Podcast
Questions and Answers
Where does the Central Processing Unit (CPU) live in a computer?
Where does the Central Processing Unit (CPU) live in a computer?
- On the network
- On the back of the computer
- On the hard disk
- On the motherboard (correct)
Which of these is a Disaster Recovery concern?
Which of these is a Disaster Recovery concern?
- Contingency Planning
- Network Redundancy
- Prioritization
- Fault tolerance (correct)
What three elements are required for a computer to perform useful tasks?
What three elements are required for a computer to perform useful tasks?
- The hardware, software, and the computer's user
- A Mouse, keyboard, and the Central Processing Unit (CPU)
- The computer, Central Processing unit (CPU), and Random Access Memory (RAM) (correct)
- The Hardware, monitor, and printer
Why would you virtualize an environment?
Why would you virtualize an environment?
Which of these is NOT a form of malware?
Which of these is NOT a form of malware?
Which Redundant Array of Independent Disks (RAID) has only striping with parity?
Which Redundant Array of Independent Disks (RAID) has only striping with parity?
Which is NOT an example of a Relational Database Management Systems (RDBMS)?
Which is NOT an example of a Relational Database Management Systems (RDBMS)?
How does Plug-and-Play Installation work?
How does Plug-and-Play Installation work?
Which of the following would achieve only this result?
Which of the following would achieve only this result?
Which best defines Access Control on a computing device?
Which best defines Access Control on a computing device?
Which of these is an Integrity concern?
Which of these is an Integrity concern?
Which is an example of a Human Interface Device (HID)?
Which is an example of a Human Interface Device (HID)?
When does a new creation become 'copyrighted'?
When does a new creation become 'copyrighted'?
How does a search engine work?
How does a search engine work?
What is used to prove a program was created by a trustworthy software publisher?
What is used to prove a program was created by a trustworthy software publisher?
USB and thumb drives are examples of which type of storage device?
USB and thumb drives are examples of which type of storage device?
Which of these is an Availability concern?
Which of these is an Availability concern?
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?
What is the physical address of a network interface called?
What is the physical address of a network interface called?
Of the following, which language is typically used with markup language?
Of the following, which language is typically used with markup language?
What is the principle that grants users the rights necessary to perform their job and no more?
What is the principle that grants users the rights necessary to perform their job and no more?
What is the purpose of Task Scheduler?
What is the purpose of Task Scheduler?
Which best defines ergonomics?
Which best defines ergonomics?
Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server?
Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server?
What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?
What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?
How is open source code used by developers?
How is open source code used by developers?
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?
In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?
In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?
When considering application interaction, an example of programmatic access can be best defined as what?
When considering application interaction, an example of programmatic access can be best defined as what?
Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?
Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?
What do we call an online network where each client contributes resources to the network instead of a central server?
What do we call an online network where each client contributes resources to the network instead of a central server?
Mobile devices detect the device's movement by using accelerometers and what other device?
Mobile devices detect the device's movement by using accelerometers and what other device?
What is the main purpose of the Power-On Self-Test (POST)?
What is the main purpose of the Power-On Self-Test (POST)?
With which method could an attacker use sniffing?
With which method could an attacker use sniffing?
What functionality can turn off a mobile device's Wi-Fi without shutting off the device?
What functionality can turn off a mobile device's Wi-Fi without shutting off the device?
Which of these is a Business Continuity concern?
Which of these is a Business Continuity concern?
How can you modify your File Explorer options to allow you to view hidden files?
How can you modify your File Explorer options to allow you to view hidden files?
In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?
In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?
Which best defines the throughput rate of a device at any given time?
Which best defines the throughput rate of a device at any given time?
You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?
You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?
Select the best example of using dual monitors with multiple windows in Extended mode:
Select the best example of using dual monitors with multiple windows in Extended mode:
What would be considered a downside to producing digital products?
What would be considered a downside to producing digital products?
Which of these is a protocol used to upload and download files between clients and servers?
Which of these is a protocol used to upload and download files between clients and servers?
Study Notes
Hardware and Networks
- Dual monitors can be used in Extended mode to increase productivity, e.g., a sales rep using a PowerPoint presentation on one monitor and facing customers on the other.
- A NIC (Network Interface Card) is used to connect a computer to a network.
- A downsides of producing digital products is that they are easy to copy and steal.
Operating System
- The purpose of BIOS is to drive the bootstrapping process.
- Enterprise Client is a type of workstation operating system best used on a business network.
Programming
- Procedures and functions are used to create reusable segments of code.
- OOP (Object-Oriented Programming) is a programming paradigm that represents a way of designing and organizing software systems.
Security
- Social engineering attacks include dumpster diving, impersonation, and shoulder surfing.
- Access control is used to control who has the ability to use a device or information stored on it.
- Confidentiality, Integrity, and Availability (CIA) triad is a model used to ensure the security of data.
- Authentication lockout policy is used to prevent unauthorized access to a device, e.g., locking the device for a set period after multiple failed login attempts.
Data Storage
- exFAT is a file system that provides larger maximum file sizes than FAT and NTFS and can store file sizes up to 2TB.
- RAM is a volatile storage device, meaning data is only stored as long as there is a power source.
- Hard disk drives store data magnetically on a platter that spins.
Software and Applications
- Applications (or Apps) are software programs that let users do useful things with their computer, such as create and edit documents.
- Task Manager is commonly used to end an unresponsive process that cannot be closed from the application window itself.
Internet and Web
- FTP is a protocol used to upload and download files between clients and servers.
- A plug-in is a type of add-on for a web browser.
- Attenuation is the loss of strength of a wireless signal.
File Systems and Management
- The two interfaces used for configuring input devices are the Settings app and Control Panel.
- A folder in a Windows file system can be identified by its path, e.g., C:\MyFiles.
Network and Communication
- Data moves through a computer system in the following order: input, processing, output, and storage.
- Man-in-the-middle, wiretapping, and replay are examples of Integrity concerns.
Database and Information Systems
- A database administrator can remove a table from a database using Data Definition Language (DDL) commands, such as DROP.
- Ergonomics is the study of factors affecting the performance of people at work.
General Computing
- Digital certificates are used to prove a program was created by a trustworthy software publisher.
- USB and thumb drives are examples of flash memory storage devices.
- The physical address of a network interface is called a MAC address.
- Task Scheduler is used to schedule tasks to run at a specific time.
Miscellaneous
- The principle of least privilege grants users the rights necessary to perform their job and no more.
- Kinetics is a term that refers to operating a device by moving it around or using a camera in the device to recognize hand movements.### Database Management
- Administrators use tools like phpMyAdmin to connect and sign in to an RDBMS.
- Applications can use a database in the background without the user's awareness.
- GUIs provide users with a way to select actions to perform on a database, converting those selections to SQL statements.
Networking
- A peer-to-peer (P2P) network is an online network where each client contributes resources to the network.
Hardware and Mobile Devices
- Mobile devices detect movement using accelerometers and gyroscopes.
- The Power-On Self-Test (POST) checks that the main components of a computer work and then loads the Operating System.
- Airplane mode can turn off a mobile device's Wi-Fi without shutting off the device.
Security and Threats
- Eavesdropping is a method an attacker can use to sniff data.
- Fault tolerance is a Business Continuity concern.
File Management and Operating Systems
- File Explorer options can be modified to allow viewing of hidden files.
- The View tab under the File Explorer Options applet is used to modify these options.
- The Details tab in an application's properties is useful for troubleshooting, as it shows whether a version with the latest patches is running.
Performance and Troubleshooting
- Throughput rate measures the amount of data transferred between computers over a network.
- Installing a non-plug-and-play printer requires finding and installing the driver.
Computer Components
- The Central Processing Unit (CPU) lives on the motherboard.
Disaster Recovery and Planning
- Contingency Planning is a Disaster Recovery concern.
Virtualization and Environment
- Virtualizing an environment allows for effective use of hardware and software resources, potentially saving time and money.
Malware and Security
- Software is not a form of malware.
Web and Internet
- A cookie is a plain text file created by a website when a user visits it.
Storage and RAID
- RAID 5 has only striping with parity.
Database Management Systems (RDBMS)
- Microsoft Office Excel is not an example of a Relational Database Management System (RDBMS).
Installation and Configuration
- Plug-and-play installation works by identifying a new device and attempting to install a new device driver.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.