Intro to IT Final Exam
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which is not a primary function of an Operating System?

  • Memory Management
  • User Interface
  • Resource Allocation
  • Gravitational Inverter (correct)

Which of these is software and not hardware?

  • Central Processing Unit
  • Memory
  • Solid State Drive
  • Windows Notepad (correct)

What is a collection of data or information that is stored on a computer's storage device, such as a hard drive, SSD, or cloud storage.

  • Memory Module
  • Binary
  • Computer File (correct)
  • Mouse

With File Explorer, users can do all these except which one?

<p>Undelete Files. (D)</p> Signup and view all the answers

What is an alphabetic character assigned by the operating system to a specific storage device or partition within a computer.

<p>Computer Drive Letter (B)</p> Signup and view all the answers

What is a base-2 number system that uses only two digits: 0 and 1.

<p>binary (C)</p> Signup and view all the answers

What is a suffix at the end of a filename that indicates the file's format or type.

<p>File Extension (B)</p> Signup and view all the answers

Which of these is a single binary digit?

<p>bit (B)</p> Signup and view all the answers

What is not a common drive size?

<p>1 inch (D)</p> Signup and view all the answers

What is Gbps?

<p>Gigabits per second (A)</p> Signup and view all the answers

Which of these is equal to 1,000,000,000 bytes

<p>GB (C)</p> Signup and view all the answers

Which drive type listed is capable of faster speeds than the others?

<p>NVMe SSD (D)</p> Signup and view all the answers

Which is most secure?

<p>Using HTTPS (B)</p> Signup and view all the answers

For secure web browsing, which of these is not best practice?

<p>Visiting sites that host pirated files. (A)</p> Signup and view all the answers

What is this called? \server251\share

<p>UNC Path (C)</p> Signup and view all the answers

What is the first step in the CompTIA Troubleshooting Methodology?

<p>Identify the problem (D)</p> Signup and view all the answers

Which type of backup will always backup all changes since the last full backup?

<p>Differential (B)</p> Signup and view all the answers

Which on is not part of the CIA Triad?

<p>Authorization (D)</p> Signup and view all the answers

Which of these is not device hardening?

<p>Creating many administrative accounts in case you forget passwords (D)</p> Signup and view all the answers

Encrypts user data to extort payment for decryption keys.

<p>Ransomware (B)</p> Signup and view all the answers

Flashcards

Software (not hardware)

Computer programs or applications that tell the computer what to do.

Operating System Function (not)

A task that an OS does not typically handle.

Computer File

Stored information on a computer's storage.

Drive Letter

Designated letter for a storage device/partition.

Signup and view all the flashcards

File Explorer Action (excluded)

A function File Explorer does not perform.

Signup and view all the flashcards

File Extension

Suffix of a filename, showing file type.

Signup and view all the flashcards

Binary Number System

Uses only 0 and 1.

Signup and view all the flashcards

Bit

Single binary digit (0 or 1).

Signup and view all the flashcards

GB (Gigabyte)

1,000,000,000 bytes.

Signup and view all the flashcards

Gbps

Gigabits per second, transfer speed.

Signup and view all the flashcards

Uncommon Drive Size

Drive size not commonly used.

Signup and view all the flashcards

Fastest Drive Type

Drive with faster transfer speeds.

Signup and view all the flashcards

Insecure Web Browsing Practice

A habit that makes your browsing less secure.

Signup and view all the flashcards

Most Secure Web Practice

Technique that protects you online.

Signup and view all the flashcards

UNC Path

Network path to shared resources.

Signup and view all the flashcards

Incremental Backup

Backup that copies only changes from last backup.

Signup and view all the flashcards

First Step in Troubleshooting

Pinpoint the issue/problem.

Signup and view all the flashcards

CIA Triad Exclusion

Component omitted when describing data security principles.

Signup and view all the flashcards

Ransomware

Malware used for financial extortion by creating files/data unaccessable.

Signup and view all the flashcards

Inadequate Device Hardening

Making a device vulnerable due to security issues.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser