What is each step of the troubleshooting methodology?
Identify the problem
Establish a theory of probable cause
Test the theory
Establish a plan of action
Verify full system functionality
Document your findings
This type of software is designed to detect and remove malicious programs from a computer
What is antivirus software
This type of storage device is faster and more durable than a traditional hard disk drive
What is an SSD
This type of attack tricks users into revealing sensitive information, often through fake emails or websites
What is Phishing
This trainee is Tech+ CERTIFIED!
Who is Samrat
This type of memory temporarily stores data to help a computer run programs more efficiently
What is RAM
This tool encrypts internet traffic to keep data private when using public Wi-Fi
What is a VPN
This database operation is used to retrieve specific data by filtering, sorting, and joining tables
What is a query
This type of software allows users to create, edit, and manage documents, spreadsheets, presentations, and other office-related tasks
What is productivity software
This trainee's favorite band is Duran Duran
Who is Jay
!!!!DAILY DOUBLE!!!!
What is the difference between Bytes and bits?
Bytes is a measurement of storage
Bits is a measurement of throughput
This is a...?
What is a Motherboard
This security feature monitors and controls network traffic to block unauthorized access
What is a Firewall
These devices allow users to interact with a computer by entering data
What is an Input device
This trainee is a jack of all trades and is now adding to their resume with IT
Who is Christine
Downloading files from untrusted websites or clicking suspicious email links can expose a computer to this
What is Malware
This type of programming language translates high-level code into machine code one line at a time during execution
What is an Interpreted Language
Storing files on remote servers instead of a local hard drive is known as this
What is Cloud Storage
!!!!DAILY DOUBLE!!!!
This software distribution model provides applications over the internet without requiring local installation
What is SaaS (Software as a Service)
This trainee planted a Christmas tree outside of their house
Who is Oliver
This term describes a unique identifier assigned to each record in a database table to ensure data integrity
This system manages a computer’s hardware, software, and user interactions
What is an Operating System
What are 3 examples of IOT devices
Acceptable answers:
Home appliances
Home automation devices
o Thermostats
o Security systems
o Home assistants
o Deadbolts/door locks
o Video doorbells
Every device on a network is assigned this unique identifier, either dynamically or manually
What is an IP Address
This trainee is a barber
Who is Alexzander