Computer Basics & Hardware
Computer Software
Networking & Wireless Networks
Cyber Security
DataBases
100

One Gigabyte is equal to ___________ Megabytes?


1000

 

100

Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions at the same time.

What is another name for the instructions?

Processes

100

Multiple computers configured to be able to communicate and share information with each other form a ____________.


Network

100

What is the best countermeasure against social engineering?

User awareness training

100

What is a way for programmers and others to make sense of complex business flows?

Data modeling

200

The memory component that provides the workspace for a processor.

RAM

200

 You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?

Hypervisor Type 1

200

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.

What feature lets you allow or reject client connections based on the hardware address?

MAC address filtering

200

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

200

 What should not be used as a primary key in a table?

First name




300

Information that is converted to electrical pulses of varying amplitudes, denoted by waves, that deteriorates with transmission. These are continuous signals that represents physical measurements.

Analog 



300

Which of the following describes the firmware in gaming consoles, TVs, and smart cars?

Embedded OS

300

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?


Modem

300

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.

Zombie/botnet

300

What is the computer language that makes relational databases work?

SQL

400

___________ provides a unique number for every character, no matter what platform, device, application or language.


Unicode Standard

400

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. What are the best solutions to his problem?

  1. Configure the screen saver to require a password.
  2. Configure the screen lock to be applied after a short period of non-use.
400

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Improved performance

400

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. What security practices was violated?

Principle of least privilege

400

What needs to be done before Big Data can be analyzed and interpreted?

Data extraction

500

Convert binary 01101110 in to a decimal number.

110

500

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?

Firmware

500

 Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email.

Which of the following should be implemented?

Email filtering

500

Which Internet protocol is used to transmit encrypted data?

HTTPS

500

Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?

Big Data