ITF+ Fundamentals

What is the purpose of the motherboard?

Connects all components together

What is the purpose of the CPU?

Processes data

What is the purpose of RAM?

Temporary data storage; it makes the computer faster

What is the purpose of HDDs and SSDs?

Long-term data storage

What is the purpose of optical discs?

Data storage (that's removable)

What does the power supply do?

Converts AC power to DC power for system components

What is a PSU?

Power supply unit

What is a GPU?

Graphics Processing Unit

What are two types of communications expansion cards?

NICs (network interface cards) and modems

Which expansion card communicates with other computers over telephone lines?

Modem

Which expansion card produces images?

Video card

Which expansion card might have its own GPU?

Video card

Which expansion card would you plug speakers into?

Audio card (sound card)

What are two methods used to cool processors?

Air cooling and liquid cooling

Air cooling for processors usually involves which two components?

Heat sink and a fan

Which has more capacity, a DVD SS DL or a DVD DS SL?

The DVD DS SL does, slightly.

Which optical disc stores the most data?

BD-ROM (Blu-ray)

How many megabytes are in a gigabyte?

1000

What are three advantages of SSD over HDD?

Faster startup, faster read times, less power consumption and heat, silent, more reliable, less susceptible to shock damage, higher data density

When a system runs out of RAM, what does it use next?

Virtual memory

What is a DDR3 DIMM?

A memory module (RAM)

What type of RAM chips do laptops use?

SODIMM (or MicroDIMM)

What type of processor is most likely to be found in small devices?

ARM

What type of storage is volatile?

RAM

How many bytes are in a kilobyte?

1000

_____ printers use a powdery plastic substance to create images.

Laser

Color inkjet printers use ink cartridges called _____.

CMYK

The oldest computer display devices are _____.

CRTs

___________ replaced CRTs as the most common type of display device.

Flatscreens

What are some types of pointing devices?

Mouse, touchpad, joystick, stylus pen, trackball

Flash drives and NAS are examples of what?

External storage devices

The first commonly used digital video connector was what?

DVI

What is the most common video connector, also used with televisions?

HDMI

Popular connectors for external hard drives are ________?

USB, FireWire, eSATA, Thunderbolt

The _______ port was also called the printer port.

Parallel

The name of the round keyboard and mouse connector is ____?

PS/2

Twisted-pair network cables have a(n) _____ connector at the end.

RJ-45

Telephone cables have a(n) _______ connector at the end.

RJ-11

Which two external connector types were developed by Apple?

FireWire and Thunderbolt

The most common connector used today for keyboards and mice is ___?

USB

A device that has multiple external hard drives and network capability is called what?

Network-attached storage (NAS)

Another name for the serial port is ____?

RS-232

____ are display devices that let you input as well.

Touchscreens

What are three wireless networking technologies used today?

Wi-Fi, Bluetooth, NFC

What is it called when Windows autodetects new hardware and installs the driver?

Plug-and-play

Peripheral hardware requires a(n) ______ to be installed.

Driver (or device driver)

Three common gesture-based interactions for mobile devices are what?

Tap, swipe, and pinch

To scroll down or change a page on a mobile device, which action do you use?

Swipe

To zoom in our out in a map on a mobile device, which action do you use?

Pinch

What is the name of the sensor that allows the screen to rotate when you turn a mobile device?

Gyroscope

What is the name of the sensor that allows a mobile device to act as a compass?

Magnetometer

What type of biometric sensor is on newer mobile devices?

Fingerprint scanner

When rebooting a mobile device with biometric security enabled, what must you do to unlock the device?

Enter the passcode

When setting up a wireless connection on a mobile device, what is the first step?

Verify wireless capabilities

When setting up a wireless connection on a mobile device, what is the step after verifying wireless capabilities?

Turn on Wi-Fi

When setting up a wireless connection on a mobile device, what is the step after turning on Wi-Fi?

Locate the SSID

When setting up a wireless connection on a mobile device, what is the step after locating the SSID?

Enter the wireless password

When setting up a wireless connection on a mobile device, what is the step after entering the wireless password?

Verify Internet connectivity

The process of connecting two Bluetooth devices together for communication is called what?

Pairing

Which two options can be used to back up an iPhone or iPad?

iTunes or iCloud

What is the name of the mode that immediately disables all wireless connections on a mobile device?

Airplane mode

What does Airplane mode do on a wireless device?

Immediately disables all wireless connections

The name of the app store for iOS is called?

iTunes

What is the name of the app store for Android?

Google Play

What type of server is used exclusively as a server?

Dedicated server

What type of computer is used as both a server and someone's workstation?

Nondedicated server

Which type of computing device is specialized to play video games?

Gaming console

Give two examples of IoT home automation devices.

Thermostat and security system

What type of IoT device is best suited to watch television over the Internet?

Streaming media device

What common computing device typically has a screen smaller than 7 inches in size?

Mobile phone

Which type of common computing device will have a touchpoint built into it?

Laptop

What IoT device is typically used with security systems?

IP camera

Which common computing device generally has the fastest processor and most memory?

Server

The central part of the operating system is called the _____.

Kernel

A program that runs on top of the OS and allows the user to issue commands is what?

Shell

What are the four basic functions of an OS?

Interface between the user and hardware and coordinate hardware components, provide environment for software to run, monitor system health, display file and directory structure

The identity which you are known by when you log in is your _______.

User account

To run a 64-bit OS, you need a(n) _____ CPU.

64-bit

To monitor system health in Windows, you would use _______.

Performance Monitor

____ is an open-source workstation OS.

Linux

A(n) ________ is a version of Linux.

distribution

The current Macintosh OS is called _____.

macOS

Which operating system is named after big cats or California locations?

Mac OS X

Microsoft's workstation OS is called _______.

Windows

Google's workstation OS is called ______.

Chrome OS

A(n) _____ is a netbook with Chrome installed on it.

Chromebook

The default OS on an iPad or iPhone is ____.

iOS

Google's mobile OS is called ____.

Android

Versions of the ____ OS are named after sweet treats.

Android

BlackBerry devices are known for having _____ keyboards.

Physical

The first step to storing files on a hard drive is to _____ the hard drive.

Partition

The _____ determines how files are stored on a hard drive.

File system

The two file systems typically associated with Windows are what?

FAT and NTFS

The file system typically used by macOS is what?

HFS

The three common Linux file systems are what?

ext3, ext4, and XFS

Which command creates a duplicate file in a new location on the hard drive?

copy

A(n) _____ is a pointer to a file, designed to make it easy to open.

Shortcut

File size and name are examples of what?

File metadata

To manage a hard drive in Windows, use the _____ utility.

Disk Management

To kill a process in Windows, use the _____ utility.

Task Manager

The hard drive space used to augment system RAM is called what?

Virtual memory

The five categories of OSs are what?

Workstation, server, mobile device, embedded, and virtual (or hypervisor)

What are five features of file systems?

Compression, encryption, permissions, journaling, and naming rules

Two examples of OS interfaces are ____ and _____.

Console/command line and GUI

In Windows, drivers are managed in which utility?

Device manager

Firmware is a type of ____ OS.

Embedded

In a file system, files are organized and placed into what?

Folders (or directories)

What determines the rules of how long a file name can be?

The file system

Word processing and spreadsheet programs are considered _____ software.

Productivity

Conferencing and instant messaging are considered _____ software.

Collaboration

If you want to protect your computer against bad software, you should install _____ software.

Anti-malware

To make a file smaller in size or to package multiple files together in one archive, use _________ software.

Compression

The three application delivery methods are _______, _______, and ________.

Locally installed, local network hosted, and cloud hosted

When assessing software compatibility, check what two things?

Make sure it runs on your OS, and make sure you meet minimum hardware requirements.

To install or run a purchased application, you need a(n) _____.

Product key

_____ is the process of letting you use the software by linking it to your computer.

Activation

______ is the process by which you provide your name and contact information to the software manufacturer.

Registration

In Windows, the best way to uninstall applications is through ____________.

Control Panel

If you want your Windows OS to be continually updated, what do you need to configure?

Windows Update

To make your hardware work, what type of software do you need?

A driver (or device driver)

Who should you contact to get updated device drivers?

The hardware manufacturer

To use purchased software, you need a(n) ______ _______, which stipulates the conditions of use.

Software license

How often should you update your security software?

At least once a week

What are two locations from which you might receive an installation file?

A CD-ROM from the manufacturer, or download from the Internet

To ensure that your OS gets the most important security updates, even if you don't know they were released, you should enable ______.

Automatic updates (or Windows Update, or Software Update)

The three tiers of a three-tier application architecture are what?

Database layer, business logic layer, presentation layer

To remove temporary Internet files from your web browser, you should ______.

Clear the cache

If you want to prevent a button on a web page from working on a web browser, what should you do?

If you want to prevent a button on a web page from working on a web browser, what should you do?

What adds functionality to a web browser?

Add-on or extension

What allows you to browse the Internet without your normal browser settings and identification?

Private browsing

What settings would you configure if your web server needs to go through a secure server to access the Internet?

Proxy settings

A secure website requires a(n) _______.

Valid certificate

How do you prevent extra web browser windows from appearing when a website wants them to?

Pop-up blocker

What type of software is not free and requires a license?

Proprietary (or commercial)

What type of software license requires you to pay every year?

Subscription

Binary numbers can have the values of ___ or ___.

0 or 1

Hexadecimal uses what numbers and letters?

0-9 and A-F

What is the data notational system that contains only English letters, numbers, and symbols?

ASCII

If you need a notational system that has non-English letters, what do you need to use?

Unicode

Which data type represents a single letter or number?

Char

Which data type represents several letters or numbers?

String

Which data type indicates a number with no decimal places?

Integer

Which data type indicates a number with decimal places?

Float

A Boolean data type represents which two values?

True or false

Name the three types of interpreted languages.

Scripted, scripting, markup

What are two examples of markup languages?

HTML and XML

What type of high-level language is read line by line every time it's executed?

Interpreted

Which programming language category is used to write scripts?

Scripting

Programming languages that are converted a single time into low-level code are called what?

Compiled languages

What type of programming language is designed to pull data from a database?

Query

What is the low-level programming language best suited for direct hardware access?

Assembly

Code that is for people to read and does not affect a program is called what?

Pseudocode

To map out a program, you would use a(n) _______.

Flowchart

Which programming logic component uses if and else if statements?

Branching

Which programming logic component uses while statements?

Looping

In programming, what are the two types of data identifiers?

Variables and constants

Which type of programming data identifier does not change?

Constant

Which type of programming data identifier can change?

Variable

What are the two types of data containers in programming?

Arrays and vectors

Which type of data container is fixed in length?

Array

Which type of data container can hold only one data type at a time?

Array

Which type of data container can have dynamically adjusted length?

Vector

Which type of data container can store multiple data types at once?

Vector

Which two programming concepts are used to break code into smaller, reusable chunks?

Functions and methods

The three characteristics of an object in programming are what?

Properties, attributes, and methods

What are some examples of object-oriented programming languages?

Java, C++, C#, Python, PHP, Perl, Ruby

What is the SQL command used to create queries?

SELECT

What is the SQL command used to add records to a relational database?

INSERT

What is the SQL command used to remove records from a relational database?

DELETE

What is the SQL command used to modify data in an existing record in a relational database?

UPDATE

What is the SQL command used to define a new database or table in a database?

CREATE

What is the SQL command used to add, remove, or modify fields in a relational database?

ALTER

What is the SQL command used to delete databases or tables in a database?

DROP

The rules and structure of a relational database are called what?

Schema

Rows in a relational database are also called what?

Records

Columns in a relational database are also called what?

Fields

A(n) ______ uniquely identifies a record in a relational database.

Primary key

Data arranged in columns and rows is referred to as _____ data.

Structured

Data such as pictures, emails, and text is referred to as _____ data.

Nonstructured or unstructured

Data such as pictures that have been tagged with metadata are known as ____ data.

Semistructured

To retrieve raw, unformatted data from a database, use a(n) _____.

Query

To retrieve formatted data from a database, use a(n) _____.

Report or report builder

A(n) ____ key is one that refers to data in another table in a database.

Foreign

Two types of nonrelational databases are ____ and ____.

Document and key/value

Limitations put on a field in a database are called _____.

Constraints

Which type of key in a database table is required?

Primary

What are the two most popular broadband connection types?

DSL and cable modems

What is most secure: wired, wireless, or cellular?

Wired

Which gives the greatest mobility: wired, wireless, or cellular?

cellular

What two TCP/IP configuration parameters are required to communicate on a network?

IP address and subnet mask

If your TCP/IP client wants to get on the Internet, which optional configuration parameter is required?

Default gateway

Which TCP/IP service automatically configures clients with an IP address?

DHCP

Which TCP/IP service resolves host names to IP addresses?

DNS

The _____ service lets computers with private IP addresses get on the Internet.

NAT

Which wireless security protocol is the most secure?

WPA2

Other than enabling WPA2, WPA, or WEP, what two wireless network security options can you use?

Disable SSID broadcasts and enable MAC filtering

To configure a wireless router, you should change the ______ and ______ passwords.

Network (wireless) and admin

When configuring a wireless router, what should you do to the SSID?

Change it from the default

When configuring a wireless router, what should you upgrade at the end of the process?

The router's firmware

______ is the feature that configures your computer with an IP address in the 169.254 range if it can't find a DHCP server.

APIPA

The current fastest Wi-Fi standard is _____.

802.11ac

______ IP addresses cannot participate on the Internet.

Private

The unique hardware address assigned to your network adapter is called the ______ ______.

MAC address

What are the three network storage types?

File server, NAS, and cloud

What is the name of the logical computer address used by routers to make decisions on where to send packets?

IP address

What are the two network protocols used to access the Internet?

HTTP and HTTPS

Which network protocols are used to download email?

POP3 and IMAP

Which network protocol is used to upload email?

SMTP

Which networking device is used to connect a computer using telephone lines?

Modem

Which networking device connects networks to each other?

Router

Which networking device is a security barrier?

Firewall

Which networking device is used to connect computers together in a LAN?

Switch

Which networking device is used on wireless networks to connect workstations to the network?

Access point

Theft of hardware is an example of what type of security concern?

Availability

When someone goes through the trash to obtain sensitive information, that is called _____.

Dumpster diving

Asking users to reveal sensitive or personal information over the phone is referred to as _______ _________.

Social engineering

Looking at someone's computer to see sensitive information they type in or display is called what?

Shoulder surfing

A problem in the coding of software that is used by an attacker is called what?

An exploit

Malware that attaches itself to an executable program and does damage to your computer is called what?

Virus

Malware that self-replicates and carries a payload of other malware is called what?

Worm

A program that appears to be beneficial but is actually malware is called what?

Trojan horse

Malware that tracks your Internet activity and sells that information to marketers is called what?

Spyware

Malware that extorts those infected to pay a fee to remove the malware is called what?

Ransomware

Excessive, unwanted email is referred to as what?

Spam

If you forget a password, what type of software can help you recover it?

Password cracker

The three types of intellectual property protection are what?

Trademarks, copyrights, and patents

A(n) ____ is used for intellectual property protection of a logo, word, or words.

Trademark

A(n) ____ is used for intellectual property protection of a book or a song.

Copyright

A(n) ____ is used for intellectual property protection of an invention.

Patent

What are five examples of confidentiality concerns?

Snooping, eavesdropping, wiretapping, social engineering, and dumpster diving

What are four examples of integrity concerns?

Man-in-the-middle, replay attack, impersonation, unauthorized information alteration

What are five examples of availability concerns?

Denial of service, power outage, hardware failure, destruction, service outage

In information security, a(n) _____ concern is one that involves maintaining privacy of data.

Confidentiality

In information security, a(n) _____ concern is one that involves ensuring the data is true and accurate.

Integrity

In information security, a(n) _____ concern is one that involves ensuring the data is accessible when users need it.

Availability

Requiring another form of identification in addition to a password in order to log in is known as what?

Multifactor authentication

List examples of authentication factors.

Password, PIN, one-time password, software token, hardware token, biometrics, specific location, security questions

When a user types a password once and is given access to multiple systems, what is that called?

Single sign-on

What security concept asks the question, "Who are you?

Authentication

What security concept determines what you can do on a network?

Authorization

When assigning security permissions, always follow the _____ ______ model.

Least privilege

When users are allowed to assign their own permissions, that is known as a ______ access control model.

Discretionary

When users are assigned permissions based on job function and can't be assigned permissions based on their user account, that is known as a ______ access control model.

Role-based

Which access control model uses security labels, classifications, and categories?

Mandatory access control

Which security concept is responsible for tracking user actions on a system?

Accounting

Which security concept ensures that users can't deny that an event took place?

Nonrepudiation

Two ways to track user actions on a system are what?

Logs and web browser history

What are four examples of nonrepudiation factors?

Video, biometrics, signature, receipt

To harden a device, you can disable communications features such as ____ and ____.

Bluetooth, NFC

The key combination of _______ lets a user lock their computer when they leave.

Ctrl+Alt+Delete

_____ is the process of scrambling the data in user files so that others cannot read them.

Encryption

To protect a computer against viruses and spyware, install _______.

Antimalware

The three types of accounts on a computer are what?

Administrator, user, and guest

The _____ user account should be disabled for security purposes unless it is being used.

Guest

Passwords should not be ____ among different websites.

Reused

Many companies will have passwords _____ periodically as part of a security policy.

Expire

The process of providing proper credentials to access a computer resource is called ______.

Authentication

Needing to provide a password and present a smart card to log in is an example of _____ ______.

Multifactor authentication

The three types of information used in multifactor authentication are what?

Something you know, something you have, something you are

The ability to enter login information once and have it transfer to other systems is called what?

Single sign-on

Risks of using public workstations include what three things?

Shoulder surfing, keyloggers (or other malware), unsecured wireless networks

_____ Wi-Fi networks are unsecure and should not be used.

Open

What should be true about a web browser's version before you use it?

It should be the most current version.

What is the name of the feature that completes your name and address for you in web pages?

Autofill

What is the name of a file a website downloads to your computer to identify you?

Cookie

What are two ways to identify a secure website?

Starts with HTTPS:// and has a lock symbol in the address bar

What are three symptoms of adware?

Constant pop-ups, home page (or browser) redirection, search engine redirection

To protect your security, you should limit the use of ______ on the Internet.

Personally identifiable information (PII)

What should you not do if you receive a hyperlink or attachment in a suspicious email?

Click it.

The first place to check when you have a device failure or question is where?

The manufacturer's documentation or website

Which three external issues should you check for when troubleshooting a computer?

Loose cables or connectors, power, and physical damage

In addition to manufacturer documentation and websites, what are two external resources to check for technical help?

Technical community groups, Internet search, and technical support

To preserve your data in the case of hardware failure, you should _______ your data.

Back up

To make sure you run consistent software backups, be sure to ______ them.

Schedule

If you have important data that changes often, you should run backups more _______.

Frequently

What are three options for backup storage locations?

Locally attached storage, network-attached storage, off-site/cloud

Which backup storage location option is the fastest? Local, network, or cloud?

Local

After backing up data, what is the first thing you should do?

Test and verify that the backup works.