Computer Hardware
Computer Software
Cybersecurity
Databases
Programming
100

What is the CPU?


Runs software programs. Software is comprised of many simple instructions. It is also reference or known as the “brains” 


100


What does the computer software do for your computer



It tells the computer how to work and allows the computer to communicate with the user.


100

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?


Prioritization


100


A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?



Primary key. 


100


A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?



JavaScript


200


Robert is deciding between getting an HDD or an SSD. Which storage types should he get if he wants faster speeds? 



SSD.


200


What's the difference between a firewall and an antivirus?



A firewall is a security network that can be either hardware or software, or both, and is meant to protect computer systems and networks from harmful intrusions. Antivirus is a software utility application that protects a system against internal attacks such as viruses, trojan horses, spyware, and so on.


200


Why is it better to use a credit card than a debit card for online purchases?



Credit cards have better fraud protection.


200


Patricia, a database system manager for a large hotel chain, is setting up a relational database to track customer hotel registrations for each hotel. The table in the database currently includes fields (columns) for First Name, Last Name, Phone, Email, License Plate #, and Check-in Date.

What can Patricia do to make sure that each record (row) in the database is unique?



Create an additional Check-in ID.


200


What is the term for code that keeps running as long as a certain condition is met?



While loop


300


What are the parts needed for a PC? (multiple answers).



Monitor.

Motherboard.

Keyboard.

Mouse.

CPU 


300


What are the two types of computer software?



Commercial and Open Source


300


An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. What should the accountant use to send the email?



Cipher Text


300


Which data type uses historical data to make decisions in the present?


Analytical

300


Which of the following logic components is being used and how much is the interest if the amount is 5,000?



Branching, and 8%


400


Missing slot covers on a computer cause what?



Overheating problems 


400


What is Application Software?



Software that allows users to perform specific task on their computers.


400


If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?



Accounting


400

April is a database manager who wants to insert some new records (rows) into the company's customer contact database. Instead of using a database client to insert the records, she wants to use a command.

Which of the following languages provides a command for inserting records into a database?

DML (Data Manipulation Language)



400


A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?



JavaScript


500


Which connector on the back of a computer is used to attach a mouse to a modern PC system?



USB A


500


A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?



Use Task Manager to end task


500


Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?



Delete the email and ignore the attachments.


500


A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?



Programmatic access


500


Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?



Algorithm 


M
e
n
u