Comptia
43 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Where does the Central Processing Unit (CPU) live in a computer?

  • On the network
  • On the back of the computer
  • On the hard disk
  • On the motherboard (correct)
  • Which of these is a Disaster Recovery concern?

  • Contingency Planning
  • Network Redundancy
  • Prioritization
  • Fault tolerance (correct)
  • What three elements are required for a computer to perform useful tasks?

  • The hardware, software, and the computer's user
  • A Mouse, keyboard, and the Central Processing Unit (CPU)
  • The computer, Central Processing unit (CPU), and Random Access Memory (RAM) (correct)
  • The Hardware, monitor, and printer
  • Why would you virtualize an environment?

    <p>To use hardware and software resources effectively, potentially to save time and money</p> Signup and view all the answers

    Which of these is NOT a form of malware?

    <p>Software</p> Signup and view all the answers

    Which Redundant Array of Independent Disks (RAID) has only striping with parity?

    <p>RAID 5</p> Signup and view all the answers

    Which is NOT an example of a Relational Database Management Systems (RDBMS)?

    <p>Microsoft Office Excel</p> Signup and view all the answers

    How does Plug-and-Play Installation work?

    <p>When a user connects a new device, Windows identifies it and attempts to install a new device driver</p> Signup and view all the answers

    Which of the following would achieve only this result?

    <p>DROP</p> Signup and view all the answers

    Which best defines Access Control on a computing device?

    <p>Controlling who has the ability to use the device, or information stored on the device.</p> Signup and view all the answers

    Which of these is an Integrity concern?

    <p>Man-in-the-middle</p> Signup and view all the answers

    Which is an example of a Human Interface Device (HID)?

    <p>A customer uses a keyboard to enter a username and password into a shopping application.</p> Signup and view all the answers

    When does a new creation become 'copyrighted'?

    <p>Creations are copyrighted immediately upon creation.</p> Signup and view all the answers

    How does a search engine work?

    <p>A search engine usually works by compiling a database of information about web pages.</p> Signup and view all the answers

    What is used to prove a program was created by a trustworthy software publisher?

    <p>Digital certificate</p> Signup and view all the answers

    USB and thumb drives are examples of which type of storage device?

    <p>Flash memory</p> Signup and view all the answers

    Which of these is an Availability concern?

    <p>Destruction</p> Signup and view all the answers

    Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?

    <p>Integrity</p> Signup and view all the answers

    What is the physical address of a network interface called?

    <p>MAC address</p> Signup and view all the answers

    Of the following, which language is typically used with markup language?

    <p>CSS</p> Signup and view all the answers

    What is the principle that grants users the rights necessary to perform their job and no more?

    <p>Least privilege</p> Signup and view all the answers

    What is the purpose of Task Scheduler?

    <p>Task Scheduler is used to schedule tasks to run at a specific time.</p> Signup and view all the answers

    Which best defines ergonomics?

    <p>Ergonomics is the study of factors affecting the performance of people at work.</p> Signup and view all the answers

    Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server?

    <p>IMAP</p> Signup and view all the answers

    What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?

    <p>Kinetics</p> Signup and view all the answers

    How is open source code used by developers?

    <p>It is code used by developers that they have the rights to modify without requiring permission to meet their project needs.</p> Signup and view all the answers

    In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?

    <p>Security assurance</p> Signup and view all the answers

    In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?

    <p>Queries</p> Signup and view all the answers

    When considering application interaction, an example of programmatic access can be best defined as what?

    <p>A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.</p> Signup and view all the answers

    Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?

    <p>C++</p> Signup and view all the answers

    What do we call an online network where each client contributes resources to the network instead of a central server?

    <p>Peer-to-Peer</p> Signup and view all the answers

    Mobile devices detect the device's movement by using accelerometers and what other device?

    <p>Gyroscopes</p> Signup and view all the answers

    What is the main purpose of the Power-On Self-Test (POST)?

    <p>The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads the Operating System.</p> Signup and view all the answers

    With which method could an attacker use sniffing?

    <p>Eavesdropping</p> Signup and view all the answers

    What functionality can turn off a mobile device's Wi-Fi without shutting off the device?

    <p>Airplane mode</p> Signup and view all the answers

    Which of these is a Business Continuity concern?

    <p>Fault tolerance</p> Signup and view all the answers

    How can you modify your File Explorer options to allow you to view hidden files?

    <p>Use the View tab under the File Explorer Options applet.</p> Signup and view all the answers

    In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?

    <p>Details</p> Signup and view all the answers

    Which best defines the throughput rate of a device at any given time?

    <p>The measurement of data transferred between computers over a network.</p> Signup and view all the answers

    You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?

    <p>If the printer is not a plug and play device, it does not require a driver.</p> Signup and view all the answers

    Select the best example of using dual monitors with multiple windows in Extended mode:

    <p>An accountant uses both monitors side-by-side to stretch out one Excel spreadsheet so that it can be displayed in its entirety.</p> Signup and view all the answers

    What would be considered a downside to producing digital products?

    <p>They are easy to copy and steal.</p> Signup and view all the answers

    Which of these is a protocol used to upload and download files between clients and servers?

    <p>FTP</p> Signup and view all the answers

    Study Notes

    Hardware and Networks

    • Dual monitors can be used in Extended mode to increase productivity, e.g., a sales rep using a PowerPoint presentation on one monitor and facing customers on the other.
    • A NIC (Network Interface Card) is used to connect a computer to a network.
    • A downsides of producing digital products is that they are easy to copy and steal.

    Operating System

    • The purpose of BIOS is to drive the bootstrapping process.
    • Enterprise Client is a type of workstation operating system best used on a business network.

    Programming

    • Procedures and functions are used to create reusable segments of code.
    • OOP (Object-Oriented Programming) is a programming paradigm that represents a way of designing and organizing software systems.

    Security

    • Social engineering attacks include dumpster diving, impersonation, and shoulder surfing.
    • Access control is used to control who has the ability to use a device or information stored on it.
    • Confidentiality, Integrity, and Availability (CIA) triad is a model used to ensure the security of data.
    • Authentication lockout policy is used to prevent unauthorized access to a device, e.g., locking the device for a set period after multiple failed login attempts.

    Data Storage

    • exFAT is a file system that provides larger maximum file sizes than FAT and NTFS and can store file sizes up to 2TB.
    • RAM is a volatile storage device, meaning data is only stored as long as there is a power source.
    • Hard disk drives store data magnetically on a platter that spins.

    Software and Applications

    • Applications (or Apps) are software programs that let users do useful things with their computer, such as create and edit documents.
    • Task Manager is commonly used to end an unresponsive process that cannot be closed from the application window itself.

    Internet and Web

    • FTP is a protocol used to upload and download files between clients and servers.
    • A plug-in is a type of add-on for a web browser.
    • Attenuation is the loss of strength of a wireless signal.

    File Systems and Management

    • The two interfaces used for configuring input devices are the Settings app and Control Panel.
    • A folder in a Windows file system can be identified by its path, e.g., C:\MyFiles.

    Network and Communication

    • Data moves through a computer system in the following order: input, processing, output, and storage.
    • Man-in-the-middle, wiretapping, and replay are examples of Integrity concerns.

    Database and Information Systems

    • A database administrator can remove a table from a database using Data Definition Language (DDL) commands, such as DROP.
    • Ergonomics is the study of factors affecting the performance of people at work.

    General Computing

    • Digital certificates are used to prove a program was created by a trustworthy software publisher.
    • USB and thumb drives are examples of flash memory storage devices.
    • The physical address of a network interface is called a MAC address.
    • Task Scheduler is used to schedule tasks to run at a specific time.

    Miscellaneous

    • The principle of least privilege grants users the rights necessary to perform their job and no more.
    • Kinetics is a term that refers to operating a device by moving it around or using a camera in the device to recognize hand movements.### Database Management
    • Administrators use tools like phpMyAdmin to connect and sign in to an RDBMS.
    • Applications can use a database in the background without the user's awareness.
    • GUIs provide users with a way to select actions to perform on a database, converting those selections to SQL statements.

    Networking

    • A peer-to-peer (P2P) network is an online network where each client contributes resources to the network.

    Hardware and Mobile Devices

    • Mobile devices detect movement using accelerometers and gyroscopes.
    • The Power-On Self-Test (POST) checks that the main components of a computer work and then loads the Operating System.
    • Airplane mode can turn off a mobile device's Wi-Fi without shutting off the device.

    Security and Threats

    • Eavesdropping is a method an attacker can use to sniff data.
    • Fault tolerance is a Business Continuity concern.

    File Management and Operating Systems

    • File Explorer options can be modified to allow viewing of hidden files.
    • The View tab under the File Explorer Options applet is used to modify these options.
    • The Details tab in an application's properties is useful for troubleshooting, as it shows whether a version with the latest patches is running.

    Performance and Troubleshooting

    • Throughput rate measures the amount of data transferred between computers over a network.
    • Installing a non-plug-and-play printer requires finding and installing the driver.

    Computer Components

    • The Central Processing Unit (CPU) lives on the motherboard.

    Disaster Recovery and Planning

    • Contingency Planning is a Disaster Recovery concern.

    Virtualization and Environment

    • Virtualizing an environment allows for effective use of hardware and software resources, potentially saving time and money.

    Malware and Security

    • Software is not a form of malware.

    Web and Internet

    • A cookie is a plain text file created by a website when a user visits it.

    Storage and RAID

    • RAID 5 has only striping with parity.

    Database Management Systems (RDBMS)

    • Microsoft Office Excel is not an example of a Relational Database Management System (RDBMS).

    Installation and Configuration

    • Plug-and-play installation works by identifying a new device and attempting to install a new device driver.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Comptia.pdf

    More Like This

    Comptia GCGA Chapter 6 Flashcards
    57 questions
    CompTIA Troubleshooting Steps
    7 questions
    CompTIA A+ 901 Flashcards
    13 questions
    CompTIA A+ Certification Flashcards
    26 questions
    Use Quizgecko on...
    Browser
    Browser