Base-2 system that uses 0s and 1s.
Answer: What is Binary?
Uses physical cables for connection
Answer: What is Wired Networking?
Interface between applications and hardware
Answer: What is an Operating System?
Automate tasks executed line-by-line by an interpreter
Answer: What are Scripting Languages?
Method of verifying a user's identity
Answer: What is Authentication?
Base-16 system that uses 0-9 and A-F.
Answer: What is Hexadecimal?
Short-range wireless technology for connecting peripherals
Answer: What is Bluetooth?
Explanation: Bluetooth is used for wireless headphones and keyboards
Controls communication between hardware devices and software applications
Answer: What is Device Management?
Annotate text for processing/display.
Answer: What are Markup Languages?
Name at least three best practices for securing devices in information security.
Universal character encoding standard
Answer: What is Unicode?
Serves as the "brain" of the computer
Answer: What is the CPU?
Enable communication between hardware and OS.
What are Drivers?
Visualize program logic using flowcharts
Answer: What are Flow-Chart Concepts?
Differentiate between authentication and authorization in information security.
Authentication verifies the user's identity, confirming they are who they claim to be. Authorization determines the user's access permissions after authentication.
Whole numbers without decimal points.
Answer: What are Integers?
Explanation: Integers are used in counting items, like 5 apples
High-speed internet service using fiber optics
Answer: What is Fiber Optic?
This file system is commonly used by Windows and supports large files and security features.
Answer: What are NTFS?
Repeat a sequence of steps multiple times
Answer: What is Looping?
Attack that disrupts service by overwhelming a system
Answer: What is a DDoS Attack?
Data type with two possible values: true or false
Answer: What is Boolean?
Connects computer to a network.
Answer: What is a NIC?
This type of interface uses graphical elements like windows and icons.
What is a GUI?
Explanation: A graphical user interface (GUI) makes interacting with the OS more user-friendly. For example, Windows Desktop.
Named blocks of code for specific tasks
Answer: What are Functions?
Explain the difference between plain text and cipher text in encryption to the best of your knowledge.
Plain text is readable and unencrypted, while cipher text results from applying an encryption algorithm to plain text, rendering it unreadable without the appropriate decryption key.