Domain 1
Domain 2
Domain 3
Domain 4
Domain 5
Domain 6
100

There are ____ steps in the Troubleshooting Methodology.

What are the eight steps in the Troubleshooting Methodology? 

100

This current is converted from AC (in a standard American Socket) to this standard for most devices.

What is DC (Direct Current)?

100

This type of resource creation results in legal ownership of source code. Which is the polar opposite of open-source applications.

What is closed-source or properitiary software? 

100

This markup language is used to provide the backbone of a webpage.

What is HTML(HyperText MarkUp Language)?

100

There are four Database access methods.

What are the four methods of Database Access Methods?

- Direct/manual access

- Programmatic access

- User interface/utility access

- Query/report builders

100

Availability, Confidentiality, and Integrity is more commonly known as

What is the CIA triad?

200

A Bit is also known as _______

What is a Binary Digit?

200

Formally recognized as the most common USB interface type. Typically plugs into most older models of devices.

What is USB A?

200

This type of virtualization technology is also known as "bare-metal". 

What is a  Type 1 Hypervisor?

200

This is one of the oldest Compiled Languages that was created by Dennis Ritchie.

What is C?

200

There are two examples of Non-Relational Databases.

- Key/value databases

- Document databases

200

Hardware failure is a concern on the  ______ leg of the CIA Triad.

What is Availability? 

300

The cycle of computing and processing consists of this step that is non-violate in nature and allows you to store information/data for later use.

What is Storage?

300

There are 2 forms of Window OS standards. One of which is also referred to x86. 

What are 64-bit and 32-bit OS'es?

300

Ext4 is used as a file system for ______ distros.

What is Linux?

300

This logic component involves redirecting a user to the beginning of a program due to certain conditions not being met.

What is Looping?

300

________ is the overall structure and design of the database

What is a Schema?

300

After leaving Shopper's Rite, Jane deployed an example of ___________ by showing her receipt to the store associate as proof of her purchase.

What is Non-Repudiation?

400

Having no physical form a customer can still receive the product usually by email or downloading directly from the site.

What is a digital product?

400

It is a cabling standard that currently has the fastest transfer speed.

What is a fiber optics cable?

400

QuickBooks is a type of software that logs and calculates costs and revenue for entities.

What is Accounting Software?

400

These four programming Category types include languages such as HTML, JSON, SQL, NoSQL, C, Fortran, Ruby, the low-level language used to communicate with machines, Cobalt, and many more.

What are: 

• Interpreted languages

• Compiled programming languages

• Query languages

• Assembly language

400

A ________ is another term for a field.

What is a column?

400

Using multiple methods of authentication produced this term.

What is Multi-factor Authentication?

500

This is the result of Data being processed and gaining meaning.

What is Information?

500

As a protocol, this service acts as a Yellow Pages directory by providing URL-to-IP translation. Think Websites

What is DNS (Domain Name Service)?

500

This Type of Software Licensing Method can only be used once.

What is Single-use Software Lincensing?

500

This programming language type includes the following subcategories:

- Scripting languages

- Scripted languages

- Markup languages

What is Interpreted language?

500

This key must be both unique and included in every table.

What is a primary key?

500

This is Data in Motion

What is Data-in-Transit?

M
e
n
u