What type of signals are sent through optical fiber for data transmission?
Light signals
Electrical signals
Sound signals
Radio signals
Light signals
Which of the following uses the same technology as a solid-state storage device?
USB Flash Drive
Hard Disk Drive (HDD)
CD-ROM
Magnetic Tape
USB Flash Drive
Which of the following is a common cause of overheating in a computer?
Excessive RAM usage
Overclocking of the hard drive
Using too many USB devices
Insufficient airflow or poor ventilation
Insufficient airflow or poor ventilation
Which type of printer uses a laser beam to form an image on a drum that attracts toner?
Inkjet printer
Laser printer
Thermal printer
Dot matrix printer
Laser printer
Which type of connection can incorporate both video and audio signals?
VGA
DVI
HDMI
DVI-D
HDMI
Which of these devices would commonly use a USB-C to Ethernet adapter?
Wireless printer
Laptop without an Ethernet port
Desktop with a built-in Ethernet port
HDMI monitor
Laptop without an Ethernet port
What type of storage device uses magnetic disks to read and write data?
Flash Drive
Solid-State Drive (SSD)
Optical Drive
Hard Disk Drive (HDD)
Hard Disk Drive (HDD)
What does a blue USB connector signify?
It is used for charging only.
It indicates a data transfer speed of 1.5 Gbps.
It is a standard USB 2.0 connector.
It supports USB 3.0 (SuperSpeed) technology.
It supports USB 3.0 (SuperSpeed) technology.
What does the CIA Triad stand for in the context of information security?
Compliance, Identity, Authentication
Control, Impact, Assessment
Cryptography, Information, Application
Confidentiality, Integrity, Availability
Confidentiality, Integrity, Availability
How does the USB-C connector differ from previous USB connectors?
It is larger than all previous connectors.
It can only be plugged in one way.
It has no top or bottom orientation.
It supports only data connections.
It has no top or bottom orientation.
What is the main difference between the T568A and T568B standards?
The number of conductors used
The shape of the connectors
The colors assigned to the pins
The length of the cables
The colors assigned to the pins
What is the main purpose of RAID 0?
To improve data redundancy
To provide error correction
To enhance data read and write speeds
To enable disk hot-swapping
To enhance data read and write speeds
What is the most significant difference between ATX and ITX motherboard sizes?
ITX motherboards are larger than ATX
ATX motherboards are larger than ITX
ITX motherboards support more RAM
ATX motherboards are smaller than ITX
ATX motherboards are larger than ITX
What does "duplex printing" refer to in a printer?
Printing on both sides of the paper automatically
Printing in high resolution for images
Printing from two computers at the same time
Printing documents with both text and graphics
Printing on both sides of the paper automatically
What is the main difference between SATA 2 and SATA 3?
SATA 3 has a higher data transfer rate than SATA 2.
SATA 2 has a higher data transfer rate than SATA 3.
SATA 2 is only used for SSDs, while SATA 3 is for HDDs.
SATA 3 uses a different physical connector than SATA 2.
SATA 3 has a higher data transfer rate than SATA 2.
Why is fiber optic communication considered more secure?
It uses electrical signals
It does not utilize radio frequencies because it uses light
It requires less maintenance
It is more expensive
It does not utilize radio frequencies because it uses light
Which storage device is best suited for archiving large amounts of data for long periods?
USB Flash Drive
External Hard Drive
Magnetic Tape
SSD
Magnetic Tape
What is the purpose of thermal paste in a computer’s cooling system?
To reduce the noise from fans
To insulate the connection between the CPU and the heatsink for less heat transfer
To improve the connection between the CPU and the heatsink for better heat transfer
To insulate the motherboard from heat damage
To improve the connection between the CPU and the heatsink for better heat transfer
What is the difference between a Trojan and a Backdoor?
A Trojan is a type of virus, while a Backdoor is a type of worm
A Trojan disguises itself as legitimate software, while a Backdoor is created to allow unauthorized access to a system.
Trojans are used for encryption, while Backdoors are used for decryption.
A Trojan spreads across a network, while a Backdoor can only affect a single device.
A Trojan disguises itself as legitimate software, while a Backdoor is created to allow unauthorized access to a system.
What components does a SATA cable typically connect?
Power supply to a motherboard
Graphics card to the power supply
Monitor to the computer
Storage devices like SSDs and HDDs to the motherboard
Storage devices like SSDs and HDDs to the motherboard
What is the main advantage of using single-mode fiber over multi-mode fiber?
It is cheaper to produce.
It allows for multiple modes of light transmission.
It is used for short range communication.
It supports much longer distances without regenerating the signal.
It supports much longer distances without regenerating the signal.
Which of the following RAID levels provides data mirroring?
RAID 1
RAID 0
RAID 10
RAID 5
RAID 1
What was used before USB for data transfers?
Serial Connections
Ethernet cables
Floppy disks
DisplayPort
Serial Connections
An executive of a large corporation receives an email that appears to be from a high-level employee, asking for confidential financial information. This targeted social engineering attack is known as:
Whaling
Spear Phishing
Phishing
Vishing
Which connectivity types does SCSI support?
Only parallel connectivity
Only serial connectivity
Both parallel and serial connectivity
None of the above
Both parallel and serial connectivity