One Gigabyte is equal to ___________ Megabytes?
1000
Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions at the same time.
What is another name for the instructions?
Processes
Multiple computers configured to be able to communicate and share information with each other form a ____________.
Network
What is the best countermeasure against social engineering?
User awareness training
What is a way for programmers and others to make sense of complex business flows?
Data modeling
The memory component that provides the workspace for a processor.
RAM
You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?
Hypervisor Type 1
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.
What feature lets you allow or reject client connections based on the hardware address?
MAC address filtering
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Delete the email without opening the attachment.
What should not be used as a primary key in a table?
First name
Information that is converted to electrical pulses of varying amplitudes, denoted by waves, that deteriorates with transmission. These are continuous signals that represents physical measurements.
Analog
Which of the following describes the firmware in gaming consoles, TVs, and smart cars?
Embedded OS
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
Modem
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.
Zombie/botnet
What is the computer language that makes relational databases work?
SQL
___________ provides a unique number for every character, no matter what platform, device, application or language.
Unicode Standard
Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. What are the best solutions to his problem?
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?
Improved performance
A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. What security practices was violated?
Principle of least privilege
What needs to be done before Big Data can be analyzed and interpreted?
Data extraction
Convert binary 01101110 in to a decimal number.
110
Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?
Firmware
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email.
Which of the following should be implemented?
Email filtering
Which Internet protocol is used to transmit encrypted data?
HTTPS
Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?
Big Data