Connections in Technology
16 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How many bytes are in a kilobyte (KB)?

  • 100 bytes
  • 500 bytes
  • 1000 bytes (correct)
  • 2000 bytes
  • Which of the following represents a terabyte (TB) in bytes?

  • 1,000,000,000,000 bytes (correct)
  • 1,000,000,000 bytes
  • 1,000,000,000,000,000 bytes
  • 1,000,000 bytes
  • What does Mbps stand for in data transmission?

  • Mega bytes per second
  • Megabits per second (correct)
  • Megacycles per second
  • Megaliters per second
  • Which type of value is represented as true or false?

    <p>Boolean</p> Signup and view all the answers

    What is the primary purpose of access control in data security?

    <p>Controlling who has access to data</p> Signup and view all the answers

    What does data exfiltration refer to?

    <p>Unauthorized removal of data from a network</p> Signup and view all the answers

    Which of the following is NOT considered a security control?

    <p>Internal audit</p> Signup and view all the answers

    Which of the following is a non-physical connection method?

    <p>Wireless connection</p> Signup and view all the answers

    Which of the following describes NFC (Near Field Communication)?

    <p>A short-range communication technology that requires physical contact.</p> Signup and view all the answers

    What is the main function of a CPU?

    <p>To process instructions and act as the brain of the computer.</p> Signup and view all the answers

    Which storage type is known for having no moving parts?

    <p>SSD (Solid State Drive).</p> Signup and view all the answers

    What is the primary purpose of a Modem?

    <p>To convert analog signals into digital data.</p> Signup and view all the answers

    What type of memory is volatile?

    <p>Memory that is only kept while there is power.</p> Signup and view all the answers

    Which of the following accurately describes a Fiber Optic connection?

    <p>A technology that uses glass to transmit data over long distances.</p> Signup and view all the answers

    Which component is responsible for controlling visuals displayed on a screen?

    <p>GPU (Graphic Processing Unit).</p> Signup and view all the answers

    What does the acronym DSL stand for in internet technology?

    <p>Digital Subscriber Line.</p> Signup and view all the answers

    Study Notes

    Connections

    • Bluetooth is a short-range wireless connection technology.
    • Near Field Communication (NFC) is a short-range wireless communication technology that requires physical contact.
    • Universal Serial Bus (USB) is a standard interface for connecting computers and electronic devices.
    • Firewire is a high-speed serial bus interface standard, also known as IEEE 1394.
    • Thunderbolt is a high-speed interface technology originally developed by Intel for Apple products, now using a USB-C connector.
    • Radio Frequency (RF) is a type of wireless communication that uses radio waves.
    • High-Definition Multimedia Interface (HDMI) is a digital interface standard that transmits both video and audio signals.
    • DisplayPort is a digital display interface standard using a 20-pin connector.
    • Video Graphics Array (VGA) is a analog video interface standard using a 15-pin connector, most common.
    • Digital Visual Interface (DVI) is a digital video interface standard.

    Computer Hardware Components

    • Firmware is software embedded in hardware to control its basic operations.
    • Random Access Memory (RAM) is a temporary storage location for data and programs that the CPU is actively using. It is volatile, meaning data is lost when power is turned off.
    • Central Processing Unit (CPU) is the "brain" of a computer, responsible for executing instructions and processing data.
    • Advanced RISC Machine (ARM) is a type of CPU architecture commonly used in mobile devices.
    • Graphics Processing Unit (GPU) is a specialized electronic circuit that accelerates the creation of images, videos, and other visual content.
    • Storage refers to the devices used to store data permanently.
    • Hard Drive is a magnetic storage device with moving parts, used for long-term data storage.
    • Solid State Drive (SSD) is a flash memory-based storage device with no moving parts, offering faster performance and durability.
    • Cooling systems prevent overheating in electronic devices.
    • Network Interface Card (NIC) allows a computer to connect to a network.
    • Onboard components are integrated into the motherboard.
    • Add-on cards are devices connected to the motherboard via expansion slots.

    Network & Internet Technologies

    • Fiber Optic is a high-speed internet connection technology that uses light signals transmitted through glass fibers.
    • Hybrid Fiber Coax (HFC) is a cable internet service that uses a combination of fiber optic and coaxial cables.
    • Digital Subscriber Line (DSL) is a high-speed internet connection service that uses existing telephone lines. Typically used in Small Office/Home Office (SOHO) environments.
    • Radio Frequency (RF) is used for local wireless networks, based on Wi-Fi standards.
    • Satellite internet provides broader coverage and is used for home internet services.
    • Cellular internet uses radio transmitters (mobile phone networks), relying on cell towers and base stations.
    • Network Attached Storage (NAS) is a specialized storage device that provides network file access protocols.
    • File Server is a central computer that manages and shares files on a network.
    • Cloud Storage is a way to store data remotely on servers owned and maintained by a third party.
    • Domain Name System (DNS) translates human-readable domain names into numerical IP addresses.

    Network Components

    • Local Area Network (LAN) connects computers and devices within a limited geographical area, such as a home, office, or building.
    • Wide Area Network (WAN) connects computers and devices over a large geographical area, like college campuses, data centers, or across countries.
    • Wireless Access Point (WAP) is a wireless device that connects to a wired network and serves as a central hub for wireless communication.
    • Internet Protocol (IP) address is a numerical label assigned to devices on a network, enabling communication.
    • Media Access Control (MAC) address is a unique identifier that identifies a device on a network.

    Data & Communication

    • Modem is a device that converts digital data into analog signals for transmission over telephone lines or other communication channels.
    • Bit is the smallest unit of data, representing a 0 or a 1.
    • Byte is made up of 8 bits.
    • Kilobyte (KB) is 1000 bytes (1 thousand).
    • Megabyte (MB) is 1,000,000 bytes (1 million).
    • Gigabyte (GB) is 1,000,000,000 bytes (1 billion).
    • Terabyte (TB) is 1,000,000,000,000 bytes (1 trillion).
    • Petabyte (PB) is 1,000,000,000,000,000 bytes (1 quadrillion).
    • Kilobits per second (Kbps) is 1000 bits per second.
    • Megabits per second (Mbps) is 1,000,000 bits per second (1 million).
    • Gigabits per second (Gbps) is 1,000,000,000 bits per second (1 billion).
    • Terabits per second (Tbps) is 1,000,000,000,000 bits per second (1 trillion).
    • Megahertz (MHz) is 1,000,000 cycles per second (1 million).
    • Gigahertz (GHz) is 1,000,000,000 cycles per second (1 billion).
    • Integer a whole number.
    • Floating Point a number that can have a decimal.
    • Boolean a logical value that can be either true or false (1 or 0).
    • Character any symbol.
    • String a sequence of characters.
    • Unicode is an international character encoding standard that assigns a unique numeric value to every character used in different languages.

    Data Value & Security

    • Data is a valuable asset that needs protection.
    • Security Control is a mechanism designed to protect data assets.
    • Return on Security Investment (ROSI) measures the cost of data loss and the likelihood of it occurring.
    • Data Exfiltration is the unauthorized removal of data from a network.
    • Data Breach is the exposure of private data to the public.
    • Examples of security controls include:
      • Backup: Ensuring data copies are available and easily accessible.
      • Access Control: Restricting who can access data.
      • Permissions: Determining what actions users are authorized to perform on data (e.g., edit, view, suggest).

    Connection Types

    • Wired connections physically link devices using cables.
      • RJ-11 telephone cable has four wires (black, red, green, yellow).
      • RJ-45 ethernet cable has eight wires (white/orange, orange, white/green, blue, white/blue, green, white/brown, brown).
    • Wireless connections use radio waves to connect devices without physical cables.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    IT.pdf

    Description

    Explore various connectivity technologies in this quiz. Test your knowledge on standards such as Bluetooth, USB, HDMI, and more. Understand their applications and differences in modern electronics.

    More Like This

    Use Quizgecko on...
    Browser
    Browser