Internal Computer Parts
Databases
Cyber Security
Programming
Networking
100

Which component stores values in short-term memory?

What is RAM

100

Which command is used to add, change, or remove fields on an existing table?

ALTER TABLE

100

Which of the following is a common form of social engineering attack?

What are hoax virus information emails.

100

A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. What would MOST likely be used to store the value?

What is variable.

100

What is a device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device?

What is Wall Jack

200

Which hardware component processes data?

What is CPU

200

Which SQL command is used to give a user permission to a specific database object?

What is GRANT

200

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

What is delete the email without opening the attachment.

200

Which of the following is a programming identifier that would be used to define values that don't change?

What is Constants

200

What is the principal communications protocol in the internet protocol suite that is used to route information over the internet?

What is Internet Protocol (IP)

300

Which of the following components converts AC to DC?

What is power supply

300

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. What would be her BEST option to generate the report?

What is Query builder

300

What is the best countermeasure against social engineering?

What is user awareness training.

300

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

What is Boolean

300

What is a network of interconnected LANs across a large geographical location?

What is Wide Area Network (WAN)

400

At what voltage from an ESD discharge would be the minimum to short a computer's hardware components?

What is 100v

400

What are the four general tasks a user needs to perform for a database to function properly?

What is Create, Read, Update, Delete

400

What protocol can be enabled so email is encrypted on a mobile device?

What is SSL

400

What programming models are built from class templates that have properties, attributes, and methods?

What is Objects

400

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. What network devices would be the BEST choice for this connectivity?

What is Access point

500

Where are values the computer is directly working with at a particular moment in time stored?

What is CPU register

500

What acronym describes the traditional way to make sure data stays consistent across the entire database?

What is ACID

500

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. What wireless encryption standards should be used?

What is WPA2

500

Alan, a programmer, needs to create an interactive web page. What programming language type would he MOST likely use?

Interpreted

500

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

What is modem

M
e
n
u