Computer Science and Networking Concepts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/150

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key terms and concepts from computer science and networking, including malware types, password practices, cloud services, and network technologies.

Last updated 1:11 AM on 4/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

151 Terms

1
New cards

Disadvantage of Compiled Programs

They need to be rewritten and recompiled for different platforms.

2
New cards

Type of Malware Responsible for Slow Performance

Virus

3
New cards

Good Practice When Creating a Password

Include uppercase letters, lowercase letters, numbers, and symbols.

4
New cards

Technology for Wireless Signaling to Projector or TV

Casting

5
New cards

Function of NOT NULL Constraint

Ensures a field must have a value.

6
New cards

Best Cloud Service Model for Businesses

Software as a Service (SaaS).

7
New cards

Action to Permanently Delete Files in Recycle Bin

Click Empty Recycle Bin.

8
New cards

Description of Smart Lights

They allow you to set a lighting schedule and power them on and off when you are away from home.

9
New cards

IEEE Standards for Wireless Communications

802.11

10
New cards

Meaning of AR

Augmented Reality.

11
New cards

Result of XOR Operation if Both Conditions are True

False.

12
New cards

Type of Database Accessible Over the Internet

Online database.

13
New cards

Importance of Keeping Browser Updated

To get the latest security patches and features.

14
New cards

CPU Socket Mechanism Preventing Motherboard Damage

Zero Insertion Force (ZIF).

15
New cards

Caution When Using Browser Extensions

Hackers could trick you into spoofed websites.

16
New cards

Purpose of Adding Comments to Code

To explain what each part of the code does.

17
New cards

Advantage of Starting at One End of the System

It ensures a systematic and thorough check of all components.

18
New cards

Importance of Backing Up Personal Data Files

They are difficult or impossible to recreate.

19
New cards

Type of Document Database

A type of non-relational database.

20
New cards

Feature Ensuring Authorized Data Access

Security.

21
New cards

Port Number for Hypertext Transfer Protocol (HTTP)

80.

22
New cards

Example of "Something You Have"

Hardware token.

23
New cards

Two Interpreted Languages

JavaScript and Ruby.

24
New cards

First Step After Fixing a Problem

Test the results of your fix.

25
New cards

Definition of Bandwidth in Networking

The highest amount of data a network can handle at once.

26
New cards

Importance of Knowing Hardware Make and Model

To find the correct driver.

27
New cards

Group of Computer Systems Sharing Information

A network.

28
New cards

What to Do After Deleting an App on macOS

Drag the app back from the trash can to the Applications folder.

29
New cards

What to Do with Unexpected Email Attachment

Verify the sender before opening the attachment.

30
New cards

Built-in Backup Tool for Apple's OS

Time Machine.

31
New cards

Meaning of Hot-Swappable for USB Devices

You can add or remove them while the system is running.

32
New cards

What to Include in Documentation

Every step you took, including unsuccessful attempts.

33
New cards

Potential Risk of Using Remote Assistance Software

It can be used by threat actors to trick people.

34
New cards

Definition of End User License Agreement (EULA)

A contract governing the installation and use of software.

35
New cards

Base of Hexadecimal Numbering System

16.

36
New cards

Definition of Data Center

A dedicated location that holds thousands of servers.

37
New cards

Role of Firewall in a LAN

To block unauthorized access.

38
New cards

Purpose of Video Memory in a GPU

To process picture information quickly.

39
New cards

Easiest Way to Add Wi-Fi to Desktop Computer

Use a USB wireless adapter.

40
New cards

Software Managing Hardware and User Interaction

Operating System (OS).

41
New cards

Higher Resolution in Video Output Means

More pixels and better image details.

42
New cards

Primary Benefit of Offsite Data Storage

It prevents data loss if something happens at the main location.

43
New cards

Network Attached Storage (NAS)

A storage device connected to a local area network.

44
New cards

Conditional Flow Making Decisions in a Program

If-then-else statements.

45
New cards

Definition of Container in Programming

A set of values held by an identifier.

46
New cards

Term for Address Used to Access Websites on the Internet

URL.

47
New cards

Main Difference Between Managed and Unmanaged Switches

Managed switches can be configured, unmanaged switches cannot.

48
New cards

Definition of Integer in Programming

A whole number, either positive or negative, without a decimal or fraction.

49
New cards

Role of "Respond" Function in NIST Cybersecurity Framework

Monitoring to ensure controls are effective.

50
New cards

Spreadsheet Software Known for Powerful Macro Language

Microsoft Excel.

51
New cards

Definition of Pre-Shared Key

A password used to access a wireless network.

52
New cards

Tab in Task Manager Showing Resources Used by Open Applications

Processes.

53
New cards

Best Computer Type for Taking Notes While Moving Around

A tablet or smartphone or possibly a hybrid laptop/tablet.

54
New cards

System Allowing User to Authenticate Once for Multiple Services

Single Sign-On (SSO).

55
New cards

Term for Unique Numbers Assigned to Different Types of Network Traffic

Network Ports.

56
New cards

Features Helping Software Collaboration

Instant Messaging and Video Conferencing.

57
New cards

Availability in the CIA Triad Ensures

Information is readily available to authorized users.

58
New cards

Free Presentation Software for Mac Computers

Keynote.

59
New cards

Tab in Task Manager Displaying Network Usage

Performance.

60
New cards

How Computers Use Binary to Represent Information

By using combinations of only two values: 0 and 1.

61
New cards

Action if Theory About Problem is Confirmed

Make a plan of action.

62
New cards

Definition of Certificate Authority (CA)

A company that issues security certificates to websites.

63
New cards

Type of Language Adding Tags to Text

Markup language.

64
New cards

How SANs Connect for Fast Data Transfer

Using fiber cables.

65
New cards

Definition of Primary Key in Database

A unique identifier for each record.

66
New cards

Value Stored in Boolean Variable

True or False.

67
New cards

Use of "Ping" Test

Measuring latency.

68
New cards

How File System Tracks Permissions

By using an Access Control List (ACL).

69
New cards

Action if Fix is Delayed Due to Ordering Parts

Document up to the point of ordering parts.

70
New cards

Hexadecimal Digit Representing Decimal Number 15

F.

71
New cards

Free, Open-source Presentation Software

LibreOffice Impress.

72
New cards

Main Difference Between Internet and World Wide Web (WWW)

The Internet is a huge network of computers, while the WWW is a collection of interconnected files that use the Internet to share content.

73
New cards

Definition of Flat File System

A type of database.

74
New cards

Definition of MAN

A network that covers a city.

75
New cards

How Virtualization Stops Viruses

By isolating the malware within a guest operating system, preventing it from infecting the host computer or network.

76
New cards

Why do CPUs need cooling systems?

answer

They process billions of instructions every second

77
New cards

Why is it difficult to increase CPU speeds beyond current levels?

It generates too much heat.

78
New cards

Which motherboard connection is commonly used with M.2 SSDs?

PCIe

79
New cards

Why is it important to change default usernames and passwords on devices?

Because they are the same for many devices of the same model

80
New cards

Why should you make only one change at a time when implementing a solution?


To see what happens with each change

81
New cards

What is debugging?

Fixing mistakes in code

82
New cards

What is a Storage Area Network (SAN)?

A separate subnetwork consisting of storage devices and servers

83
New cards

What should you do if you hear about a data breach at a company where you have an account?

Change your password immediately

84
New cards

What happens when you drag unwanted applications to the Trash on an Apple computer?

The applications are moved to the Trash and can be recovered if needed.

85
New cards

What is attenuation in the context of Wi-Fi signals?

The loss of signal strength as you move away from the router

86
New cards

How does a SaaS version of email work?

It stores emails on the hosting company's servers and you access them via a web browser

87
New cards





What is a function call in programming?

A command to run another part of the program and return

88
New cards



What is the main advantage of a dedicated graphics card over integrated graphics?

It provides more powerful graphics processing

89
New cards

Which numbering system is used to represent file permissions in Linux?

Octal

90
New cards

Why is it important to keep the operating system and application software current on patches?


To improve security and functionality

91
New cards

What is a downside to using VR headsets?

They cause motion sickness.

92
New cards



Which is a popular web-based tool for creating charts?

Lucidchart

93
New cards

Why are compiled languages often used for resource-intensive programs like high-end video games?

Because they run quickly and efficiently

94
New cards

What is the maximum number a single byte can hold?

255

95
New cards

Which of the following is an example of a floating-point number?

8.02

A floating-point number is any number with a decimal point (like 8.02)

96
New cards

What is a foreign key?

A primary key from another table

97
New cards

What might you need to do if Windows Update does not find a driver for your hardware?

Obtain the driver from the device manufacturer

98
New cards

What are the two main types of printers?

answer

Laser and Inkjet

99
New cards

What is a VLAN?

A logical network segment within a larger network

100
New cards



How is cable Internet different from other internet connections?

It shares the connection with other users in the neighborhood.