hardware
Networking
Mobile Devices
Troubleshooting
Security
100

Explain the role of thermal paste when installing a CPU and why it is necessary.

Thermal paste disperses heat, helping cooling efficiency.

100

What is the purpose of DHCP in a network, and how does it work?

Dhcp stands for dynamic host configuration protocol

Dhcp automatically assigns ip addresses by using a server to lease ip addresses to devices when they connect

How does it work?

  • It works by having  a ip address pool that it can lease addresses from that aren’t already reserved (static)

100

What is the most common charging port used by modern smartphones, and what advantages does it offer?

  • Usb-c is the most common type of charging port on modern smartphones

  • Usb-c can provide:

    • Fast charging 

    • Higher data throughput (aka transfer speed)

    • Versatile connector (where you can plug it in either way)

100

If a user cannot connect to a wireless network, what steps would you take to troubleshoot the issue?

  • Turn off and on

  • Check if their wifi is on

  • Check if they have airplane mode on

  • Check to see if the wireless NIC is defective

100

What are some effective methods for protecting a computer from malware and unauthorized access?

  1. Malware protection:

    1. Enabling the native firewall

    2. Enabling native antivirus 

    3. Updating antivirus signatures

    4. Only using downloads from OEM (original equipment manufacturer) website

    5. Looking out for suspicious links

    6. Enabling virus total


  1. Unauthorized access

    1. Turn off remote access

    2. Turn off unnecessary ports

    3. Only use secure ports 

    4. Password

    5. Mfa

      1. Biology (i.e fingerprints, eyes, idk)

      2. Something we know

      3. Something we have


200

What types of cables can be used to connect a monitor to a desktop computer, and how do they differ? (there is 5)

Hdmi (digital)

display port (digital)

Vga (analog)

Dvi (both) 

Usb-c (digital)

200

Describe the function of a switch in a network and explain how it differs from a hub.

  • The function of a switch is to be used to connect with multiple devices from one central location. To move traffic throughout the network  uses MAC addresses.

  • A hub is a device that cannot forward traffic based on MAC addresses. Instead, it accepts traffic and sends it off to wherever it is connected to.

200

What is hardware encryption on mobile devices, and how does it protect data?

  • Locking down information using advanced algorithms, that only the creator of the information can authorize it.

  • It protects data by preventing unauthorized access for third parties

    • Password

    • Mfa

    • Biometric

200
  1. What could be the cause of a "blue screen of death" (BSOD) on a Windows system, and how would you address it?

  1. Lack of storage on the C: drive

  2. Partitions are corrupted (chkdsk)

  3. Driver failures

  4. Corrupt software.

Piece of hardware became loose on the motherboard i.e. ram, cpu, sata connections


200

Describe the purpose of a firewall in a network environment and how it helps protect data.

  1. It allows traffic to be filtered through the use of inclusion and exclusion rules.

  2. It provides an extra layer of security to an enterprise network

  3. It also can be used for VPN access to a network

  4. NGFW (next generation firewall)


300

What are the key differences between a Solid State Drive (SSD) and a Hard Disk Drive (HDD)?

Ssd 

  • Faster read and write

  • Shorter storage life time than hdd

  • Uses NAND memory for storage

hdd 

  • is cheaper than ssd

  • Slower read and write speeds

  • Longer storage lifetime

  • Uses a magnetic platter for storage

300

What is the default subnet mask for a Class C IPv4 network, and how does it impact network configuration?

  • Class a- 255.0.0.0

  • Class b- 255.255.0.0

  • Class c- 255.255.255.0


300

Explain the main differences between Android and iOS operating systems for mobile devices.

Android is more customizable and supports a wide range of devices , aka open source (anyone can code)

iOS is a closed ecosystem, optimized performance, and tighter security


300

What tool can be used to check the integrity of a hard drive in Windows, and how is it used?

The chkdsk command in the terminal to check for bad sectors and storage integrity.

300

What are some common signs of a phishing attempt, and how can you avoid falling victim to one?

  1. Misspelling 

  2. Too good to be true

  3. A sense of urgency with personal matters

  4. Lack of context in message

  5. No contact information from the sender

400

Describe the function and use of a PCIe x16 slot in modern desktops.

Pcle x8- only has 8 data lanes (means slower than x16)

Pcle x16- only has 16 data lanes and is faster than x8

In modern computers we use x16 more often than its predecessors

It provides a high-bandwidth primarily for gpus

400

How can a static IP address be assigned to a computer, and what are the advantages of doing so?

  • The name for assigned a static IP address to a device using DHCP is call an IPv4 address reservation.

  • The advantage of assigning an IPv4 address reservation is that DHCP will never lease that address unless changed.

400

What is NFC (Near Field Communication), and how is it commonly used in mobile devices?

Wireless data to be sent using one powered device and multiple unpowered devices. Amiibo, skylanders, tap to pay, business card.

400

If a computer emits continuous beeping sounds during boot-up, what does this typically indicate?

Tells you that the ram is either not installed properly or it is defective. The beeps happen during POST

400

What is multifactor authentication, and why is it an important security measure? Provide an example.

  1. Multi factor authentication is a security measure that adds an extra layer of security to system that require authentication

    1. Biology

    2. Something we have

    3. Something we know

500

What is the primary role of a power supply unit (PSU) in a computer system?

  • Supplies power to main components of pc

  • The unit of power comes in watts


500

What is a private IP address, and how does it differ from a public IP address? Provide an example of each. (hint, 0-223 are the same)

  • Class a: 0-127 (private/public)

  • Class b: 128-191 (private/public)

  • Class c: 192-223 (private/public)

  • Class d: 224-239 (multicast)

  • Class e: 240-255 (government)

    • APIPA -169.254.0.1

    • Loopback address -127.0.0.1

  • difference is

    • Private IP: Works within a local network.Can be reused across different private networks (not unique globally).  
    • Public IP: Works on the broader internet. Unique globally. 


500

If a mobile device’s screen becomes unresponsive, what steps should be taken to troubleshoot the issue?

  • Test if it's powered off. 

  • Turn it on and off.

  • Force power off the device (advanced user)

500

What is Safe Mode in Windows, and how does it help with troubleshooting system issues?

  1. A utility that is a part of windows that allows you to boot into the OS with necessary software and drivers

    1. Helps with troubleshooting by getting rid of 3rd party drivers/software that may be conflicting.

500

(this is an Operating Systems question, just didn't want to make another column)

  1. What is the purpose of the File History feature in Windows?

File history in windows is used to back up your files locally. It is a native feature in all windows operating systems