What is the base-2 numerical system used in computers?
Explanation: Binary is the foundation of digital technology, representing numbers using only two symbols, typically 0 and 1. It's fundamental for understanding how computers process and store data.
What is the type of network connection that uses physical cables to transmit data signals?
Explanation: Wired networking relies on physical connections, such as Ethernet cables, to establish communication between devices.
What are the browser features that prevent unwanted pop-up windows from appearing while browsing the internet?
Explanation: Popup blockers help users avoid distractions and potential security threats by blocking pop-up advertisements and malicious windows.
What are the two main categories of programming languages based on how they are processed by computers?
Explanation: Interpreted languages are executed line by line, while compiled languages are translated into machine code before execution, offering different advantages and disadvantages.
What is the unauthorized act of secretly listening to or monitoring private communications or data transmissions?
Explanation: Snooping involves covertly intercepting and monitoring communication channels or data transfers to obtain sensitive or confidential information.
What is the standard character encoding scheme used in computers for representing text?
Explanation: ASCII (American Standard Code for Information Interchange) assigns a unique numerical value to each character, making it possible to represent text in computers and communication devices.
What is the interface standard commonly used to connect high-definition devices like TVs and monitors to computers?
Explanation: HDMI provides high-quality audio and video transmission, making it ideal for connecting devices like computers, gaming consoles, and Blu-ray players to displays.
What is one of the recommended practices before installing software to ensure proper setup and configuration?
Explanation: Reading software instructions helps users understand installation requirements, compatibility, and any special considerations for setup.
What are the types of languages primarily used for automating tasks, processing text, and controlling software applications?
Explanation: Scripting languages, including Python and JavaScript, are often used for rapid development and automation tasks due to their ease of use and flexibility.
What software is used to detect, prevent, and remove malicious software (malware) from computer systems, protecting against viruses, worms, and other threats?
Explanation: Antivirus/Anti-malware software scans and monitors computer systems for malicious code, identifying and neutralizing threats to maintain system security.
What is the data type that represents true or false values?
Explanation: Boolean data type is essential for logical operations in programming and decision-making processes.
What is the storage device that uses flash memory to store data persistently and is faster than traditional hard disk drives?
Explanation: SSDs offer faster data access and transfer speeds, making them ideal for improving system performance and reducing boot times.
What is the utility feature that allows users to automate and schedule tasks to run at specified times or intervals?
Explanation: Task Scheduling utilities enable users to streamline repetitive tasks, optimize system performance, and improve productivity by automating routine operations.
What are the languages used to annotate and structure text to define its presentation, structure, and semantics?
Explanation: Markup languages like HTML and XML are used to format and organize content for web pages, documents, and data interchange.
What are the three fundamental principles of information security that address the protection of data privacy, data accuracy, and data accessibility?
Explanation: Confidentiality ensures data privacy and prevents unauthorized access, Integrity maintains data accuracy and consistency, and Availability ensures data accessibility and usability when needed.
What is the smallest unit of data in computing, representing a binary digit?
Explanation: A bit can represent either a 0 or a 1, forming the building blocks of digital data storage and processing.
What is the type of volatile memory used by computers to store data temporarily for quick access by the CPU?
Explanation: RAM stores data and instructions that the CPU needs to access quickly, but its contents are lost when the computer is powered off.
What is the main function of operating systems in computers?
Explanation: Operating systems act as an intermediary between hardware and software, facilitating communication and resource allocation.
What are the specialized languages used to retrieve and manipulate data stored in databases?
Explanation: Query languages like SQL (Structured Query Language) enable users to interact with databases, execute commands, and perform data operations.
What type of confidential information should users safeguard to prevent unauthorized access to accounts, systems, and sensitive data?
Explanation: Passwords serve as authentication credentials to verify user identity and protect access to personal, financial, and organizational resources, requiring secure management to prevent unauthorized access.
What are the steps involved in the troubleshooting methodology?
Answer: The troubleshooting methodology involves steps such as identifying the problem, gathering information, establishing a theory of probable cause, testing the theory, implementing a solution, verifying system functionality, and documenting findings.
What is the system responsible for translating domain names into IP addresses?
Explanation: DNS translates human-readable domain names into numerical IP addresses, facilitating internet communication by allowing users to access websites using domain names.
What is the file system used by Windows operating systems, providing features like file compression, encryption, and permissions?
Explanation: NTFS offers advanced features for managing files and folders in Windows environments, including security permissions and file encryption.
What is the low-level programming language that uses symbolic instructions representing basic machine operations?
Explanation: Assembly language provides direct control over hardware resources by translating human-readable instructions into machine code understandable by processors.
Name at least 4 criteria for a complex password
Uppercase, lower, numbers, special characters