1/150
This set of flashcards covers key terms and concepts from computer science and networking, including malware types, password practices, cloud services, and network technologies.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Disadvantage of Compiled Programs
They need to be rewritten and recompiled for different platforms.
Type of Malware Responsible for Slow Performance
Virus
Good Practice When Creating a Password
Include uppercase letters, lowercase letters, numbers, and symbols.
Technology for Wireless Signaling to Projector or TV
Casting
Function of NOT NULL Constraint
Ensures a field must have a value.
Best Cloud Service Model for Businesses
Software as a Service (SaaS).
Action to Permanently Delete Files in Recycle Bin
Click Empty Recycle Bin.
Description of Smart Lights
They allow you to set a lighting schedule and power them on and off when you are away from home.
IEEE Standards for Wireless Communications
802.11
Meaning of AR
Augmented Reality.
Result of XOR Operation if Both Conditions are True
False.
Type of Database Accessible Over the Internet
Online database.
Importance of Keeping Browser Updated
To get the latest security patches and features.
CPU Socket Mechanism Preventing Motherboard Damage
Zero Insertion Force (ZIF).
Caution When Using Browser Extensions
Hackers could trick you into spoofed websites.
Purpose of Adding Comments to Code
To explain what each part of the code does.
Advantage of Starting at One End of the System
It ensures a systematic and thorough check of all components.
Importance of Backing Up Personal Data Files
They are difficult or impossible to recreate.
Type of Document Database
A type of non-relational database.
Feature Ensuring Authorized Data Access
Security.
Port Number for Hypertext Transfer Protocol (HTTP)
80.
Example of "Something You Have"
Hardware token.
Two Interpreted Languages
JavaScript and Ruby.
First Step After Fixing a Problem
Test the results of your fix.
Definition of Bandwidth in Networking
The highest amount of data a network can handle at once.
Importance of Knowing Hardware Make and Model
To find the correct driver.
Group of Computer Systems Sharing Information
A network.
What to Do After Deleting an App on macOS
Drag the app back from the trash can to the Applications folder.
What to Do with Unexpected Email Attachment
Verify the sender before opening the attachment.
Built-in Backup Tool for Apple's OS
Time Machine.
Meaning of Hot-Swappable for USB Devices
You can add or remove them while the system is running.
What to Include in Documentation
Every step you took, including unsuccessful attempts.
Potential Risk of Using Remote Assistance Software
It can be used by threat actors to trick people.
Definition of End User License Agreement (EULA)
A contract governing the installation and use of software.
Base of Hexadecimal Numbering System
16.
Definition of Data Center
A dedicated location that holds thousands of servers.
Role of Firewall in a LAN
To block unauthorized access.
Purpose of Video Memory in a GPU
To process picture information quickly.
Easiest Way to Add Wi-Fi to Desktop Computer
Use a USB wireless adapter.
Software Managing Hardware and User Interaction
Operating System (OS).
Higher Resolution in Video Output Means
More pixels and better image details.
Primary Benefit of Offsite Data Storage
It prevents data loss if something happens at the main location.
Network Attached Storage (NAS)
A storage device connected to a local area network.
Conditional Flow Making Decisions in a Program
If-then-else statements.
Definition of Container in Programming
A set of values held by an identifier.
Term for Address Used to Access Websites on the Internet
URL.
Main Difference Between Managed and Unmanaged Switches
Managed switches can be configured, unmanaged switches cannot.
Definition of Integer in Programming
A whole number, either positive or negative, without a decimal or fraction.
Role of "Respond" Function in NIST Cybersecurity Framework
Monitoring to ensure controls are effective.
Spreadsheet Software Known for Powerful Macro Language
Microsoft Excel.
Definition of Pre-Shared Key
A password used to access a wireless network.
Tab in Task Manager Showing Resources Used by Open Applications
Processes.
Best Computer Type for Taking Notes While Moving Around
A tablet or smartphone or possibly a hybrid laptop/tablet.
System Allowing User to Authenticate Once for Multiple Services
Single Sign-On (SSO).
Term for Unique Numbers Assigned to Different Types of Network Traffic
Network Ports.
Features Helping Software Collaboration
Instant Messaging and Video Conferencing.
Availability in the CIA Triad Ensures
Information is readily available to authorized users.
Free Presentation Software for Mac Computers
Keynote.
Tab in Task Manager Displaying Network Usage
Performance.
How Computers Use Binary to Represent Information
By using combinations of only two values: 0 and 1.
Action if Theory About Problem is Confirmed
Make a plan of action.
Definition of Certificate Authority (CA)
A company that issues security certificates to websites.
Type of Language Adding Tags to Text
Markup language.
How SANs Connect for Fast Data Transfer
Using fiber cables.
Definition of Primary Key in Database
A unique identifier for each record.
Value Stored in Boolean Variable
True or False.
Use of "Ping" Test
Measuring latency.
How File System Tracks Permissions
By using an Access Control List (ACL).
Action if Fix is Delayed Due to Ordering Parts
Document up to the point of ordering parts.
Hexadecimal Digit Representing Decimal Number 15
F.
Free, Open-source Presentation Software
LibreOffice Impress.
Main Difference Between Internet and World Wide Web (WWW)
The Internet is a huge network of computers, while the WWW is a collection of interconnected files that use the Internet to share content.
Definition of Flat File System
A type of database.
Definition of MAN
A network that covers a city.
How Virtualization Stops Viruses
By isolating the malware within a guest operating system, preventing it from infecting the host computer or network.
Why do CPUs need cooling systems?
answer
They process billions of instructions every second
Why is it difficult to increase CPU speeds beyond current levels?
It generates too much heat.
Which motherboard connection is commonly used with M.2 SSDs?
PCIe
Why is it important to change default usernames and passwords on devices?
Because they are the same for many devices of the same model
Why should you make only one change at a time when implementing a solution?
To see what happens with each change
What is debugging?
Fixing mistakes in code
What is a Storage Area Network (SAN)?
A separate subnetwork consisting of storage devices and servers
What should you do if you hear about a data breach at a company where you have an account?
Change your password immediately
What happens when you drag unwanted applications to the Trash on an Apple computer?
The applications are moved to the Trash and can be recovered if needed.
What is attenuation in the context of Wi-Fi signals?
The loss of signal strength as you move away from the router
How does a SaaS version of email work?
It stores emails on the hosting company's servers and you access them via a web browser
What is a function call in programming?
A command to run another part of the program and return
What is the main advantage of a dedicated graphics card over integrated graphics?
It provides more powerful graphics processing
Which numbering system is used to represent file permissions in Linux?
Octal
Why is it important to keep the operating system and application software current on patches?
To improve security and functionality
What is a downside to using VR headsets?
They cause motion sickness.
Which is a popular web-based tool for creating charts?
Lucidchart
Why are compiled languages often used for resource-intensive programs like high-end video games?
Because they run quickly and efficiently
What is the maximum number a single byte can hold?
255
Which of the following is an example of a floating-point number?
8.02
A floating-point number is any number with a decimal point (like 8.02)
What is a foreign key?
A primary key from another table
What might you need to do if Windows Update does not find a driver for your hardware?
Obtain the driver from the device manufacturer
What are the two main types of printers?
answer
Laser and Inkjet
What is a VLAN?
A logical network segment within a larger network
How is cable Internet different from other internet connections?
It shares the connection with other users in the neighborhood.