Mystery 1
Mystery 2
Mystery 3
Mystery 4
Mystery 5
100

Name three common types of network cables.

Ethernet (Cat5e/Cat6), Coaxial, and Fiber Optic.
Rationale: Technicians should be familiar with various network cable types for installation and troubleshooting purposes.

100

Explain the difference between a hard drive and an SSD.

A hard drive uses spinning magnetic disks for storage, while an SSD uses flash memory with no moving parts.

100

What is the function of a motherboard in a computer?

To connect and allow communication between various computer components.
Rationale: The motherboard serves as the main circuit board, providing connectivity and power distribution to CPU, RAM, and other components.

100

Name three types of mobile devices.

Smartphones, tablets, and smartwatches.
Rationale: These are common mobile devices that technicians should be familiar with for troubleshooting and support purposes.

100

What is the function of RAM in a computer system?

To provide temporary, high-speed storage for data and instructions that the CPU needs to access quickly.

200

Explain the difference between input and output devices.

Input devices send data to the computer, while output devices receive data from the computer.
Rationale: This distinction is crucial for understanding how users interact with computer systems.

200

What does the acronym "CPU" stand for?

Central Processing Unit
Rationale: The CPU is the primary component of a computer that processes instructions, performs calculations, and manages data flow.

200

How many bits are in a byte?

8 bits
Rationale: A byte is a unit of digital information that consists of 8 bits, which can represent 256 different values (2^8).

200

What is the purpose of binary notation in computing?

To represent data and instructions in a format computers can process.
Rationale: Binary (base-2) is the fundamental language of computers, using only 0s and 1s to represent all data and instructions.

200

What is the function of an antivirus program?

Answer: To detect, prevent, and remove malicious software from a computer system.
Rationale: Antivirus software is a crucial component of computer security and protection against threats.

300

What is the difference between system software and application software?

System software manages and controls computer hardware, while application software performs specific tasks for users.
Rationale: This distinction is important for understanding software categories and their roles in computer systems.

300

Name three common operating systems for personal computers.

Answer: Windows, macOS, and Linux.
Rationale: These are the most widely used operating systems that technicians should be familiar with.

300

What is the purpose of a web browser?

Answer: To retrieve, present, and navigate information on the World Wide Web.
Rationale: Web browsers are essential applications for accessing internet content and services.

300

Explain the difference between a word processor and a spreadsheet application.

Answer: A word processor is for creating and editing text documents, while a spreadsheet is for organizing and analyzing data in tabular form.
Rationale: Understanding the primary functions of common productivity applications is important for supporting users.

300

What is the purpose of a strong password?

Answer: To protect user accounts and data from unauthorized access.
Rationale: Strong passwords are a fundamental aspect of information security and access control.

400

Define the term "phishing" in the context of cybersecurity.

Answer: A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
Rationale: Phishing is a common social engineering tactic that technicians should be able to recognize and prevent.

400

What is the difference between a virus and malware?

Answer: A virus is a type of malware that replicates and spreads, while malware is a broader term for any malicious software.
Rationale: Understanding different types of threats is crucial for effective cybersecurity practices.

400

Explain the concept of two-factor authentication.

Answer: A security process that requires two different forms of identification to access an account or system.
Rationale: Two-factor authentication adds an extra layer of security beyond just a password, enhancing account protection.

400

What is the purpose of encryption?

Answer: To convert data into a code to prevent unauthorized access and protect confidentiality.
Rationale: Encryption is a fundamental concept in data security and privacy protection.

400

What is the difference between a compiled and interpreted programming language?

Answer: Compiled languages are translated to machine code before execution, while interpreted languages are translated line-by-line during execution.
Rationale: Understanding different language types is important for software development and troubleshooting.

500

Define the term "variable" in programming.

Answer: A named storage location in a program that holds a value that can change during execution.
Rationale: Variables are fundamental building blocks in programming and essential for data manipulation.

500

What is the purpose of a database management system (DBMS)?

Answer: To store, retrieve, and manage data in a structured way, providing an interface between databases and users or applications.
Rationale: DBMSs are crucial for efficient data management in various applications and systems.

500

Explain the difference between a flat file and a relational database.

Answer: A flat file stores data in a single table, while a relational database uses multiple tables with defined relationships between them.
Rationale: Understanding database structures is important for data management and system design.

500

What is SQL used for?

Answer: To manage and query relational databases.
Rationale: SQL is the standard language for interacting with relational databases, essential for data manipulation and retrieval.

500

What is the difference between a LAN and a WAN?

Answer: A LAN (Local Area Network) covers a small area like an office, while a WAN (Wide Area Network) covers a larger geographic area.
Rationale: Understanding network types and their scope is fundamental to network design and management.