Networking Basics
Operating Systems
Software Types
Security Basics
User Accounts
100

What is the purpose of a network port?

A network port is a location where information is sent from one computer to another.

100

What is an operating system?

An operating system is the primary software that runs applications and manages all hardware, memory, and other software on a computer.

100

Define single-platform software and provide an example.

Single-platform software works only on one platform. For example, software designed specifically for Windows that does not work on Mac OS.

100

What is the purpose of a firewall?

A firewall blocks unwanted internet traffic while allowing legitimate traffic.

100

What is a user account?

A user account allows someone to log in to a computer with personalized settings and permissions.

200

What does a port scan check for?

A port scan checks to see which ports on a network are open.

200

List two types of operating systems.

Examples include mobile OS and workstation OS.

200

Define single-platform software and provide an example.

Single-platform software works on only one platform, such as iOS or Windows. Example: Final Cut Pro for Mac.

200

Define a computer virus.

A computer virus is a program that spreads by modifying other programs and inserting its own code.

200

What is the difference between an admin account and a regular user account?

An admin account has full access to manage users and settings, while a regular user account has limited permissions.

300

Name a method for protecting networks from port scans.

Using a firewall is a method to protect networks from port scans.

300

Which of the following is an example of an operating system?

A) Microsoft Word
B) Google Chrome
C) Linux
D) NVIDIA Graphics Driver

C) Linux

300

What is the primary difference between productivity software and collaboration software?

Productivity software helps individuals perform tasks, while collaboration software helps teams work together.

300

What is the difference between a full backup and an incremental backup?

A full backup copies everything, while an incremental backup only saves changes since the last backup.

300

Define user permissions and provide an example.

 User permissions specify what actions a user can take. Example: Accessing specific files or folders.

400

What is the primary purpose of a router in a computer network?

A) To connect devices within the same local area network (LAN).
B) To manage the power supply to network devices.
C) To direct data packets between different networks.
D) To translate websites into IP addresses.

C) To direct data packets between different networks.

Explanation:
Routers are responsible for forwarding data between different networks, ensuring that the data reaches its intended destination.

400

Which of the following is NOT a function of an operating system? 

A) Managing hardware resources like the CPU and memory.
B) Providing a user interface to interact with the computer.
C) Compiling code into an executable program.
D) Running and managing software applications.

C) Compiling code into an executable program.

400

Name one advantage and one disadvantage of single-platform software.

Advantage: Optimized performance for one platform. Disadvantage: Limited accessibility for users on other platforms.

400

What is the purpose of patches in application security?

Patches address and fix security vulnerabilities in a program.

400

Why is it important for users to create strong passwords for their accounts, and which of the following is an example of a strong password?

A) password123
B) 12345678
C) !L1m0n@d3L0v3!
D) qwertyuiop

C) !L1m0n@d3L0v3!

500

Which of the following is an example of an IP address?

A) 192.168.1.1
B) www.example.com
C) 255.255.255.0
D) http://192.168.1.1

A) 192.168.1.1

500

Describe the purpose of a mobile OS.

A mobile OS is used on mobile devices like smartphones or tablets, enabling them to perform various functions and run applications.

500

What type of software is most commonly used in business environments?

Business software, such as CRM tools or accounting programs, is most common.

500

How do authentication and authorization differ in terms of security?

Authentication verifies a user’s identity, while authorization specifies access rights and permissions.

500

How can creating user accounts enhance security?

User accounts allow individualized access and prevent unauthorized users from accessing sensitive data.

M
e
n
u