What is the purpose of the motherboard?
Connects all components together
What is the purpose of the CPU?
Processes data
What is the purpose of RAM?
Temporary data storage; it makes the computer faster
What is the purpose of HDDs and SSDs?
Long-term data storage
What is the purpose of optical discs?
Data storage (that's removable)
What does the power supply do?
Converts AC power to DC power for system components
What is a PSU?
Power supply unit
What is a GPU?
Graphics Processing Unit
What are two types of communications expansion cards?
NICs (network interface cards) and modems
Which expansion card communicates with other computers over telephone lines?
Modem
Which expansion card produces images?
Video card
Which expansion card might have its own GPU?
Video card
Which expansion card would you plug speakers into?
Audio card (sound card)
What are two methods used to cool processors?
Air cooling and liquid cooling
Air cooling for processors usually involves which two components?
Heat sink and a fan
Which has more capacity, a DVD SS DL or a DVD DS SL?
The DVD DS SL does, slightly.
Which optical disc stores the most data?
BD-ROM (Blu-ray)
How many megabytes are in a gigabyte?
1000
What are three advantages of SSD over HDD?
Faster startup, faster read times, less power consumption and heat, silent, more reliable, less susceptible to shock damage, higher data density
When a system runs out of RAM, what does it use next?
Virtual memory
What is a DDR3 DIMM?
A memory module (RAM)
What type of RAM chips do laptops use?
SODIMM (or MicroDIMM)
What type of processor is most likely to be found in small devices?
ARM
What type of storage is volatile?
RAM
How many bytes are in a kilobyte?
1000
_____ printers use a powdery plastic substance to create images.
Laser
Color inkjet printers use ink cartridges called _____.
CMYK
The oldest computer display devices are _____.
CRTs
___________ replaced CRTs as the most common type of display device.
Flatscreens
What are some types of pointing devices?
Mouse, touchpad, joystick, stylus pen, trackball
Flash drives and NAS are examples of what?
External storage devices
The first commonly used digital video connector was what?
DVI
What is the most common video connector, also used with televisions?
HDMI
Popular connectors for external hard drives are ________?
USB, FireWire, eSATA, Thunderbolt
The _______ port was also called the printer port.
Parallel
The name of the round keyboard and mouse connector is ____?
PS/2
Twisted-pair network cables have a(n) _____ connector at the end.
RJ-45
Telephone cables have a(n) _______ connector at the end.
RJ-11
Which two external connector types were developed by Apple?
FireWire and Thunderbolt
The most common connector used today for keyboards and mice is ___?
USB
A device that has multiple external hard drives and network capability is called what?
Network-attached storage (NAS)
Another name for the serial port is ____?
RS-232
____ are display devices that let you input as well.
Touchscreens
What are three wireless networking technologies used today?
Wi-Fi, Bluetooth, NFC
What is it called when Windows autodetects new hardware and installs the driver?
Plug-and-play
Peripheral hardware requires a(n) ______ to be installed.
Driver (or device driver)
Three common gesture-based interactions for mobile devices are what?
Tap, swipe, and pinch
To scroll down or change a page on a mobile device, which action do you use?
Swipe
To zoom in our out in a map on a mobile device, which action do you use?
Pinch
What is the name of the sensor that allows the screen to rotate when you turn a mobile device?
Gyroscope
What is the name of the sensor that allows a mobile device to act as a compass?
Magnetometer
What type of biometric sensor is on newer mobile devices?
Fingerprint scanner
When rebooting a mobile device with biometric security enabled, what must you do to unlock the device?
Enter the passcode
When setting up a wireless connection on a mobile device, what is the first step?
Verify wireless capabilities
When setting up a wireless connection on a mobile device, what is the step after verifying wireless capabilities?
Turn on Wi-Fi
When setting up a wireless connection on a mobile device, what is the step after turning on Wi-Fi?
Locate the SSID
When setting up a wireless connection on a mobile device, what is the step after locating the SSID?
Enter the wireless password
When setting up a wireless connection on a mobile device, what is the step after entering the wireless password?
Verify Internet connectivity
The process of connecting two Bluetooth devices together for communication is called what?
Pairing
Which two options can be used to back up an iPhone or iPad?
iTunes or iCloud
What is the name of the mode that immediately disables all wireless connections on a mobile device?
Airplane mode
What does Airplane mode do on a wireless device?
Immediately disables all wireless connections
The name of the app store for iOS is called?
iTunes
What is the name of the app store for Android?
Google Play
What type of server is used exclusively as a server?
Dedicated server
What type of computer is used as both a server and someone's workstation?
Nondedicated server
Which type of computing device is specialized to play video games?
Gaming console
Give two examples of IoT home automation devices.
Thermostat and security system
What type of IoT device is best suited to watch television over the Internet?
Streaming media device
What common computing device typically has a screen smaller than 7 inches in size?
Mobile phone
Which type of common computing device will have a touchpoint built into it?
Laptop
What IoT device is typically used with security systems?
IP camera
Which common computing device generally has the fastest processor and most memory?
Server
The central part of the operating system is called the _____.
Kernel
A program that runs on top of the OS and allows the user to issue commands is what?
Shell
What are the four basic functions of an OS?
Interface between the user and hardware and coordinate hardware components, provide environment for software to run, monitor system health, display file and directory structure
The identity which you are known by when you log in is your _______.
User account
To run a 64-bit OS, you need a(n) _____ CPU.
64-bit
To monitor system health in Windows, you would use _______.
Performance Monitor
____ is an open-source workstation OS.
Linux
A(n) ________ is a version of Linux.
distribution
The current Macintosh OS is called _____.
macOS
Which operating system is named after big cats or California locations?
Mac OS X
Microsoft's workstation OS is called _______.
Windows
Google's workstation OS is called ______.
Chrome OS
A(n) _____ is a netbook with Chrome installed on it.
Chromebook
The default OS on an iPad or iPhone is ____.
iOS
Google's mobile OS is called ____.
Android
Versions of the ____ OS are named after sweet treats.
Android
BlackBerry devices are known for having _____ keyboards.
Physical
The first step to storing files on a hard drive is to _____ the hard drive.
Partition
The _____ determines how files are stored on a hard drive.
File system
The two file systems typically associated with Windows are what?
FAT and NTFS
The file system typically used by macOS is what?
HFS
The three common Linux file systems are what?
ext3, ext4, and XFS
Which command creates a duplicate file in a new location on the hard drive?
copy
A(n) _____ is a pointer to a file, designed to make it easy to open.
Shortcut
File size and name are examples of what?
File metadata
To manage a hard drive in Windows, use the _____ utility.
Disk Management
To kill a process in Windows, use the _____ utility.
Task Manager
The hard drive space used to augment system RAM is called what?
Virtual memory
The five categories of OSs are what?
Workstation, server, mobile device, embedded, and virtual (or hypervisor)
What are five features of file systems?
Compression, encryption, permissions, journaling, and naming rules
Two examples of OS interfaces are ____ and _____.
Console/command line and GUI
In Windows, drivers are managed in which utility?
Device manager
Firmware is a type of ____ OS.
Embedded
In a file system, files are organized and placed into what?
Folders (or directories)
What determines the rules of how long a file name can be?
The file system
Word processing and spreadsheet programs are considered _____ software.
Productivity
Conferencing and instant messaging are considered _____ software.
Collaboration
If you want to protect your computer against bad software, you should install _____ software.
Anti-malware
To make a file smaller in size or to package multiple files together in one archive, use _________ software.
Compression
The three application delivery methods are _______, _______, and ________.
Locally installed, local network hosted, and cloud hosted
When assessing software compatibility, check what two things?
Make sure it runs on your OS, and make sure you meet minimum hardware requirements.
To install or run a purchased application, you need a(n) _____.
Product key
_____ is the process of letting you use the software by linking it to your computer.
Activation
______ is the process by which you provide your name and contact information to the software manufacturer.
Registration
In Windows, the best way to uninstall applications is through ____________.
Control Panel
If you want your Windows OS to be continually updated, what do you need to configure?
Windows Update
To make your hardware work, what type of software do you need?
A driver (or device driver)
Who should you contact to get updated device drivers?
The hardware manufacturer
To use purchased software, you need a(n) ______ _______, which stipulates the conditions of use.
Software license
How often should you update your security software?
At least once a week
What are two locations from which you might receive an installation file?
A CD-ROM from the manufacturer, or download from the Internet
To ensure that your OS gets the most important security updates, even if you don't know they were released, you should enable ______.
Automatic updates (or Windows Update, or Software Update)
The three tiers of a three-tier application architecture are what?
Database layer, business logic layer, presentation layer
To remove temporary Internet files from your web browser, you should ______.
Clear the cache
If you want to prevent a button on a web page from working on a web browser, what should you do?
If you want to prevent a button on a web page from working on a web browser, what should you do?
What adds functionality to a web browser?
Add-on or extension
What allows you to browse the Internet without your normal browser settings and identification?
Private browsing
What settings would you configure if your web server needs to go through a secure server to access the Internet?
Proxy settings
A secure website requires a(n) _______.
Valid certificate
How do you prevent extra web browser windows from appearing when a website wants them to?
Pop-up blocker
What type of software is not free and requires a license?
Proprietary (or commercial)
What type of software license requires you to pay every year?
Subscription
Binary numbers can have the values of ___ or ___.
0 or 1
Hexadecimal uses what numbers and letters?
0-9 and A-F
What is the data notational system that contains only English letters, numbers, and symbols?
ASCII
If you need a notational system that has non-English letters, what do you need to use?
Unicode
Which data type represents a single letter or number?
Char
Which data type represents several letters or numbers?
String
Which data type indicates a number with no decimal places?
Integer
Which data type indicates a number with decimal places?
Float
A Boolean data type represents which two values?
True or false
Name the three types of interpreted languages.
Scripted, scripting, markup
What are two examples of markup languages?
HTML and XML
What type of high-level language is read line by line every time it's executed?
Interpreted
Which programming language category is used to write scripts?
Scripting
Programming languages that are converted a single time into low-level code are called what?
Compiled languages
What type of programming language is designed to pull data from a database?
Query
What is the low-level programming language best suited for direct hardware access?
Assembly
Code that is for people to read and does not affect a program is called what?
Pseudocode
To map out a program, you would use a(n) _______.
Flowchart
Which programming logic component uses if and else if statements?
Branching
Which programming logic component uses while statements?
Looping
In programming, what are the two types of data identifiers?
Variables and constants
Which type of programming data identifier does not change?
Constant
Which type of programming data identifier can change?
Variable
What are the two types of data containers in programming?
Arrays and vectors
Which type of data container is fixed in length?
Array
Which type of data container can hold only one data type at a time?
Array
Which type of data container can have dynamically adjusted length?
Vector
Which type of data container can store multiple data types at once?
Vector
Which two programming concepts are used to break code into smaller, reusable chunks?
Functions and methods
The three characteristics of an object in programming are what?
Properties, attributes, and methods
What are some examples of object-oriented programming languages?
Java, C++, C#, Python, PHP, Perl, Ruby
What is the SQL command used to create queries?
SELECT
What is the SQL command used to add records to a relational database?
INSERT
What is the SQL command used to remove records from a relational database?
DELETE
What is the SQL command used to modify data in an existing record in a relational database?
UPDATE
What is the SQL command used to define a new database or table in a database?
CREATE
What is the SQL command used to add, remove, or modify fields in a relational database?
ALTER
What is the SQL command used to delete databases or tables in a database?
DROP
The rules and structure of a relational database are called what?
Schema
Rows in a relational database are also called what?
Records
Columns in a relational database are also called what?
Fields
A(n) ______ uniquely identifies a record in a relational database.
Primary key
Data arranged in columns and rows is referred to as _____ data.
Structured
Data such as pictures, emails, and text is referred to as _____ data.
Nonstructured or unstructured
Data such as pictures that have been tagged with metadata are known as ____ data.
Semistructured
To retrieve raw, unformatted data from a database, use a(n) _____.
Query
To retrieve formatted data from a database, use a(n) _____.
Report or report builder
A(n) ____ key is one that refers to data in another table in a database.
Foreign
Two types of nonrelational databases are ____ and ____.
Document and key/value
Limitations put on a field in a database are called _____.
Constraints
Which type of key in a database table is required?
Primary
What are the two most popular broadband connection types?
DSL and cable modems
What is most secure: wired, wireless, or cellular?
Wired
Which gives the greatest mobility: wired, wireless, or cellular?
cellular
What two TCP/IP configuration parameters are required to communicate on a network?
IP address and subnet mask
If your TCP/IP client wants to get on the Internet, which optional configuration parameter is required?
Default gateway
Which TCP/IP service automatically configures clients with an IP address?
DHCP
Which TCP/IP service resolves host names to IP addresses?
DNS
The _____ service lets computers with private IP addresses get on the Internet.
NAT
Which wireless security protocol is the most secure?
WPA2
Other than enabling WPA2, WPA, or WEP, what two wireless network security options can you use?
Disable SSID broadcasts and enable MAC filtering
To configure a wireless router, you should change the ______ and ______ passwords.
Network (wireless) and admin
When configuring a wireless router, what should you do to the SSID?
Change it from the default
When configuring a wireless router, what should you upgrade at the end of the process?
The router's firmware
______ is the feature that configures your computer with an IP address in the 169.254 range if it can't find a DHCP server.
APIPA
The current fastest Wi-Fi standard is _____.
802.11ac
______ IP addresses cannot participate on the Internet.
Private
The unique hardware address assigned to your network adapter is called the ______ ______.
MAC address
What are the three network storage types?
File server, NAS, and cloud
What is the name of the logical computer address used by routers to make decisions on where to send packets?
IP address
What are the two network protocols used to access the Internet?
HTTP and HTTPS
Which network protocols are used to download email?
POP3 and IMAP
Which network protocol is used to upload email?
SMTP
Which networking device is used to connect a computer using telephone lines?
Modem
Which networking device connects networks to each other?
Router
Which networking device is a security barrier?
Firewall
Which networking device is used to connect computers together in a LAN?
Switch
Which networking device is used on wireless networks to connect workstations to the network?
Access point
Theft of hardware is an example of what type of security concern?
Availability
When someone goes through the trash to obtain sensitive information, that is called _____.
Dumpster diving
Asking users to reveal sensitive or personal information over the phone is referred to as _______ _________.
Social engineering
Looking at someone's computer to see sensitive information they type in or display is called what?
Shoulder surfing
A problem in the coding of software that is used by an attacker is called what?
An exploit
Malware that attaches itself to an executable program and does damage to your computer is called what?
Virus
Malware that self-replicates and carries a payload of other malware is called what?
Worm
A program that appears to be beneficial but is actually malware is called what?
Trojan horse
Malware that tracks your Internet activity and sells that information to marketers is called what?
Spyware
Malware that extorts those infected to pay a fee to remove the malware is called what?
Ransomware
Excessive, unwanted email is referred to as what?
Spam
If you forget a password, what type of software can help you recover it?
Password cracker
The three types of intellectual property protection are what?
Trademarks, copyrights, and patents
A(n) ____ is used for intellectual property protection of a logo, word, or words.
Trademark
A(n) ____ is used for intellectual property protection of a book or a song.
Copyright
A(n) ____ is used for intellectual property protection of an invention.
Patent
What are five examples of confidentiality concerns?
Snooping, eavesdropping, wiretapping, social engineering, and dumpster diving
What are four examples of integrity concerns?
Man-in-the-middle, replay attack, impersonation, unauthorized information alteration
What are five examples of availability concerns?
Denial of service, power outage, hardware failure, destruction, service outage
In information security, a(n) _____ concern is one that involves maintaining privacy of data.
Confidentiality
In information security, a(n) _____ concern is one that involves ensuring the data is true and accurate.
Integrity
In information security, a(n) _____ concern is one that involves ensuring the data is accessible when users need it.
Availability
Requiring another form of identification in addition to a password in order to log in is known as what?
Multifactor authentication
List examples of authentication factors.
Password, PIN, one-time password, software token, hardware token, biometrics, specific location, security questions
When a user types a password once and is given access to multiple systems, what is that called?
Single sign-on
What security concept asks the question, "Who are you?
Authentication
What security concept determines what you can do on a network?
Authorization
When assigning security permissions, always follow the _____ ______ model.
Least privilege
When users are allowed to assign their own permissions, that is known as a ______ access control model.
Discretionary
When users are assigned permissions based on job function and can't be assigned permissions based on their user account, that is known as a ______ access control model.
Role-based
Which access control model uses security labels, classifications, and categories?
Mandatory access control
Which security concept is responsible for tracking user actions on a system?
Accounting
Which security concept ensures that users can't deny that an event took place?
Nonrepudiation
Two ways to track user actions on a system are what?
Logs and web browser history
What are four examples of nonrepudiation factors?
Video, biometrics, signature, receipt
To harden a device, you can disable communications features such as ____ and ____.
Bluetooth, NFC
The key combination of _______ lets a user lock their computer when they leave.
Ctrl+Alt+Delete
_____ is the process of scrambling the data in user files so that others cannot read them.
Encryption
To protect a computer against viruses and spyware, install _______.
Antimalware
The three types of accounts on a computer are what?
Administrator, user, and guest
The _____ user account should be disabled for security purposes unless it is being used.
Guest
Passwords should not be ____ among different websites.
Reused
Many companies will have passwords _____ periodically as part of a security policy.
Expire
The process of providing proper credentials to access a computer resource is called ______.
Authentication
Needing to provide a password and present a smart card to log in is an example of _____ ______.
Multifactor authentication
The three types of information used in multifactor authentication are what?
Something you know, something you have, something you are
The ability to enter login information once and have it transfer to other systems is called what?
Single sign-on
Risks of using public workstations include what three things?
Shoulder surfing, keyloggers (or other malware), unsecured wireless networks
_____ Wi-Fi networks are unsecure and should not be used.
Open
What should be true about a web browser's version before you use it?
It should be the most current version.
What is the name of the feature that completes your name and address for you in web pages?
Autofill
What is the name of a file a website downloads to your computer to identify you?
Cookie
What are two ways to identify a secure website?
Starts with HTTPS:// and has a lock symbol in the address bar
What are three symptoms of adware?
Constant pop-ups, home page (or browser) redirection, search engine redirection
To protect your security, you should limit the use of ______ on the Internet.
Personally identifiable information (PII)
What should you not do if you receive a hyperlink or attachment in a suspicious email?
Click it.
The first place to check when you have a device failure or question is where?
The manufacturer's documentation or website
Which three external issues should you check for when troubleshooting a computer?
Loose cables or connectors, power, and physical damage
In addition to manufacturer documentation and websites, what are two external resources to check for technical help?
Technical community groups, Internet search, and technical support
To preserve your data in the case of hardware failure, you should _______ your data.
Back up
To make sure you run consistent software backups, be sure to ______ them.
Schedule
If you have important data that changes often, you should run backups more _______.
Frequently
What are three options for backup storage locations?
Locally attached storage, network-attached storage, off-site/cloud
Which backup storage location option is the fastest? Local, network, or cloud?
Local
After backing up data, what is the first thing you should do?
Test and verify that the backup works.