IT Fundamentals: Computer Hardware

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which computing device is best suited for large-scale organizational use?

  • Smartphone
  • Tablet
  • Mainframe (correct)
  • Laptop

ROM (Read-Only Memory) is an example of temporary, volatile memory.

False (B)

What type of computer component converts AC power to DC power?

Power Supply

The connector commonly used for Ethernet connections is the _______ port.

<p>RJ-45</p>
Signup and view all the answers

Match the following operating systems with their key features:

<p>Windows = Most popular desktop OS macOS = UNIX-based, Apple exclusive Linux = Open-source, customizable Mobile OS = Touch-optimized</p>
Signup and view all the answers

Which software license allows users to modify and share the code?

<p>Open Source (B)</p>
Signup and view all the answers

Freeware software requires a paid license for use.

<p>False (B)</p>
Signup and view all the answers

What is the file extension commonly associated with Microsoft Excel files?

<p>.xlsx</p>
Signup and view all the answers

A _______ is a type of malware that disguises itself as a legitimate application to trick users.

<p>Trojan</p>
Signup and view all the answers

Which of the following is a goal of ransomware?

<p>Encrypting files for ransom (A)</p>
Signup and view all the answers

Vishing involves attempting to obtain sensitive information through email correspondence.

<p>False (B)</p>
Signup and view all the answers

What is the name of the social engineering attack where someone directly observes another person entering their password?

<p>Shoulder Surfing</p>
Signup and view all the answers

In File Explorer, the _______ displays file properties such as size and type.

<p>Details pane</p>
Signup and view all the answers

Which file extension commonly indicates a compressed file?

<p>.zip (D)</p>
Signup and view all the answers

Using the shortcut Ctrl + Shift + N creates a new text document.

<p>False (B)</p>
Signup and view all the answers

What does LAN stand for in the context of networking?

<p>Local Area Network</p>
Signup and view all the answers

The _______ protocol is a secure version of HTTP, indicated by a lock icon in the browser's address bar.

<p>HTTPS</p>
Signup and view all the answers

Which wireless technology is known for its short-range capabilities and is often used in tap-to-pay systems?

<p>NFC (C)</p>
Signup and view all the answers

According to the 20-20-20 rule for eye strain prevention, one should look at an object 20 feet away for 20 seconds every 20 minutes.

<p>True (A)</p>
Signup and view all the answers

What type of device disposal is recommended for CRT monitors due to the toxic lead content?

<p>Recycle</p>
Signup and view all the answers

Flashcards

Supercomputer

Fastest and most expensive type of computing device.

Mainframe

Computing device used for large-scale organizational tasks.

Laptop

Portable, all-in-one computing device.

Tablet

Touchscreen device that bridges smartphones and laptops.

Signup and view all the flashcards

Smartphone

Multifunction mobile communications and computing device.

Signup and view all the flashcards

PDA

Early mobile business tool.

Signup and view all the flashcards

CPU

Processor, the 'brain' of the computer.

Signup and view all the flashcards

RAM

Temporary memory that loses data when power is off.

Signup and view all the flashcards

ROM

Permanent memory that retains data even without power.

Signup and view all the flashcards

Motherboard

System backbone that connects all components.

Signup and view all the flashcards

Power Supply

Converts AC power to DC power for the computer.

Signup and view all the flashcards

USB

Universal connection for peripherals.

Signup and view all the flashcards

RJ-45

Port used for Ethernet connections.

Signup and view all the flashcards

Windows

Operating system example: Most popular desktop OS.

Signup and view all the flashcards

macOS

Operating system example: UNIX-based, Apple exclusive.

Signup and view all the flashcards

Linux

Operating system example: Open-source, customizable.

Signup and view all the flashcards

Worm

Malware that replicates itself to overload networks.

Signup and view all the flashcards

Trojan

Malware disguised as a legitimate application to steal data.

Signup and view all the flashcards

Ransomware

Malware that encrypts files for ransom.

Signup and view all the flashcards

Phishing

Fake emails designed to trick users into providing personal information.

Signup and view all the flashcards

Study Notes

  • Complete IT Fundamentals Review covers Hardware, Software, Security, Networking & Safety

Computer Hardware

Computing Devices

  • Supercomputers are the fastest and most expensive computing devices
  • Mainframes are used for large-scale organizational tasks
  • Laptops are portable all-in-one systems
  • Tablets have touchscreens and fit between phones and laptops in terms of size and functionality
  • Smartphones are multifunction mobile devices
  • PDAs (Personal Digital Assistants) served as early mobile business tools
  • Mnemonic: "Super Machines Love Tiny Smart Phones"

Internal Components

  • CPU (Central Processing Unit) is the processor or "brain" of the computer
  • RAM (Random Access Memory) is temporary (volatile) memory
  • ROM (Read-Only Memory) is permanent (non-volatile) memory
  • The motherboard is the system backbone
  • The power supply converts AC (Alternating Current) to DC (Direct Current)
  • USB (Universal Serial Bus) is a universal peripheral connection
  • RJ-45 is for Ethernet, while RJ-11 is for telephone connections

Operating Systems & Software

OS Types

  • Windows (e.g., Windows 11) is the most popular desktop OS
  • macOS (e.g., Monterey) is UNIX-based and exclusive to Apple products
  • Linux (e.g., Ubuntu) is open-source and customizable
  • Mobile OS include Android and iOS, both of which are touch-optimized

Software Licenses

  • Open Source allows users to modify and share code (e.g., Linux)
  • Freeware is free but closed-source (e.g., Adobe PDF Reader)
  • Commercial software is paid (e.g., Microsoft Office)
  • Productivity software examples: .docx (Word), .xlsx (Excel), .pptx (PowerPoint)

Security Threats

Malware Types

  • Viruses spread via infected files and corrupt data
  • Worms are self-replicating and overload networks
  • Trojans disguise themselves as legitimate apps to steal data
  • Ransomware uses email attachments to encrypt files for ransom

Social Engineering Attacks

  • Phishing involves fake emails
  • Vishing involves fake calls
  • Shoulder surfing means peeking at passwords
  • Mnemonic: "Viruses Want To Ruin Your Day"

File Management

File Explorer Components

  • The Pane shows the folder hierarchy
  • Details show file properties like size and type
  • Preview displays content without opening the file

File Extensions

  • Compressed files use extensions like .zip and .rar
  • Executable files use extensions like .exe and .msi
  • Media files use extensions like .mp3 (audio) and .mp4 (video)
  • Win + E opens File Explorer
  • Ctrl + Shift + N creates a new folder

Networking Basics

Network Types

  • LAN (Local Area Network) is for local networks like home or office
  • WAN (Wide Area Network) is internet-scale
  • HTTPS is secure

Protocols

  • FTP (File Transfer Protocol) is used for file transfers

Wireless Tech

  • Bluetooth is for short-range wireless communication
  • NFC (Near Field Communication) is used for tap-to-pay systems like Apple Pay

Ergonomics & Safety

Best Practices

  • Monitor should be at eye level
  • Keyboard and mouse should be positioned so arms are at 90°
  • The 20-20-20 rule helps prevent eye strain

Device Disposal

  • CRT monitors should be recycled due to toxic lead content
  • Batteries and toner require special disposal

Power Devices

  • Surge protectors block voltage spikes
  • UPS (Uninterruptible Power Supply) provides backup power during outages

Practice Questions

  • Ethernet ports use RJ-45 connectors
  • "Volatile" in RAM means it loses data when powered off
  • .pptx files are opened with PowerPoint

Study Tools

  • Use flashcards (e.g., with Anki) for malware types and file extensions
  • Sketch a motherboard with labeled components
  • Hands-on practice includes file compression (.zip) and setting up an ergonomic workstation

Bonus

  • Focus on security threats, file extensions, and hardware components for quick review

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Hardware Components
8 questions

Computer Hardware Components

FlatteringBronze7707 avatar
FlatteringBronze7707
Computer Hardware Basics
24 questions
Use Quizgecko on...
Browser
Browser