"Byte"-Sized Basics
(IT Concepts & Terminology)
The Tech Backbone (Infrastructure)
The App-etizer (Applications & Software)
Code Crunchers (Software Development Concepts)
Info Central
(Data & Database Fundamentals)
100

This numerical system, using only 1s and 0s, is the fundamental language understood by all computers.

What is Base 2 (or Binary)?

100

This type of cable is commonly used for the transmission of data. It can be used to connect computers, switches, routers, access points and more.

Ethernet (Cat 5e, 6, 6a etc...)
100

Keeping software current with these helps protect against security threats & improves performance.

What are software updates?

100

Unlike scripting languages, this type of language requires translation into machine code before it can be executed.

What are compiled languages like C++, Java, or others?

100

This type of data is organized into rows and columns within a table structure.

What is relational data?

200

This is the measure of how many bits are transmitted across a connection each second, expressed in units like Kbps, Mbps, or Gbps.

What is Throughput?

200

These common devices are used as permanent forms of storage also known as non-volatile storage. Name 3

What is a Solid State Drive (SSD), Hard Disk Drive (HDD), Solid State Hard Drive (SSHD), Optical Media (Blu-ray, DVD, CD), Flash Storage (USB Flash Drive)

200

If a computer doesn't have enough of this, it may run slowly as it relies more on the hard drive for temporary storage. 

What is RAM (Random Access Memory)?

200

These named storage locations hold values that can change during program execution.

What are variables in programming?

200

These are used to query, insert, update, and delete data within a database.

What are SQL commands?

300

While a byte consists of eight bits, this four-bit binary number represents the decimal value ten.

What is 1010?

300

This device sits at the center of most networks, examining data packets and forwarding them only to the intended recipient's port (MAC Address).

What is a network switch

300

One of these tells the computer what to do, while the other holds the information it works with.

What is the difference between a program and a file?

300

This low-level language uses mnemonics to represent machine instructions, requiring a separate program to translate it into executable code.

What is assembly language?

300

This type of database allows for storing unstructured or semi-structured data, often in a document-like format.

What is a NoSQL database?

400

To be useful, a computer must reliably handle data through these four stages.

What are Input, Processing, Output, and Storage?

400

One of these memory types is "volatile," meaning it requires constant power to retain information, while the other provides long-term, non-volatile storage.

What is Random Access Memory (RAM) and Read Only Memory(ROM)?

400

This improves performance by reducing latency and bandwidth usage when accessing commonly requested content.

What is web browser caching?

400

This data structure stores a fixed-size collection of elements of the same type in contiguous memory locations.

What is an array?

400

This type of key uniquely identifies each record within a table, ensuring no two records are exactly alike.

What is a primary key?

500

Computers operate using these fundamental components – one being a single binary digit, the other comprised of eight of them.

What are a bit and a byte?

500

Before diving into complex diagnostics, these two things must be verified when a computer fails to power on.

What is checking the power cord connection and verifying the power supply is functioning?

500

Unwanted pop-up ads often indicate this type of software has been installed without the user's knowledge.

What is adware or malware?

500

This dynamic data structure can grow or shrink as needed, managing its own memory allocation for storing elements.

What is a vector?

500

This security measure restricts access to specific data based on user roles and permissions.

What is database access control or role-based access control?