filter as a datasheet B. save the filter with the form C. save the filter as a query D. save the filter as a separate file

Computer Science & Information Technology

Government impersonation scams involve ________.

A. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods

Computer Science & Information Technology

A system administrator needs to directly control a server that has no network connectivity. Which of the following should be used to accomplish this?

A. SSH B. KVM C. RDP D. iLO/iDRAC

Computer Science & Information Technology