Podcast
Questions and Answers
Where does the Central Processing Unit (CPU) live in a computer?
Where does the Central Processing Unit (CPU) live in a computer?
Which of these is a Disaster Recovery concern?
Which of these is a Disaster Recovery concern?
What three elements are required for a computer to perform useful tasks?
What three elements are required for a computer to perform useful tasks?
Why would you virtualize an environment?
Why would you virtualize an environment?
Signup and view all the answers
Which of these is NOT a form of malware?
Which of these is NOT a form of malware?
Signup and view all the answers
Which Redundant Array of Independent Disks (RAID) has only striping with parity?
Which Redundant Array of Independent Disks (RAID) has only striping with parity?
Signup and view all the answers
Which is NOT an example of a Relational Database Management Systems (RDBMS)?
Which is NOT an example of a Relational Database Management Systems (RDBMS)?
Signup and view all the answers
How does Plug-and-Play Installation work?
How does Plug-and-Play Installation work?
Signup and view all the answers
Which of the following would achieve only this result?
Which of the following would achieve only this result?
Signup and view all the answers
Which best defines Access Control on a computing device?
Which best defines Access Control on a computing device?
Signup and view all the answers
Which of these is an Integrity concern?
Which of these is an Integrity concern?
Signup and view all the answers
Which is an example of a Human Interface Device (HID)?
Which is an example of a Human Interface Device (HID)?
Signup and view all the answers
When does a new creation become 'copyrighted'?
When does a new creation become 'copyrighted'?
Signup and view all the answers
How does a search engine work?
How does a search engine work?
Signup and view all the answers
What is used to prove a program was created by a trustworthy software publisher?
What is used to prove a program was created by a trustworthy software publisher?
Signup and view all the answers
USB and thumb drives are examples of which type of storage device?
USB and thumb drives are examples of which type of storage device?
Signup and view all the answers
Which of these is an Availability concern?
Which of these is an Availability concern?
Signup and view all the answers
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?
Signup and view all the answers
What is the physical address of a network interface called?
What is the physical address of a network interface called?
Signup and view all the answers
Of the following, which language is typically used with markup language?
Of the following, which language is typically used with markup language?
Signup and view all the answers
What is the principle that grants users the rights necessary to perform their job and no more?
What is the principle that grants users the rights necessary to perform their job and no more?
Signup and view all the answers
What is the purpose of Task Scheduler?
What is the purpose of Task Scheduler?
Signup and view all the answers
Which best defines ergonomics?
Which best defines ergonomics?
Signup and view all the answers
Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server?
Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server?
Signup and view all the answers
What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?
What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?
Signup and view all the answers
How is open source code used by developers?
How is open source code used by developers?
Signup and view all the answers
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?
Signup and view all the answers
In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?
In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?
Signup and view all the answers
When considering application interaction, an example of programmatic access can be best defined as what?
When considering application interaction, an example of programmatic access can be best defined as what?
Signup and view all the answers
Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?
Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?
Signup and view all the answers
What do we call an online network where each client contributes resources to the network instead of a central server?
What do we call an online network where each client contributes resources to the network instead of a central server?
Signup and view all the answers
Mobile devices detect the device's movement by using accelerometers and what other device?
Mobile devices detect the device's movement by using accelerometers and what other device?
Signup and view all the answers
What is the main purpose of the Power-On Self-Test (POST)?
What is the main purpose of the Power-On Self-Test (POST)?
Signup and view all the answers
With which method could an attacker use sniffing?
With which method could an attacker use sniffing?
Signup and view all the answers
What functionality can turn off a mobile device's Wi-Fi without shutting off the device?
What functionality can turn off a mobile device's Wi-Fi without shutting off the device?
Signup and view all the answers
Which of these is a Business Continuity concern?
Which of these is a Business Continuity concern?
Signup and view all the answers
How can you modify your File Explorer options to allow you to view hidden files?
How can you modify your File Explorer options to allow you to view hidden files?
Signup and view all the answers
In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?
In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?
Signup and view all the answers
Which best defines the throughput rate of a device at any given time?
Which best defines the throughput rate of a device at any given time?
Signup and view all the answers
You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?
You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?
Signup and view all the answers
Select the best example of using dual monitors with multiple windows in Extended mode:
Select the best example of using dual monitors with multiple windows in Extended mode:
Signup and view all the answers
What would be considered a downside to producing digital products?
What would be considered a downside to producing digital products?
Signup and view all the answers
Which of these is a protocol used to upload and download files between clients and servers?
Which of these is a protocol used to upload and download files between clients and servers?
Signup and view all the answers
Study Notes
Hardware and Networks
- Dual monitors can be used in Extended mode to increase productivity, e.g., a sales rep using a PowerPoint presentation on one monitor and facing customers on the other.
- A NIC (Network Interface Card) is used to connect a computer to a network.
- A downsides of producing digital products is that they are easy to copy and steal.
Operating System
- The purpose of BIOS is to drive the bootstrapping process.
- Enterprise Client is a type of workstation operating system best used on a business network.
Programming
- Procedures and functions are used to create reusable segments of code.
- OOP (Object-Oriented Programming) is a programming paradigm that represents a way of designing and organizing software systems.
Security
- Social engineering attacks include dumpster diving, impersonation, and shoulder surfing.
- Access control is used to control who has the ability to use a device or information stored on it.
- Confidentiality, Integrity, and Availability (CIA) triad is a model used to ensure the security of data.
- Authentication lockout policy is used to prevent unauthorized access to a device, e.g., locking the device for a set period after multiple failed login attempts.
Data Storage
- exFAT is a file system that provides larger maximum file sizes than FAT and NTFS and can store file sizes up to 2TB.
- RAM is a volatile storage device, meaning data is only stored as long as there is a power source.
- Hard disk drives store data magnetically on a platter that spins.
Software and Applications
- Applications (or Apps) are software programs that let users do useful things with their computer, such as create and edit documents.
- Task Manager is commonly used to end an unresponsive process that cannot be closed from the application window itself.
Internet and Web
- FTP is a protocol used to upload and download files between clients and servers.
- A plug-in is a type of add-on for a web browser.
- Attenuation is the loss of strength of a wireless signal.
File Systems and Management
- The two interfaces used for configuring input devices are the Settings app and Control Panel.
- A folder in a Windows file system can be identified by its path, e.g., C:\MyFiles.
Network and Communication
- Data moves through a computer system in the following order: input, processing, output, and storage.
- Man-in-the-middle, wiretapping, and replay are examples of Integrity concerns.
Database and Information Systems
- A database administrator can remove a table from a database using Data Definition Language (DDL) commands, such as DROP.
- Ergonomics is the study of factors affecting the performance of people at work.
General Computing
- Digital certificates are used to prove a program was created by a trustworthy software publisher.
- USB and thumb drives are examples of flash memory storage devices.
- The physical address of a network interface is called a MAC address.
- Task Scheduler is used to schedule tasks to run at a specific time.
Miscellaneous
- The principle of least privilege grants users the rights necessary to perform their job and no more.
- Kinetics is a term that refers to operating a device by moving it around or using a camera in the device to recognize hand movements.### Database Management
- Administrators use tools like phpMyAdmin to connect and sign in to an RDBMS.
- Applications can use a database in the background without the user's awareness.
- GUIs provide users with a way to select actions to perform on a database, converting those selections to SQL statements.
Networking
- A peer-to-peer (P2P) network is an online network where each client contributes resources to the network.
Hardware and Mobile Devices
- Mobile devices detect movement using accelerometers and gyroscopes.
- The Power-On Self-Test (POST) checks that the main components of a computer work and then loads the Operating System.
- Airplane mode can turn off a mobile device's Wi-Fi without shutting off the device.
Security and Threats
- Eavesdropping is a method an attacker can use to sniff data.
- Fault tolerance is a Business Continuity concern.
File Management and Operating Systems
- File Explorer options can be modified to allow viewing of hidden files.
- The View tab under the File Explorer Options applet is used to modify these options.
- The Details tab in an application's properties is useful for troubleshooting, as it shows whether a version with the latest patches is running.
Performance and Troubleshooting
- Throughput rate measures the amount of data transferred between computers over a network.
- Installing a non-plug-and-play printer requires finding and installing the driver.
Computer Components
- The Central Processing Unit (CPU) lives on the motherboard.
Disaster Recovery and Planning
- Contingency Planning is a Disaster Recovery concern.
Virtualization and Environment
- Virtualizing an environment allows for effective use of hardware and software resources, potentially saving time and money.
Malware and Security
- Software is not a form of malware.
Web and Internet
- A cookie is a plain text file created by a website when a user visits it.
Storage and RAID
- RAID 5 has only striping with parity.
Database Management Systems (RDBMS)
- Microsoft Office Excel is not an example of a Relational Database Management System (RDBMS).
Installation and Configuration
- Plug-and-play installation works by identifying a new device and attempting to install a new device driver.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.