What does ROM stand for?
Read - Only Memory
What are Ethics?
Ethics, is a system of moral principles or values that guide individuals in determining right and wrong.
What is an OS?
Piece of software that controls everything. It provides a file system structure and communication with hardware.
Are computer systems ever fully secured?
No.
What actor plays the main role in Waterboy?
Adam Sandler
What type of power supply connector is this?
PCIe connector
What is copyright?
This is a protection given to songs, programs, and other creative words that have an “Author”.
Can you upgrade from a 32-Bit OS to a 64-Bit OS?
No
What is the CIA triad?
Confidentiality, Integrity, and Availability.
What is David Spade's most popular role in a movie?
Tommy boy (Richard)
Convert DDR1-333 into PC ratings.
PC-2664
What happens when a copyright expires?
Enters the public domain.
What is PAE?
Physical Address Extension.
What are some things that can lead to an unsecure system?
-Not patching systems
-Using weak Passwords
-Downloading programs from the internet
-Opening a unknown email attachments
-Using unencrypted
Who sings Man in the Box?
Alice In Chains
The concentric circles on a hard disk are called tracks. Tracks are subdivided into sections or blocks called what?
Sectors.
What does a patent protect?
It protects new products or inventions.
List the requirements for CPU and RAM for Vista, 7, 8, and 10.
7- A 1 GHz 32-bit (x86) or 64-bit (x64) processor.
10 - 1GHZ processor,
Explain fabrication.
This is generating data, processes, communication, or other similar activities with a system.
What band does Fred Durst sing in?
Limp Bizkit
What Disc interfaces are there?
-Pada/Ide
-Sata
-eSata
-Scsi
What does NORA stand for?
Non - Obvious relationship awareness
What are the five main config files and what are their purposes?
HKEY_CLASSES_ROOT – Object linking, embedding information, and how files are associated with each other.
HKEY_CURRENT_USERES – Information for the current user of the system
HKEY_LOCAL_MACHINE – Information specific to the computer
HKEY_USERS – Information for each user of the machine.
HKEY_CURRENT-CONFIG – Display and printer settings.
What three methods of authentication are there?
-Something you know, like a PW or Pin.
-Something you have, like a key card or FOB.
-Something you are, Biometric fingerprint scans.
Who sings The Ballad of Boot Hill?
Johnny Cash