IT Concepts and Terminology
Infrastructure
Applications & Software
Software Development Concepts
Security
200

What is the base-2 numerical system used in computers?

  • Answer: What is Binary?

Explanation: Binary is the foundation of digital technology, representing numbers using only two symbols, typically 0 and 1. It's fundamental for understanding how computers process and store data.

200

What is the type of network connection that uses physical cables to transmit data signals?

  • What is Wired networking?

Explanation: Wired networking relies on physical connections, such as Ethernet cables, to establish communication between devices.

200

What are the browser features that prevent unwanted pop-up windows from appearing while browsing the internet?

  • Answer: What are Popup Blockers?

Explanation: Popup blockers help users avoid distractions and potential security threats by blocking pop-up advertisements and malicious windows.

200

What are the two main categories of programming languages based on how they are processed by computers?

  • Answer: What are Interpreted and Compiled programming languages?

Explanation: Interpreted languages are executed line by line, while compiled languages are translated into machine code before execution, offering different advantages and disadvantages.

200

What is the unauthorized act of secretly listening to or monitoring private communications or data transmissions?

  • Answer: What is Snooping?

Explanation: Snooping involves covertly intercepting and monitoring communication channels or data transfers to obtain sensitive or confidential information.

400

What is the standard character encoding scheme used in computers for representing text?

  • Answer: What is ASCII?

Explanation: ASCII (American Standard Code for Information Interchange) assigns a unique numerical value to each character, making it possible to represent text in computers and communication devices.

400

What is the interface standard commonly used to connect high-definition devices like TVs and monitors to computers?

  • What is HDMI (High-Definition Multimedia Interface)?

Explanation: HDMI provides high-quality audio and video transmission, making it ideal for connecting devices like computers, gaming consoles, and Blu-ray players to displays.

400

What is one of the recommended practices before installing software to ensure proper setup and configuration?

  • Answer: What is Reading Instructions?

Explanation: Reading software instructions helps users understand installation requirements, compatibility, and any special considerations for setup.

400

What are the types of languages primarily used for automating tasks, processing text, and controlling software applications?

  • Answer: What are Scripting Languages?

Explanation: Scripting languages, including Python and JavaScript, are often used for rapid development and automation tasks due to their ease of use and flexibility.

400

What software is used to detect, prevent, and remove malicious software (malware) from computer systems, protecting against viruses, worms, and other threats?

  • Answer: What is Antivirus/Anti-malware software?

Explanation: Antivirus/Anti-malware software scans and monitors computer systems for malicious code, identifying and neutralizing threats to maintain system security.

600

What is the data type that represents true or false values?

  • Answer: What is Boolean?

Explanation: Boolean data type is essential for logical operations in programming and decision-making processes.

600

What is the storage device that uses flash memory to store data persistently and is faster than traditional hard disk drives?

  • What is an SSD (Solid State Drive)?

Explanation: SSDs offer faster data access and transfer speeds, making them ideal for improving system performance and reducing boot times.

600

What is the utility feature that allows users to automate and schedule tasks to run at specified times or intervals?

  • What is Task Scheduling?

Explanation: Task Scheduling utilities enable users to streamline repetitive tasks, optimize system performance, and improve productivity by automating routine operations.

600

What are the languages used to annotate and structure text to define its presentation, structure, and semantics?

  • Answer: What are Markup Languages?

Explanation: Markup languages like HTML and XML are used to format and organize content for web pages, documents, and data interchange.

600

What are the three fundamental principles of information security that address the protection of data privacy, data accuracy, and data accessibility?

  • Answer: What are Confidentiality, Integrity, and Availability (CIA)?

Explanation: Confidentiality ensures data privacy and prevents unauthorized access, Integrity maintains data accuracy and consistency, and Availability ensures data accessibility and usability when needed.

800

What is the smallest unit of data in computing, representing a binary digit?

  • What is a Bit?

Explanation: A bit can represent either a 0 or a 1, forming the building blocks of digital data storage and processing.

800

What is the type of volatile memory used by computers to store data temporarily for quick access by the CPU?

  • Answer: What is RAM (Random Access Memory)?

Explanation: RAM stores data and instructions that the CPU needs to access quickly, but its contents are lost when the computer is powered off.

800

What is the main function of operating systems in computers?

  • Answer: What is to manage hardware resources and provide a platform for running applications?

Explanation: Operating systems act as an intermediary between hardware and software, facilitating communication and resource allocation.

800

What are the specialized languages used to retrieve and manipulate data stored in databases?

  • Answer: What are Query Languages?

Explanation: Query languages like SQL (Structured Query Language) enable users to interact with databases, execute commands, and perform data operations.

800

What type of confidential information should users safeguard to prevent unauthorized access to accounts, systems, and sensitive data?

  • What are Passwords?

Explanation: Passwords serve as authentication credentials to verify user identity and protect access to personal, financial, and organizational resources, requiring secure management to prevent unauthorized access.

1000

 What are the steps involved in the troubleshooting methodology?

Answer: The troubleshooting methodology involves steps such as identifying the problem, gathering information, establishing a theory of probable cause, testing the theory, implementing a solution, verifying system functionality, and documenting findings.

1000

What is the system responsible for translating domain names into IP addresses?

  • Answer: What is DNS (Domain Name System)?

Explanation: DNS translates human-readable domain names into numerical IP addresses, facilitating internet communication by allowing users to access websites using domain names.

1000

What is the file system used by Windows operating systems, providing features like file compression, encryption, and permissions?

  • Answer: What is NTFS (New Technology File System)?

Explanation: NTFS offers advanced features for managing files and folders in Windows environments, including security permissions and file encryption.

1000

What is the low-level programming language that uses symbolic instructions representing basic machine operations?

  • Answer: What is Assembly Language?

Explanation: Assembly language provides direct control over hardware resources by translating human-readable instructions into machine code understandable by processors.

1000

Name at least 4 criteria for a complex password   

Uppercase, lower, numbers, special characters

M
e
n
u