Unit 2
Frankenstein Unit (3)
Unit 4 & 5
Unit 6
Unit 7
100

Which component gets things running until the operating system takes over?

What is BIOS?

100

Which of the following is a top cause of motherboard failure?

What is physical damage?

100

Multiple computers configured to be able to communicate and share information with each other form a ____________.

What is a network?

100

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

What is accounting?

100

Which data model focuses on high-level concepts?

What is conceptual?

200

You need to test a version of macOS but only have a Windows computer. What technology could you use?

What is virtualization?

200

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

What is document findings/lessons learned, actions, and outcomes?

200

Which of the following provides services to hosts on its network?

What is a server?

200

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

What is multifactor authentication?

200

 Which data type uses historical data to make decisions in the present?

What is analytical?

300

If you select a file on your desktop and delete it, what happens to the file?

It is moved to the recycle bin.

300

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

What is full control?

300

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

What is ethernet?

300

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

What is a power outage?

300

What is the general term for software that creates and manages databases?

What is DBMS?

400

 Designations at the end of file names such as .docx and .html are called _____________.

What are file extensions?

400

Which of the following is often the hardest part of troubleshooting

What is reproducing the problem?

400

Which of the following is used on a wireless network to identify the network name?

What is an SSID?

400

What do biometrics use to perform authentication of identity?

What is biological attributes?

400

Which type of analytical data can help you make investment decisions?

What is market?

500

Which of the following operating systems require a file extension to execute a program?

What is windows?

500

Which of the following has the ability to store user data even if the power to the computer is off?

What is hard drive?

500

Which network type uses a coaxial cable to receive its signal?

What is cable?

500

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

500

Which database object is essentially questions that we can ask the database?

What is queries?

M
e
n
u