CPU
Memory
Software
Networks
Protocols
100

Is the ROM readable, writeable, or both?

Readable only.

100

1 Byte = ___ bits.

8

100

List a secondary memory storage device.

Hard drive, CD, USB, floppy disk, ect

100

What's the worlds largest WAN?

The internet!

100

What does the OSI model stand for?

Open Systems Interconnection model.

200

What is the primary function of the ALU?

Performs all the basic arithmetic, logical, and input/output operations.

200

List two differences between primary memory and secondary memory.

Volatility, speed, storage.

200

What's another word for a set of software that controls the computer hardware resources and provides services for computer programs?

An operating system.

200

What's the difference between a client and a server?

A client sends request, a server deals with them.

200

What are protocols?

The rules of communication.

300

List the main parts of the CPU.

CU: Control Unit

MAR: Memory Address Register

MDR: Memory Data Register

ALU: Arithmetic Logic Unit

300

Why is the RAM empty when the computer starts?

Because it is volatile.

300

What is the difference between a GLI and a CLI?

One is graphical and allows for user interaction with a mouse or pointer, the other is command like only and uses direct input by the user.

300

What are some differences between LAN and WLAN networks?

1) They use different transmission mediums

2) LAN is faster

3) Lan is safer

4) WLAN is more flexible

300

Which layer does IP belong to?

Network.

400

What's the difference between the memory address bus and the data bus?

Memory address bus is how the MAR communicates with the primary memory.


Data bus is how the RAM and the MDR connect.

400

A small amount of SRAM placed between the main RAM and the processor is also known as a _______?

Cache.

400

What is the definition of a pixel?

The smallest controllable element in a display or image.

400

What type of network is decentralized?

Peer-2-Peer Networks.

400

List one of the secure VPN technologies.

1) Internet Protocol Security Protocol (IPSec)

2) Secure Sockets Layer (SSL)

3) Transport Layer Security (TLS)

500

List the 4 steps in the machine instruction cycle.

1. Fetch

2. Decode

3. Executor

4. Store

500

Describe the process of virtual memory. 

When primary memory fills up the non-volatile, high-capacity secondary storage is used to handle any overflow to keep all applications running concurrently.

500

Why is the Unicode character-encoding scheme needed?

To deal with non-Latin languages, such as Arabic.

500

What must all data traveling through a VPN always be?

Encrypted.

500

Name five of the seven layers in the OSI model.

Physical, datalink, network, transport, session, presentation, application.