Should you hack someone's computer.
You may only exploit computers you have permission to exploit. Be sure to set ground with the person you are hacking, so you don't reach into unauthorized areas by mistake.
How to tell if PCIE slot is x16 or x1.
Check physical length, use motherboard manual, or use software.
Can you install two OS's on one SSD.
You can use virtualization or dual-boot methods.
How do you make a strong password?
Why don't you poor orange juice on a computer?
sigh It's because connecting two points on a motherboard that is not suppose to be connected can damage the computer.
What is DMCA?
Digital Millennium copyright act addresses the relationship between copyright and the internet, aiming to protect copyright holders from online theft by making online service providers liable.
Does a ATX motherboard fit in a mini-ITX case?
No they are not the safe standard, so you'd need to do some work.
What is the most comon OS?
Windows
Why do you prevent physical access to your computer.
Because even with a password the computer can be modified through various means such as modifying the hard drive directly.
What USB type is squarish.
USB type B.
how should a company protect their data?
Have transparency with who has access with your clients and ensure that no unauthorized access is obtained using many measures.
Should you have positive pressure or negative pressure in your PC?
Positive
How do you enter the bios?
Spam you bios key while turning on
Why would you want privacy screens on your phone or monitor.
So people won't see any sensitive info you have displayed.
What are the two types of keyboard plugs.
USB and PS/2
Is pirating allowed is some places?
Piracy in itself is theft, but there are digital preservation programs in Australia, the United States, and Japan.
How to get PC rating from PCIE speed.
Times the MHz speed by 8 and add the put in the DDR type.
PC3-3200
Why would you want to enable XMP or EXPO?
Faster speed and lower latency
Why would you have isolated devices for specific tasks.
Because if one use of your device is compromised, every other use is also vulnerable.
What are the 3 main types of CPU cooling.
Air cooling, liquid cooling, and immersion cooling.
Should you host a watering hole?
No because your tricking people into installing malware.
What is the MSRP of the gtx 1060
299
What is the kernel?
A bridge between hardware and software.
How do you protect all threats from your computer.
Destroy it. Or air-gap it with encryption and isolation.
What is a RMDA card?
A Remote Direct Memory Access PCIE card facilitates memory data transfer without requiring the processor to be involved.