ITST 1101 [Online Class]

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/90

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

91 Terms

1
New cards

Whats a Bare Metal Hypervisor [Type 1] ?

Used mostly in enterprises. Runs directly on hardware. Must install Management Console to configure.

2
New cards

Whats a Host OS Hypervisor [Type 2] ?

Runs on top of an existing OS. Desktop or small server.

3
New cards

What is Form Factor and where is it used?

Its a set of specifications that define a motherboards layout, dimensions and connection points.
The most common one being ATX.

4
New cards

What is the 3 components that must be present to process data?

CPU [Central Processing Unit]
RAM [Random Access Memory]
Storage [HDD/SSD]

5
New cards

The purpose of CMOS?

A type of integrated circuit which stores basic configuration information for the computer.

6
New cards

What is a Pin Grid Array (PGA)?

Allows the CPU to be inserted into the socket of the motherboard

7
New cards

What is Virtualization?

The creation of virtual versions of physical hardware, allowing multiple OS to run on a single physical machine.

8
New cards

What is a Hypervisor?

Known as the VM manager, It creates and manages VMs, it allows multiple OS to share a single hardware host.

9
New cards

How does Virtualization reduce costs, increase flexibility, and increase security?

Reduces IT hardware expenses-One physical machine to run multiple VMs.
Increased flexibility-Companies can add or remove VMs as needed.
Increased security- Each VM is isolated from others.

10
New cards

What is the battery for?

The battery maintains that CMOS settings such as the Date/Time, Boot Order, Hardware Settings, Password Info.

11
New cards

Liquid Cooling

Uses liquid to dissipate heat from the CPU

12
New cards

Passive Cooling

Silent cooling that relies on heat sinks and natural convention without fans

13
New cards

Active Cooling

Uses fans and other components to remove heat. Thermal paste is required.

14
New cards

Hybrid Cooling

Combines liquid and air cooling.

15
New cards

Types of memory module packaging:
SFF [Small Form Factor]

Designed to take up less space.

16
New cards

Types of memory module packaging:
SO-DIMM [Small Outline Dimm]

Smaller version of DIMM in desktops

17
New cards

Types of memory module packaging:
DIMM [Dual Inline]

Standard memory module used in desktops.

18
New cards

Types of memory module packaging:
DDR [Double Data Rate]

Type of memory technology

19
New cards

Voltage [VDC] supplied by an ATX power supply

An ATX power supply typically provides multiple voltage outputs, including +12VDC, +5VDC, and +3.3VDC, to power different components

20
New cards

Whats the standard power supply for a desktop or workstation?

the ATX power supply converts 120 VAC to +3.3 VDC, +5 VDC and -12 VDC.

21
New cards

What is the SATA [Serial Advanced Technology Attachment] and what component uses it

the standard interface for connecting storage devices like hard drives and SSDs to the motherboard.

22
New cards

Difference between SSD and HDD

[Solid State Drive] Non-volatile flash memory. Lighter, faster and more reliable than mechanical HDDs

[Hard Disk Drives]
Type of fixed disk internal persistent storage device.
Non-volatile storage. Connects via SATA or IDE

23
New cards

Chipsets and their usage.

A group of integrated circuits that manage data flow between the CPU, memory and peripherals. It determines compatibility and performance of the motherboard and connected devices.

24
New cards

Different printer types:
Inkjet

In which the ink is sprayed onto the paper using microscopic nozzles.

25
New cards

Difference printer types:
Laser

Develops an image on a drum using electrical charges to attract a special toner.

26
New cards

Different printer types:
Dot Matrix

A type of impact printer that uses a set of pins to strike the ribbon to create printed characters and images.

27
New cards

Different printer types:
Thermal

Uses a thermal print heat to fuse or transfer wax based ink onto paper.

28
New cards

Which OS has the largest market share?

Windows

29
New cards

The function of an OS

A software package that enables a PC to function by performing tasks. Basic system functions, enables hardware, software and users to communicate.

30
New cards

Recent LINUX distributions

Ubuntu 22.04 LTS, Fedora 39, and Debian 12

31
New cards

Recent Mac versions

macOS Ventura [13] and macOS Sonoma [14]

32
New cards

Recent Windows versions

Windows 10 but Windows 11 was released

33
New cards

Mobile OS

Android, iOS

34
New cards

Window Applets-Settings, Network, Programs etc.

Are tools and utilities built into the OS for managing settings, network connections, installed programs, and other system functions.

35
New cards

What is the Taskbar?

A user interface in Windows that displays open apps and system notifications.

36
New cards

Whats the CLI and what is it used for?

[Command Line Interface] Required for all OS, is a text based interface used to interact with the OS.

37
New cards

The basic CLI commands
[Theres a lot]

cls [clear screen]
dir [display content]
tree [display tree structure]
cd [change directory]
cd.. [change to root directory]]
cd\ [change up to 1 level]
cd path [change to a path]
help dir [directory cmnd help]
md [make directory]
rd [remove directory]
copy
del
move
rename
format [format a disk]
doskey [command history]
exit

38
New cards

How to get help for CLI commands

Command name followed with a / and a question mark ?
dir/? or help dir

39
New cards

Do CLI deleted files go to the Trash Bin?

They are usually permanently deleted.

40
New cards

Characteristics of HEX, Decimal and Binary

HEX - uses 0-9 and A-F often used in computing for memory addresses and color nodes.
Decimal- Base 10 numeral system (0-9), used in everyday counting.
Binary - uses 0 and 1 used by computers.

41
New cards

What are batch files used for?

A text file containing a series of CLI commands. Allow MS-DOS and Windows to write a series of commands to run in order.

42
New cards

Common Header File commands

@ECHO OFF
REM

43
New cards

How to append output to an existing file

Files can be appended using the >> symbols
ipconfig /all >>ip.txt

44
New cards

Differences between WAN, LAN and PAN:
WAN

WAN [Wide Area Network]-Covers a large geographic area, such as cities or countries.

45
New cards

Differences between WAN, LAN and PAN:
LAN

LAN [Local Area Network]-Covers a smaller area, like a single building.

46
New cards

Differences between WAN, LAN and PAN:
PAN

PAN [Personal Area Network]-A very small network, typically around an individual

47
New cards

IPv4 vs IPv6 addresses

IPv4 - Displayed as four 8-bit segments.[192.168.2.2]
IPv6 - Displayed as 8 segments of 4 hex digits separated by a colon [1203:BFEO:FE80:8897:8A7C:99BF:323D]

48
New cards

What is a physical address

An actual address in memory hardware, where data is stored.

49
New cards

MAC vs IP address, which is routable?

IP Address

50
New cards

How is a MAC address assigned to a NIC

Assigned a unique MAC address by a manufacturer.

51
New cards

UTP vs STP cables. How many wire parts?

[Unshielded Twisted Pair] Typically has 4 wire pairs and used in networking.
[Shielded Twisted Pair] Also has 4 but has screened cables.

52
New cards

Coax vs Twisted Pair vs Fiber:
Coax

Two copper conductors used for cable and internet. Losing popularity.

53
New cards

Coax vs Twisted Pair vs Fiber:
Twisted Pair

Consists of pairs of wires twisted together to reduce interference.

54
New cards

Coax vs Twisted Pair vs Fiber:
Fiber

Electrical signals on copper wire, uses light to transmit data.

55
New cards

What frequency is used by Wifi?

Using radio waves it starts from 2.4 GHz- 5GHz.

56
New cards

WAP vs Router vs Switch:
WAP

[Wireless Access Point] Provides wifi services and connections to a network. Connects wireless devices to a network.

57
New cards

WAP vs Router vs Switch:
Router

Uses IP addresses to decide where data packets are sent. Routes data to different networks.

58
New cards

WAP vs Router vs Switch:
Switch

Manages data distribution using the MAC address of devices. Acts like a hub, repeater and bridge.

59
New cards

What is a Gateway

Connects two different networks.

60
New cards

What are the application pre-installation tasks

-Review the software documentation instructions.
-Check for hardware compatibility.
-Check for OS compatibility.
-Verify the software license is valid.
-Determine if the anit-malware should be disabled.
-Determine which software options will need to be customized.

61
New cards

What is a FreeWare license?

Allows users to download use the software for free, typically prohibits modifications and distribution.

62
New cards

What is EULA?

[End User License Agreement] Legal contract between the software developer and the user, outlining the rights and limitations of using the software

63
New cards

What is a Single User license?

Permits one individual to use a software application on one device, often restricting installation on multiple devices

64
New cards

Network Installed Software

Controlled and maintained by the IT department, usually a corporate or enterprise license.

65
New cards

File extensions

.docx: [Word]
.xlxs [Excel]
.pptx [PowerPoint]
.mp4 [Video]
.pdf [Portable Document File]
.jpg [Image]
.png [Image]
.mp3 [Audio]
.exe [Application]
.zip [Compressed]

66
New cards

Utility, Business, Conferencing, Collaboration differences:
Utility

Programs that accompany the OS or are procured from a third party developer.

67
New cards

Utility, Business, Conferencing, Collaboration differences:
Business

Designed to increase users productivity. Used in a business setting.

68
New cards

Utility, Business, Conferencing, Collaboration differences:
Conferencing

Tools for virtual meetings [Zoom]

69
New cards

Utility, Business, Conferencing, Collaboration differences:
Collaboration

Multiple users work on a single project
[Email, Google Drive]

70
New cards

Characteristics of Cloud Computing

1) On-Demand Self-Service
2) Broad Network Access
3) Resource Pooling
4) Rapid Elasticity
5) Measured Service

71
New cards

Services of CM

SaaS [Software as a Service]
PaaS [Platform as a Service]
IaaS [Infrastructure as a Service]

72
New cards

What is scalability or rapid elasticity?

Scalability is the ability of a system to grow and manage increased demand.
Rapid Elasticity allows cloud resources to be released automatically.

73
New cards

IaaS, PaaS, SaaS, CaaS

SaaS [Software as a Service]
PaaS [Platform as a Service]
IaaS [Infrastructure as a Service]
CaaS [Container as a Service]

74
New cards

Public, Private, Community, Hybrid Cloud: Public

Based services are provided by third-party vendors and are available to anyone

75
New cards

Public, Private, Community, Hybrid Cloud: Private

Available only to users in an organization.

76
New cards

Public, Private, Community, Hybrid Cloud: Community

A private cloud that is shared by two or more organizations.

77
New cards

Public, Private, Community, Hybrid Cloud: Hybrid

A combination of of any two or more clouds.

78
New cards

What is typically used for identification?

Referred to as the username

79
New cards

What type of data is targeted by bad actors?

Personally Identifiable Information [PII]
Personal Health Information [PHI]

80
New cards

What is used for Biometric Authentication

Unique characteristcs such as fingerprints, face id etc.

81
New cards

Typical password policies

Length
Complexity
Aging
Reuse and History

82
New cards

How often is it recommended to change a password?

6 months or when its supicious

83
New cards

What is GEO fencing?

a technology that uses GPS or RFID to create virtual boundaries. It can trigger a response when a device enters or exits these predefined areas

84
New cards

What is the CIA triad?

Confidentiality, Integrity, and Availability

85
New cards

What is digital privacy?

Describes a user's data and how it is stored and maintained by a company or organization.

86
New cards

What does integrity mean

refers to the assurance that data is accurate, consistent, and not tampered with or altered

87
New cards

What US state level legislation that Addresses Digital Privacy

California Consumer Privacy Act [CCPA] and the Illinois Biometric Information Privacy Act [BIPA] Sarbanes-Oxley Act [SOX]
[FISMA]
[GLBA]
[HIPAA]

88
New cards

Asymmetric vs Symmetric

Asymmetric uses two keys, a public and a private.
Symmetric is a two way encryption scheme where its performed by the same key.

89
New cards

What is RSA

RSA (Rivest-Shamir-Adleman) is an asymmetric encryption algorithm widely used for secure data transmission

90
New cards

What is SHA3-384

SHA3-384 is a cryptographic hash function that produces a 384-bit hash value.

91
New cards

What is Misdirection?

Misdirection in cybersecurity refers to tactics used by attackers to divert attention away from their real intent, often to exploit vulnerabilities.