Concepts & Terminology​
Infrastructure​
Applications & Software​
Database Fundamentals​
Security
100

Explain the difference between hardware and software. Give examples of each.

Hardware is the physical parts of a computer (e.g., monitor, CPU, keyboard), while software is the set of instructions that tells the hardware what to do (e.g., operating systems, apps).

100

What are the key differences between wired and wireless networks?

Wired networks use physical cables (faster, more secure); wireless networks use radio signals (more flexible, less secure).

100

What’s the difference between a web application and a desktop application?

A web application runs in a browser and requires internet access (e.g., Gmail). A desktop application installs on a local device (e.g., Microsoft Word).

100

What is a database, and what is it used for?

A database is an organized collection of data that can be easily accessed, managed, and updated.

100

What is the goal of cybersecurity?

To protect systems and data from unauthorized access, damage, or theft, including threats to data confidentiality, integrity, or availability.

200

What is an operating system, and what are two things it allows a user to do?

An operating system (OS) is software that manages hardware and software resources on a computer. It allows users to run applications and interact with the computer (e.g., managing files, connecting to the internet).

200

What does a router do in a home or business network?

A router connects multiple devices to a network and directs data between them and the internet.

200

What are three common types of productivity software, one example of each, and what tasks are they used for?

Word processors - Microsoft Word - writing, spreadsheets - Excel - calculations/data, presentation software - PowerPoint - slideshows

200

Why is it important for data in a database to be structured and organized?

Structured data is easier to search, sort, and manage. It reduces redundancy and increases accuracy.

200

What are three common types of threats to computer systems, and how can users protect themselves?

  • Viruses: Use antivirus software

  • Phishing: Don’t click suspicious links

  • Malware: Keep systems updated

300

What is the purpose of a file extension? How does it help a computer operate?

A file extension identifies the file type and tells the OS what application to use to open it (e.g., .docx for Word, .jpg for images).

300

Describe the three main types of computing devices (input, output, and storage). Provide two examples of each.

  • Input devices are used to send data or commands into a computer. They allow the user to interact with the system. Examples: Keyboard, mouse, microphone, camera

  • Output devices are used to display or present information from the computer to the user. Examples: Monitor, printer, speakers

  • Storage devices are used to save data and programs, either temporarily or permanently. Examples: Hard drive, USB flash drive, DVD or Blu-ray Disc 

300

Describe what an algorithm is in the context of software development. Give a real-world example.

An algorithm is a step-by-step set of instructions for solving a problem. Example: A recipe or login validation process.

300

Define the following terms: record, field, table.

  • Field: A single piece of data (e.g., last name)

  • Record: A full set of fields about one item (e.g., one customer)

  • Table: A collection of records

300

Explain the difference between confidentiality, integrity, and availability in the context of cybersecurity.

  • Confidentiality: Keep data private (e.g., encryption)

  • Integrity: Ensure data is accurate and unaltered (e.g., checksums)

  • Availability: Ensure access when needed (e.g., backups)

400

Define the term “cloud computing” and give two real-life examples of how a person or business might use it.

Cloud computing is storing and accessing data or programs over the internet instead of on a local computer. Examples: Using Google Drive for file storage, running QuickBooks Online for accounting.

400

Explain how IP addressing works and how it helps devices communicate on a network.

IP addresses uniquely identify devices on a network. They allow routing of data packets from sender to receiver using protocols like TCP/IP.

400

Explain the difference between compiled and interpreted programming languages. Give an example of each and describe when one might be preferred over the other.

Compiled languages (e.g., C++) are translated into machine code before running. Interpreted languages (e.g., Python) are translated line-by-line at runtime. Compiled is faster, interpreted is more flexible.

400

What is the purpose of a primary key in a database table?

A primary key uniquely identifies each record in a table (e.g., customer ID). It ensures no duplicate entries.

400

Describe the role of multi-factor authentication (MFA). Why is it more secure than using just a password?

MFA uses two or more verification methods (e.g., password + code from phone), making it harder for attackers to access accounts.

500

Compare and contrast virtualization and cloud computing. What are the benefits and challenges of each?

Virtualization is the creation of virtual machines to run multiple OSes on one physical system. Cloud computing provides shared resources via the internet. Virtualization improves hardware use; cloud offers scalability and access.

500

Describe what happens when you type a web address into your browser and press Enter. Include the roles of DNS, IP addresses, and packets.

Typing a URL triggers DNS to translate it into an IP address. The browser sends a request to that address using packets, and the server responds with website data.

500

What are 3 common reasons software might fail or have bugs, and how can developers prevent these problems?

Software can fail or have bugs for several reasons, such as:

  • Poor planning – unclear goals or missing features.

  • Unclear requirements – developers may not fully understand what the user needs.

  • Lack of testing – without proper testing, bugs can go undetected.

  • Miscommunication – between developers, designers, and clients.

  • Changing code without documentation – leads to confusion and errors.

To prevent these issues, developers can:

  • Plan carefully and gather clear requirements.

  • Use version control to track changes.

  • Test the software thoroughly at different stages.

  • Write clear documentation.

  • Communicate regularly with the team and stakeholders.

500

A company has a customer database with 10,000 records. Describe how SQL could be used to find all customers who live in a certain city.

SQL (Structured Query Language) is used to search and manage data in a database. To find customers in a certain city, a developer could write a query like: SELECT * FROM Customers WHERE City = 'Atlanta';

This command tells the database to return all records (rows) from the Customers table where the City field is equal to "Chicago." SQL allows users to filter large amounts of data quickly and accurately using conditions like this.

500

A user receives an email that appears to be from their bank, asking them to click a link and enter their login details. What kind of attack is this, and what should the user do? What security principles are involved?

This is a phishing attack. The user should not click the link, report the email, and contact their bank directly. It involves confidentiality and integrity protections.

M
e
n
u