HARDWARE
SOFTWARE
WHO KNOWS
NETWORKS
SECURITY
EXTRAS
100

What is the binary number system?

A system used by computers, consisting of 0s and 1s

100

 Under what category of programs and apps do databases and enterprise computing fall?

productivity

100

 Which computer component stores data and programs that the CPU is currently using? 

RAM

100

http

100

What is the process of converting data that is readable by humans into encoded characters.

encryption

100

 A(n) ______ is an item that contains data, as well as the actions that read or process the data. 

Object

200

What is stored in a functional computer's read-only memory (ROM)?

boot loader

200

Name  three Operating Systems?

WINDOW, Linux, UNIX, Andriod, Mac OS, IOS

200

What happens if your computer or mobile device uses up its available RAM?

The operating system may use virtual memory

200

The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense.

arpanet

200

Name two  recommended safe browsing techniques

Turn off location sharing, Enable a pop-up blocker, erase your browsing history, never store passwords

200

Name two OOP programming languages

C++, JAVA, Python, JavaScript

300

 A gigabyte is equal to approximately a _____ characters. 

billion

300

What type of  software  assesses and reports information about various computer resources and devices.

performance monitor

300

what is the decimal equivalent of the binary 1101?

13

300

 Which data transport protocol includes robust error checking?

TCP

300

What is a  program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network?

back door

300

During which phase of system development would you acquire any necessary hardware and software?

Design

400

Name three factors that can affect microprocessor's performance.

Number of cores, clock speed, cache, instruction set, architecture, bus speed and bandwidth

400

What  best describes open source software?   

Provided for use, modification, and redistribution.

400

What kind of error is a syntax error?

An error that occurs when the code violates the rules of the programming language.

400

What networking technology   enables devices to communicate and share data over a wired local area network (LAN).  

ethernet

400

Name three recommended practice for enhancing computer security?

not downloading and installing software from unverified sources, Keeping your operating system and software up to date,  not using the same password for all your online accounts, strong passwords, using antivirus/firewall

400

What is the output of the variable z of the following Python code snippet?

x =12
y = 11
z = x * y - 5 

127

500

 What are the essential characteristics that define a computer?     

Central Processing Unit (CPU), memory, input/output devices, and software

500

Describe the difference between analog and digital

Analog are continuous waves and digital is discrete off/on, 0/1

500

Why use the IF function in Excel?

The IF function in Excel is used to perform logical tests and return one value for a TRUE result and another for a FALSE result.

500

Which topology offers the greatest number of possible paths from one node to another?

full mesh

500

Name three ways to stay safe from malware

disconnect from internet, use a firewall, don't click on links, never click OK in a pop-up spyware window, be cautious of using public wi-fi

500

The  output of the code below is (what is the final  value of sum ):                   

i = 0

sum = 1

while i < 2:

        sum = sum  +  i

        i = i + 1


print(sum)

 2