IT Concepts and Terminology
Infrastructure
Application & Software
Software Development
Security
100

Base-2 system that uses 0s and 1s.

Answer: What is Binary?

  • Explanation: Binary is the fundamental language of computers. For example, the number 10 in binary is represented as 1010.
100

Uses physical cables for connection

Answer: What is Wired Networking?

  • Explanation: Wired networking, such as Ethernet, is used for stable and fast internet connections in offices.
100

Interface between applications and hardware

Answer: What is an Operating System?

  • Explanation: An OS, like Windows or macOS, allows software to communicate with hardware components.
100

Automate tasks executed line-by-line by an interpreter

Answer: What are Scripting Languages?

  • Explanation: Scripting languages like Python are used for automating repetitive tasks.
100

Method of verifying a user's identity

Answer: What is Authentication?

  • Explanation: Authentication methods include passwords and biometric scans, ensuring only authorized users access systems.
200

Base-16 system that uses 0-9 and A-F.

Answer: What is Hexadecimal?

  • Explanation: Hexadecimal simplifies binary representations. For instance, the binary number 1010 1011 can be written as AB in hexadecimal.
200

Short-range wireless technology for connecting peripherals

Answer: What is Bluetooth?

Explanation: Bluetooth is used for wireless headphones and keyboards

200

Controls communication between hardware devices and software applications

Answer: What is Device Management?

  • Explanation: Device management allows the OS to interact with hardware like printers and scanners.
200

Annotate text for processing/display.

Answer: What are Markup Languages?

  • Explanation: Markup languages like HTML are used to format and display text on web pages.
200

Name at least three best practices for securing devices in information security.

  • Using antivirus/anti-malware software.
  • Changing default passwords regularly.
  • Ensuring regular patching and updates to fix vulnerabilities.
300

Universal character encoding standard

Answer: What is Unicode?

  • Explanation: Unicode supports multiple languages and symbols, e.g., it can represent characters in Chinese, Arabic, and more.
300

Serves as the "brain" of the computer

Answer: What is the CPU?

  • Explanation: The CPU processes instructions, similar to how a brain processes thoughts.
300

Enable communication between hardware and OS.

What are Drivers?

  • Explanation: Drivers are software that allow the OS to use hardware devices, like a printer driver enabling printing.
300

Visualize program logic using flowcharts

Answer: What are Flow-Chart Concepts?

  • Explanation: Flowcharts help map out the flow of a program, making it easier to understand and debug.
300

Differentiate between authentication and authorization in information security.

Authentication verifies the user's identity, confirming they are who they claim to be. Authorization determines the user's access permissions after authentication.

400

Whole numbers without decimal points.

Answer: What are Integers?

Explanation: Integers are used in counting items, like 5 apples

400

High-speed internet service using fiber optics

Answer: What is Fiber Optic?

  • Explanation: Fiber optic internet provides very high speeds, useful for activities like streaming HD videos.
400

This file system is commonly used by Windows and supports large files and security features.

Answer: What are NTFS?

  • Explanation: NTFS provides features like file compression and encryption, making it robust for Windows systems. 
400

Repeat a sequence of steps multiple times

Answer: What is Looping?

  • Explanation: Looping allows a program to execute a set of instructions repeatedly, like printing numbers from 1 to 10.
400

Attack that disrupts service by overwhelming a system

Answer: What is a DDoS Attack?

  • Explanation: Distributed Denial of Service attacks flood a website with traffic, making it inaccessible to users.
500

Data type with two possible values: true or false

Answer: What is Boolean?

  • Explanation: Boolean is used in conditions, such as checking if a user is logged in (true) or not (false).
500

Connects computer to a network.

Answer: What is a NIC?

  • Explanation: A Network Interface Card allows a computer to connect to the internet or a local network.
500

This type of interface uses graphical elements like windows and icons. 

What is a GUI? 

Explanation: A graphical user interface (GUI) makes interacting with the OS more user-friendly. For example, Windows Desktop.

500

Named blocks of code for specific tasks

Answer: What are Functions?

  • Explanation: Functions encapsulate code for specific tasks, like a function to calculate the area of a circle.
500

Explain the difference between plain text and cipher text in encryption to the best of your knowledge.

Plain text is readable and unencrypted, while cipher text results from applying an encryption algorithm to plain text, rendering it unreadable without the appropriate decryption key.

M
e
n
u