Hardware & Infrastructure
Software & Applications
Networking Concepts
Database Fundamentals
Security Concepts
100

This internal component converts AC power from a wall outlet to the DC power that a computer's electronic components use.

What is a Power Supply Unit (PSU)?

100

This software license model makes the source code publicly available for anyone to view, modify, and distribute.

What is open source?

100

This service acts as the phonebook of the internet, translating human-friendly domain names into numerical IP addresses.

What is the Domain Name System (DNS)?

100

A field, or set of fields, in a database table that uniquely identifies each record.

What is a primary key?

100

This type of social engineering attack specifically uses voice phone calls to deceive victims into revealing sensitive information.

What is vishing?

200

A type of non-volatile memory on the motherboard that holds the initial instructions for booting the computer.

What is BIOS or UEFI? (or ROM)

200

The software development methodology where a project is completed in distinct stages and testing only occurs after the development stage.

What is the Waterfall model?

200

A network device that intelligently forwards data only to the specific port connected to the destination device.

What is a switch?

200

The standard language for managing, manipulating, and querying data within a relational database.

What is SQL (Structured Query Language)?

200

A piece of malicious software that can replicate itself and spread across a network without any human interaction or a host file.

What is a worm?

300

This storage drive uses flash memory instead of spinning magnetic platters, resulting in much faster access speeds.

What is a Solid-State Drive (SSD)?

300

The process of running one operating system, like Windows, inside another, like macOS, using a specific type of application.

What is virtualization?

300

A network security policy that permits or denies access based on the unique, physical address of a device's network adapter.

What is MAC filtering?

300

The process of organizing tables and columns in a relational database to minimize data redundancy and improve data integrity.

What is normalization?

300

This security method strengthens access control by requiring users to provide two different types of verification before access is granted.

What is Two-Factor Authentication (2FA)?

400

This cloud computing service model provides raw, virtualized computing resources like servers and storage over the internet.

What is Infrastructure as a Service (IaaS)?

400

In programming, this is the practice of outlining the logic of a program in plain language before writing any actual code.

What is pseudocode?

400

A command-line utility used to test if a host is reachable across a network by sending it a request and waiting for a reply.

What is ping?

400

This term describes a single, complete entry in a database table, represented as a row.

What is a record?

400

The single most effective countermeasure for recovering from a ransomware attack.

What are regular and tested backups?

500

A technician looking at a slow, hot-running laptop would first clean these to improve airflow and cooling.

What are the air vents?

500

A business application designed specifically for managing all of a company's relationships and interactions with its customers.

What is a Customer Relationship Management (CRM) system?

500

This secure protocol is used for encrypting file transfers between a client and a server.

What is SFTP (Secure File Transfer Protocol)?

500

In a database that links students and classes, this is the relationship where one student can enroll in many classes, and one class can have many students.

What is a many-to-many relationship?

500

A security system that acts as a barrier, monitoring and controlling network traffic based on a set of predefined security rules.

What is a firewall?

M
e
n
u