Computer Hardware
Ethics
Operating System
Security
Music/Movies
100

What does ROM stand for?

Read - Only Memory

100

What are Ethics?

Ethics, is a system of moral principles or values that guide individuals in determining right and wrong.

100

What is an OS?

Piece of software that controls everything. It provides a file system structure and communication with hardware.

100

Are computer systems ever fully secured?

No.

100

What actor plays the main role in Waterboy?

Adam Sandler

200

What type of power supply connector is this? 


PCIe connector  


200

What is copyright?

This is a protection given to songs, programs, and other creative words that have an “Author”.

200

Can you upgrade from a 32-Bit OS to a 64-Bit OS?


No

200

What is the CIA triad?

Confidentiality, Integrity, and Availability.

200

What is David Spade's most popular role in a movie?

Tommy boy (Richard)

300

Convert DDR1-333 into PC ratings.

PC-2664

300

What happens when a copyright expires? 

Enters the public domain. 

300

What is PAE?

Physical Address Extension.

300

What are some things that can lead to an unsecure system?


-Not patching systems 

-Using weak Passwords

-Downloading programs from the internet 

-Opening a unknown email attachments 

-Using unencrypted 


300

Who sings Man in the Box?

Alice In Chains

400

The concentric circles on a hard disk are called tracks. Tracks are subdivided into sections or blocks called what?


Sectors. 

400

What does a patent protect?

It protects new products or inventions. 

400

List the requirements for CPU and RAM for Vista, 7, 8, and 10.


  • 7- A 1 GHz 32-bit (x86) or 64-bit (x64) processor.

  • 10 - 1GHZ processor,

400

Explain fabrication. 

This is generating data, processes, communication, or other similar activities with a system.

400

What band does Fred Durst sing in?

Limp Bizkit

500

What Disc interfaces are there?

-Pada/Ide

-Sata

-eSata 

-Scsi


500

What does NORA stand for?

Non - Obvious relationship awareness

500

What are the five main config files and what are their purposes? 


  • HKEY_CLASSES_ROOT – Object linking, embedding information, and how files are associated with each other.

  • HKEY_CURRENT_USERES – Information for the current user of the system

  • HKEY_LOCAL_MACHINE – Information specific to the computer

  • HKEY_USERS – Information for each user of the machine.

  • HKEY_CURRENT-CONFIG – Display and printer settings.

500

What three methods of authentication are there?


-Something you know, like a PW or Pin.

-Something you have, like a key card or FOB.

-Something you are, Biometric fingerprint scans. 


500

Who sings The Ballad of Boot Hill?

Johnny Cash