Module 1

5.0(1)
studied byStudied by 45 people
5.0(1)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/101

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

102 Terms

1
New cards

American Standard Code for Information Interchange (ASCII)

What is the most common character set used for coding to represent text in computers?

2
New cards

ASCII and Unicode

What are the two common ways of presenting character set data?

3
New cards

Hexadecimal

Which notation system presents the largest numbers using the fewest digits?

4
New cards

1010

Convert the decimal number 10 into binary notation

5
New cards

A single digit in a range from 0 to 1 is used. This number represents an on or off state. Each column is worth two times the column to its right. This is also known as base

How is binary notation expressed?

6
New cards

48

What is the decimal number 75 in hexadecimal notation?

7
New cards

Decimal Notation

What type of notation is used in common math?

8
New cards

To express large numbers

When should you use hexadecimal notation?

9
New cards

A character set maps letters, numbers, and symbols to binary values.

How do computers differentiate binary data and map it to letters, numbers, and symbols?

10
New cards

Each single digit is assigned one of ten values ranging from 0-9 whereby each column is ten times more than the digit to its right. This is also known as base 10.

How is decimal notation expressed?

11
New cards

UTF-8

Websites tend to use what Unicode standard?

12
New cards

You cannot perform mathematical operations on it.

What limitation is placed on a number when it is entered as a character data type?

13
New cards

A single byte

How much storage space is consumed by the character data type?

14
New cards

Between 4 and 8 bytes

How much storage space is consumed by the floating point number data type?

15
New cards

Whole numbers that are in base 10, such as 5, 21, or 65536

How are integers represented?

16
New cards

The data type determines what sort of operations can be performed.

Why is it important to understand the different data types that a computer program can use?

17
New cards

String

The value “CompTIA” is a representation of which data type?

18
New cards

Boolean Values

What special numeric data type indicates that something is either TRUE or FALSE?

19
New cards

There is no limitation to the amount of storage used by a string.

How is the amount of storage that can be used by a string limited?

20
New cards

Floating point numbers or just “float”

What fundamental data type is used to support decimal fractions such as 4.1, 26.4, and 5.62?

21
New cards

Boolean

Which of the following data types can NOT store the number 3?

22
New cards

“John said \’Hello World\’ then left again.”

Which of the following is the correct syntax of using an escape character to include a quote character in a string definition?

23
New cards

Between 1 and 8 bytes

How much storage space is consumed by the integer data type?

24
New cards

A single bit

How much storage space is consumed by the Boolean data type?

25
New cards

Through the use of peripheral devices, such as mice and keyboards

How does a computer receive data entered by a user?

26
New cards

Data running on system memory is only preserved while the computer is powered up.

Why do computers save or write data to a storage device?

27
New cards

Information shared in an IT system using nothing more complicated than the binary digits 1 and 0

How is computer data defined?

28
New cards

Data is shown or displayed to the user through an output device

How does a user receive information from a computer?

29
New cards

Software refers to a collection of data or computer instructions that tell the computer how to work. Hardware is the set of physical components that make up the system and perform the work

What is the difference between hardware and software?

30
New cards

To enter information as input or deliver to the user as output

What is the most common use for peripheral devices in a computer?

31
New cards

The parts of the computer that reside within the monitor

What are peripheral devices?

32
New cards

The computer is using the CPU to act on instructions from the operating system and application software

When a computer writes data to memory and manipulates that data, the computer is said to be doing what?

33
New cards

Hardware, software, and the computer user

What three elements are required for a computer to perform useful tasks?

34
New cards

All types of computer

What systems use a Central Processing Unit (CPU) and memory?

35
New cards

A security breach that occurs when an individual’s or organization’s data is illegally copied with or without their knowledge

What is a data exfiltration?

36
New cards

It allows a human to analyze and interpret the information

Why is meaningful reporting an important factor of data-driven business decisions?

37
New cards

The process of analyzing the whole data set and finding connections and links between data points

What is data correlation?

38
New cards

Intellectual property can be protected through trademarks, copyrights, and patents

How is intellectual property protected?

39
New cards

Capture data, correlate the data, and convert it into meaningful reports

What activities must one perform to make data-driven business decisions?

40
New cards

A video download

What is an example of a digital product?

41
New cards

The traditional relational data model has a popular and ready-made query language, SQL

Which of the following is a disadvantage of a semi-structured data warehouse for storing information?

42
New cards

It is a legal protection granted to certain types of work that gives its holder the right to control the use of the work, including rights of publication, distribution, or sale

What is a copyright used for?

43
New cards

A trademark protects a unique element such as a company name or logo

What is used to protect a name or logo?

44
New cards

When it is applied to some purpose and adds timely value for the recipient

When does data become information?

45
New cards

Return on Security Investment; to calculate ROSI, you perform risk assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur when an attacker removes data from your network without authorization

In Information Technology (IT) terminology, what is ROSI and how do you calculate it?

46
New cards

When your network exposes private data publicly, whether or not the data is actively stolen

What is a data breach?

47
New cards

Set-up of a data capture and collection system

What is the first step needed to begin a data-driven business decision?

48
New cards

You can patent it

How do you protect an idea or invention without actually creating an example of it?

49
New cards

Digital Rights Management (DRM) systems

What invention was created to try to enforce copyright protection on digital products?

50
New cards

Digital sales through peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules

Which of these is NOT a positive trait of a digital product in regard to the value assigned to information and data?

51
New cards

A trademark

hat is used in lieu of a copyright to protect a name or logo?

52
New cards

Data can be considered an asset and as such it has commercial value

Which of the following statements about the protection of data is true?

53
New cards

Patent infringement

What do you call an action through which someone uses, makes, sells, or imports your invention without your permission?

54
New cards

Audits and inventories

Which of these is NOT an example of security controls?

55
New cards

The effectiveness of defense methods is decreasing

Which is NOT a reason cybersecurity is important?

56
New cards

Petabyte, or 1000 TB

What unit is used to measure large storage network and cloud systems?

57
New cards

The Megabyte (MB), which is 1000 x 1000 bytes

Medium to large files are measured in what unit?

58
New cards

The binary digit or bit, which can represent two values (0 or 1)

What is the basic unit of computer data?

59
New cards

Kilobyte (KB), or 1000 bytes

Small files are often measured in what unit?

60
New cards

Kbps, or 1000 bits per second

Older computer peripheral interfaces and slow network links are measured in what type of throughput unit?

61
New cards

Gigahertz (GHz) or 1000 million cycles per second

Modern Central Processing Units (CPUs) and bus types plus fiber optic network equipment work at what signal speed?

62
New cards

Gbps, or 1,000,000,000 bits per second

The latest PC bus standards and networks can support what higher level of throughput speed?

63
New cards

The Gigabyte (GB), which is 1000 x 1000 x 1000 bytes

What unit of measure is used to describe disk capacity?

64
New cards

Gbps, or 1,000,000,000 bits per second

The byte, which represents 8 bits

65
New cards

Terabyte, or 1000 GB

Newer hard disks and other large storage networks can be measured in what unit?

66
New cards

Tbps, or 1,000,000,000,000 bits per second

What throughput capacity is found in major telecommunications links between data centers, cities, and countries?

67
New cards

MHz, or 1 million cycles per second

Older bus interfaces and many types of network interfaces work at what signal speed?

68
New cards

Bits per second (bps)

When data is transferred between components in the computer or between computers over a network, the throughput rate is measured in what unit?

69
New cards

Mbps, or 1,000,000 bits per second

Wireless networks and residential Internet links typically have what throughput speed?

70
New cards

Disable the onboard graphics card

If you purchase and install a third-party graphics card into your workstation, what should you do to ensure its proper operation?

71
New cards

chkdsk E: /f

What command would you enter if you wanted to test the integrity of the E drive and repair any errors that are found?

72
New cards

ipconfig /renew

What command would you use if you wanted the computer to obtain an IP address from the network host?

73
New cards

You need to go to the Display options and select the option to extend the desktop across all displays

You just connected a monitor to your VGA port, but the monitor is showing the same thing that is on your laptop screen. What do you need to do in order to have different applications open on each display?

74
New cards

The refresh rate may be too low or too high

You notice that your monitor is flickering a lot. What is a likely explanation for this issue?

75
New cards

Computer reboots randomly, usually on startup

What is a symptom of a computer's power supply beginning to fail?

76
New cards

The Support section of the manufacturer's website

If you are experiencing a problem caused by an outdated driver, where should you look to update it?

77
New cards

Consider multiple approaches, prioritize each level, and divide and conquer

How should you approach troubleshooting when there are multiple levels of work?

78
New cards

Determine if anything has changed

You are advising a colleague about best practices when troubleshooting. You have suggested the following actions to help identify the problem: Gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following the troubleshooting model, what other piece of advice should you give?

79
New cards

The third step, in which you establish a theory of probable cause

In which step of the troubleshooting process do you question the obvious?

80
New cards

Trying to cause the issue to happen again so they can see it for themselves

If technicians are attempting to replicate a problem reported by a user, what are they doing?

81
New cards

Consider the possible outcomes of the fix action

What should you do before you put a plan into action?

82
New cards

Document findings/lessons learned, actions, and outcomes

What is the last step of the troubleshooting process?

83
New cards

To help you classify the problem in terms of nature and scope

Why is it important to ask a user questions when first hearing about a problem? –

84
New cards

You press the power button on a computer, but it does not start. What is the first thing that you should do when diagnosing this problem?

Check physical connections and power sources

85
New cards

ipconfig /release

What command would you use if you wanted a computer to drop its current IP address?

86
New cards

You might void your warranty if you tinker with the hardware

Why should you consult your hardware manufacturer's documentation prior to attempting a Do-It-Yourself fix?

87
New cards

Identify the problem by gathering information

What is the first step in the CompTIA troubleshooting model?

88
New cards

It emits a sequence of beeps that act as a code for the type of problem

If there are errors during the Power-On Self-Test (POST), how does the computer tell you what the problem is?

89
New cards

What is a symptom of an overheating computer?

The computer locks up, freezes, or shuts down

90
New cards

Document lessons learned and implement preventive measures

After resolving a problem for a user, what can you do to help avoid similar problems in the future?

91
New cards

The hard drive is physically damaged

What are grinding noises coming from the system most likely a warning sign of?

92
New cards

Determine the next steps to resolve the problem

Once a theory is confirmed, meaning that you have found the root cause of a problem, what should you do next?

93
New cards

The device has been disabled

You cannot access the wireless network. In Device Manager, you see a small red X near the network adapter. What does this indicate?

94
New cards

Set the BIOS boot sequence to check the optical drive before the hard disk drive

What would you need to do if you wanted a computer to always look for a bootable CD before looking to the local hard drive?

95
New cards

Address each issue individually

What should you do when you suspect that there are multiple issues to troubleshoot?

96
New cards

The system BIOS

After performing the standard troubleshooting steps, your built-in Ethernet port still isn't functioning. Which option should you check before escalating the problem?

97
New cards

Ask “What has changed?” because the thing that has changed is usually responsible for the problem

What is the most important question to ask a user when trying to determine what a problem is, and why?

98
New cards

Establish a new theory or escalate

During the troubleshooting process, what should you do if implement a solution but find that it didn't solve the problem as anticipated?

99
New cards

Press Ctrl+Alt+Del, start the Task Manager, and end the task from the Applications tab.

While you are performing troubleshooting, a program is not responding and will not close when the exit button is clicked. How can you end the frozen program without losing your other work?

100
New cards

Give you the status of the computer, including any error messages or unusual conditions

When you start a troubleshooting discussion with a user, what should you have them do?