Podcast
Questions and Answers
Which computing device is best suited for large-scale organizational use?
Which computing device is best suited for large-scale organizational use?
- Smartphone
- Tablet
- Mainframe (correct)
- Laptop
ROM (Read-Only Memory) is an example of temporary, volatile memory.
ROM (Read-Only Memory) is an example of temporary, volatile memory.
False (B)
What type of computer component converts AC power to DC power?
What type of computer component converts AC power to DC power?
Power Supply
The connector commonly used for Ethernet connections is the _______ port.
The connector commonly used for Ethernet connections is the _______ port.
Match the following operating systems with their key features:
Match the following operating systems with their key features:
Which software license allows users to modify and share the code?
Which software license allows users to modify and share the code?
Freeware software requires a paid license for use.
Freeware software requires a paid license for use.
What is the file extension commonly associated with Microsoft Excel files?
What is the file extension commonly associated with Microsoft Excel files?
A _______ is a type of malware that disguises itself as a legitimate application to trick users.
A _______ is a type of malware that disguises itself as a legitimate application to trick users.
Which of the following is a goal of ransomware?
Which of the following is a goal of ransomware?
Vishing involves attempting to obtain sensitive information through email correspondence.
Vishing involves attempting to obtain sensitive information through email correspondence.
What is the name of the social engineering attack where someone directly observes another person entering their password?
What is the name of the social engineering attack where someone directly observes another person entering their password?
In File Explorer, the _______ displays file properties such as size and type.
In File Explorer, the _______ displays file properties such as size and type.
Which file extension commonly indicates a compressed file?
Which file extension commonly indicates a compressed file?
Using the shortcut Ctrl + Shift + N
creates a new text document.
Using the shortcut Ctrl + Shift + N
creates a new text document.
What does LAN stand for in the context of networking?
What does LAN stand for in the context of networking?
The _______ protocol is a secure version of HTTP, indicated by a lock icon in the browser's address bar.
The _______ protocol is a secure version of HTTP, indicated by a lock icon in the browser's address bar.
Which wireless technology is known for its short-range capabilities and is often used in tap-to-pay systems?
Which wireless technology is known for its short-range capabilities and is often used in tap-to-pay systems?
According to the 20-20-20 rule for eye strain prevention, one should look at an object 20 feet away for 20 seconds every 20 minutes.
According to the 20-20-20 rule for eye strain prevention, one should look at an object 20 feet away for 20 seconds every 20 minutes.
What type of device disposal is recommended for CRT monitors due to the toxic lead content?
What type of device disposal is recommended for CRT monitors due to the toxic lead content?
Flashcards
Supercomputer
Supercomputer
Fastest and most expensive type of computing device.
Mainframe
Mainframe
Computing device used for large-scale organizational tasks.
Laptop
Laptop
Portable, all-in-one computing device.
Tablet
Tablet
Signup and view all the flashcards
Smartphone
Smartphone
Signup and view all the flashcards
PDA
PDA
Signup and view all the flashcards
CPU
CPU
Signup and view all the flashcards
RAM
RAM
Signup and view all the flashcards
ROM
ROM
Signup and view all the flashcards
Motherboard
Motherboard
Signup and view all the flashcards
Power Supply
Power Supply
Signup and view all the flashcards
USB
USB
Signup and view all the flashcards
RJ-45
RJ-45
Signup and view all the flashcards
Windows
Windows
Signup and view all the flashcards
macOS
macOS
Signup and view all the flashcards
Linux
Linux
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Study Notes
- Complete IT Fundamentals Review covers Hardware, Software, Security, Networking & Safety
Computer Hardware
Computing Devices
- Supercomputers are the fastest and most expensive computing devices
- Mainframes are used for large-scale organizational tasks
- Laptops are portable all-in-one systems
- Tablets have touchscreens and fit between phones and laptops in terms of size and functionality
- Smartphones are multifunction mobile devices
- PDAs (Personal Digital Assistants) served as early mobile business tools
- Mnemonic: "Super Machines Love Tiny Smart Phones"
Internal Components
- CPU (Central Processing Unit) is the processor or "brain" of the computer
- RAM (Random Access Memory) is temporary (volatile) memory
- ROM (Read-Only Memory) is permanent (non-volatile) memory
- The motherboard is the system backbone
- The power supply converts AC (Alternating Current) to DC (Direct Current)
- USB (Universal Serial Bus) is a universal peripheral connection
- RJ-45 is for Ethernet, while RJ-11 is for telephone connections
Operating Systems & Software
OS Types
- Windows (e.g., Windows 11) is the most popular desktop OS
- macOS (e.g., Monterey) is UNIX-based and exclusive to Apple products
- Linux (e.g., Ubuntu) is open-source and customizable
- Mobile OS include Android and iOS, both of which are touch-optimized
Software Licenses
- Open Source allows users to modify and share code (e.g., Linux)
- Freeware is free but closed-source (e.g., Adobe PDF Reader)
- Commercial software is paid (e.g., Microsoft Office)
- Productivity software examples: .docx (Word), .xlsx (Excel), .pptx (PowerPoint)
Security Threats
Malware Types
- Viruses spread via infected files and corrupt data
- Worms are self-replicating and overload networks
- Trojans disguise themselves as legitimate apps to steal data
- Ransomware uses email attachments to encrypt files for ransom
Social Engineering Attacks
- Phishing involves fake emails
- Vishing involves fake calls
- Shoulder surfing means peeking at passwords
- Mnemonic: "Viruses Want To Ruin Your Day"
File Management
File Explorer Components
- The Pane shows the folder hierarchy
- Details show file properties like size and type
- Preview displays content without opening the file
File Extensions
- Compressed files use extensions like .zip and .rar
- Executable files use extensions like .exe and .msi
- Media files use extensions like .mp3 (audio) and .mp4 (video)
Win + E
opens File ExplorerCtrl + Shift + N
creates a new folder
Networking Basics
Network Types
- LAN (Local Area Network) is for local networks like home or office
- WAN (Wide Area Network) is internet-scale
- HTTPS is secure
Protocols
- FTP (File Transfer Protocol) is used for file transfers
Wireless Tech
- Bluetooth is for short-range wireless communication
- NFC (Near Field Communication) is used for tap-to-pay systems like Apple Pay
Ergonomics & Safety
Best Practices
- Monitor should be at eye level
- Keyboard and mouse should be positioned so arms are at 90°
- The 20-20-20 rule helps prevent eye strain
Device Disposal
- CRT monitors should be recycled due to toxic lead content
- Batteries and toner require special disposal
Power Devices
- Surge protectors block voltage spikes
- UPS (Uninterruptible Power Supply) provides backup power during outages
Practice Questions
- Ethernet ports use RJ-45 connectors
- "Volatile" in RAM means it loses data when powered off
- .pptx files are opened with PowerPoint
Study Tools
- Use flashcards (e.g., with Anki) for malware types and file extensions
- Sketch a motherboard with labeled components
- Hands-on practice includes file compression (.zip) and setting up an ergonomic workstation
Bonus
- Focus on security threats, file extensions, and hardware components for quick review
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.