1/101
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
American Standard Code for Information Interchange (ASCII)
What is the most common character set used for coding to represent text in computers?
ASCII and Unicode
What are the two common ways of presenting character set data?
Hexadecimal
Which notation system presents the largest numbers using the fewest digits?
1010
Convert the decimal number 10 into binary notation
A single digit in a range from 0 to 1 is used. This number represents an on or off state. Each column is worth two times the column to its right. This is also known as base
How is binary notation expressed?
48
What is the decimal number 75 in hexadecimal notation?
Decimal Notation
What type of notation is used in common math?
To express large numbers
When should you use hexadecimal notation?
A character set maps letters, numbers, and symbols to binary values.
How do computers differentiate binary data and map it to letters, numbers, and symbols?
Each single digit is assigned one of ten values ranging from 0-9 whereby each column is ten times more than the digit to its right. This is also known as base 10.
How is decimal notation expressed?
UTF-8
Websites tend to use what Unicode standard?
You cannot perform mathematical operations on it.
What limitation is placed on a number when it is entered as a character data type?
A single byte
How much storage space is consumed by the character data type?
Between 4 and 8 bytes
How much storage space is consumed by the floating point number data type?
Whole numbers that are in base 10, such as 5, 21, or 65536
How are integers represented?
The data type determines what sort of operations can be performed.
Why is it important to understand the different data types that a computer program can use?
String
The value “CompTIA” is a representation of which data type?
Boolean Values
What special numeric data type indicates that something is either TRUE or FALSE?
There is no limitation to the amount of storage used by a string.
How is the amount of storage that can be used by a string limited?
Floating point numbers or just “float”
What fundamental data type is used to support decimal fractions such as 4.1, 26.4, and 5.62?
Boolean
Which of the following data types can NOT store the number 3?
“John said \’Hello World\’ then left again.”
Which of the following is the correct syntax of using an escape character to include a quote character in a string definition?
Between 1 and 8 bytes
How much storage space is consumed by the integer data type?
A single bit
How much storage space is consumed by the Boolean data type?
Through the use of peripheral devices, such as mice and keyboards
How does a computer receive data entered by a user?
Data running on system memory is only preserved while the computer is powered up.
Why do computers save or write data to a storage device?
Information shared in an IT system using nothing more complicated than the binary digits 1 and 0
How is computer data defined?
Data is shown or displayed to the user through an output device
How does a user receive information from a computer?
Software refers to a collection of data or computer instructions that tell the computer how to work. Hardware is the set of physical components that make up the system and perform the work
What is the difference between hardware and software?
To enter information as input or deliver to the user as output
What is the most common use for peripheral devices in a computer?
The parts of the computer that reside within the monitor
What are peripheral devices?
The computer is using the CPU to act on instructions from the operating system and application software
When a computer writes data to memory and manipulates that data, the computer is said to be doing what?
Hardware, software, and the computer user
What three elements are required for a computer to perform useful tasks?
All types of computer
What systems use a Central Processing Unit (CPU) and memory?
A security breach that occurs when an individual’s or organization’s data is illegally copied with or without their knowledge
What is a data exfiltration?
It allows a human to analyze and interpret the information
Why is meaningful reporting an important factor of data-driven business decisions?
The process of analyzing the whole data set and finding connections and links between data points
What is data correlation?
Intellectual property can be protected through trademarks, copyrights, and patents
How is intellectual property protected?
Capture data, correlate the data, and convert it into meaningful reports
What activities must one perform to make data-driven business decisions?
A video download
What is an example of a digital product?
The traditional relational data model has a popular and ready-made query language, SQL
Which of the following is a disadvantage of a semi-structured data warehouse for storing information?
It is a legal protection granted to certain types of work that gives its holder the right to control the use of the work, including rights of publication, distribution, or sale
What is a copyright used for?
A trademark protects a unique element such as a company name or logo
What is used to protect a name or logo?
When it is applied to some purpose and adds timely value for the recipient
When does data become information?
Return on Security Investment; to calculate ROSI, you perform risk assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur when an attacker removes data from your network without authorization
In Information Technology (IT) terminology, what is ROSI and how do you calculate it?
When your network exposes private data publicly, whether or not the data is actively stolen
What is a data breach?
Set-up of a data capture and collection system
What is the first step needed to begin a data-driven business decision?
You can patent it
How do you protect an idea or invention without actually creating an example of it?
Digital Rights Management (DRM) systems
What invention was created to try to enforce copyright protection on digital products?
Digital sales through peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules
Which of these is NOT a positive trait of a digital product in regard to the value assigned to information and data?
A trademark
hat is used in lieu of a copyright to protect a name or logo?
Data can be considered an asset and as such it has commercial value
Which of the following statements about the protection of data is true?
Patent infringement
What do you call an action through which someone uses, makes, sells, or imports your invention without your permission?
Audits and inventories
Which of these is NOT an example of security controls?
The effectiveness of defense methods is decreasing
Which is NOT a reason cybersecurity is important?
Petabyte, or 1000 TB
What unit is used to measure large storage network and cloud systems?
The Megabyte (MB), which is 1000 x 1000 bytes
Medium to large files are measured in what unit?
The binary digit or bit, which can represent two values (0 or 1)
What is the basic unit of computer data?
Kilobyte (KB), or 1000 bytes
Small files are often measured in what unit?
Kbps, or 1000 bits per second
Older computer peripheral interfaces and slow network links are measured in what type of throughput unit?
Gigahertz (GHz) or 1000 million cycles per second
Modern Central Processing Units (CPUs) and bus types plus fiber optic network equipment work at what signal speed?
Gbps, or 1,000,000,000 bits per second
The latest PC bus standards and networks can support what higher level of throughput speed?
The Gigabyte (GB), which is 1000 x 1000 x 1000 bytes
What unit of measure is used to describe disk capacity?
Gbps, or 1,000,000,000 bits per second
The byte, which represents 8 bits
Terabyte, or 1000 GB
Newer hard disks and other large storage networks can be measured in what unit?
Tbps, or 1,000,000,000,000 bits per second
What throughput capacity is found in major telecommunications links between data centers, cities, and countries?
MHz, or 1 million cycles per second
Older bus interfaces and many types of network interfaces work at what signal speed?
Bits per second (bps)
When data is transferred between components in the computer or between computers over a network, the throughput rate is measured in what unit?
Mbps, or 1,000,000 bits per second
Wireless networks and residential Internet links typically have what throughput speed?
Disable the onboard graphics card
If you purchase and install a third-party graphics card into your workstation, what should you do to ensure its proper operation?
chkdsk E: /f
What command would you enter if you wanted to test the integrity of the E drive and repair any errors that are found?
ipconfig /renew
What command would you use if you wanted the computer to obtain an IP address from the network host?
You need to go to the Display options and select the option to extend the desktop across all displays
You just connected a monitor to your VGA port, but the monitor is showing the same thing that is on your laptop screen. What do you need to do in order to have different applications open on each display?
The refresh rate may be too low or too high
You notice that your monitor is flickering a lot. What is a likely explanation for this issue?
Computer reboots randomly, usually on startup
What is a symptom of a computer's power supply beginning to fail?
The Support section of the manufacturer's website
If you are experiencing a problem caused by an outdated driver, where should you look to update it?
Consider multiple approaches, prioritize each level, and divide and conquer
How should you approach troubleshooting when there are multiple levels of work?
Determine if anything has changed
You are advising a colleague about best practices when troubleshooting. You have suggested the following actions to help identify the problem: Gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following the troubleshooting model, what other piece of advice should you give?
The third step, in which you establish a theory of probable cause
In which step of the troubleshooting process do you question the obvious?
Trying to cause the issue to happen again so they can see it for themselves
If technicians are attempting to replicate a problem reported by a user, what are they doing?
Consider the possible outcomes of the fix action
What should you do before you put a plan into action?
Document findings/lessons learned, actions, and outcomes
What is the last step of the troubleshooting process?
To help you classify the problem in terms of nature and scope
Why is it important to ask a user questions when first hearing about a problem? –
You press the power button on a computer, but it does not start. What is the first thing that you should do when diagnosing this problem?
Check physical connections and power sources
ipconfig /release
What command would you use if you wanted a computer to drop its current IP address?
You might void your warranty if you tinker with the hardware
Why should you consult your hardware manufacturer's documentation prior to attempting a Do-It-Yourself fix?
Identify the problem by gathering information
What is the first step in the CompTIA troubleshooting model?
It emits a sequence of beeps that act as a code for the type of problem
If there are errors during the Power-On Self-Test (POST), how does the computer tell you what the problem is?
What is a symptom of an overheating computer?
The computer locks up, freezes, or shuts down
Document lessons learned and implement preventive measures
After resolving a problem for a user, what can you do to help avoid similar problems in the future?
The hard drive is physically damaged
What are grinding noises coming from the system most likely a warning sign of?
Determine the next steps to resolve the problem
Once a theory is confirmed, meaning that you have found the root cause of a problem, what should you do next?
The device has been disabled
You cannot access the wireless network. In Device Manager, you see a small red X near the network adapter. What does this indicate?
Set the BIOS boot sequence to check the optical drive before the hard disk drive
What would you need to do if you wanted a computer to always look for a bootable CD before looking to the local hard drive?
Address each issue individually
What should you do when you suspect that there are multiple issues to troubleshoot?
The system BIOS
After performing the standard troubleshooting steps, your built-in Ethernet port still isn't functioning. Which option should you check before escalating the problem?
Ask “What has changed?” because the thing that has changed is usually responsible for the problem
What is the most important question to ask a user when trying to determine what a problem is, and why?
Establish a new theory or escalate
During the troubleshooting process, what should you do if implement a solution but find that it didn't solve the problem as anticipated?
Press Ctrl+Alt+Del, start the Task Manager, and end the task from the Applications tab.
While you are performing troubleshooting, a program is not responding and will not close when the exit button is clicked. How can you end the frozen program without losing your other work?
Give you the status of the computer, including any error messages or unusual conditions
When you start a troubleshooting discussion with a user, what should you have them do?