Information Technology Concepts BPA test

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

The box where you can type an Internet address is called a(n)_____.

address bar

2
New cards

The acronym for HTML stands for _____.

Hyper Text Markup Language

3
New cards

_________ is referred to as the physical, tangible components of a computer.

hardware

4
New cards

The acronym CPU stands for ______

central Processing Unit

5
New cards

A collection of stored electronic data, such as, pictures, videos, and music is known as a(n)______ ?

file

6
New cards

The largest network used as a communication tool worldwide is ____.

internet

7
New cards

What is the fourth layer of the OSI model?

transport

8
New cards

What does the "s" in "https" stand for?

security

9
New cards

Windows uses the file extension to associate which application to use when opening and managing a file, which is known as file association.

true

10
New cards

Software that controls the computer are called_____.

operating System

11
New cards

Without manually deleting files, what is the easiest way to remove temporary files fro your system?

disk Cleanup

12
New cards

Which utility program can be used to check a drive for errors and recover data?

chkdsk

13
New cards

The utility used to resize partitions of a hard-drive in the Windows OS is_____.

disk Management

14
New cards

When dealing with an unhappy customer, you should always_____.

listen and acknowledge the problem

15
New cards

When should a problem be escalated?

when you lack access to more extensive resources

16
New cards

Troubleshooting a problem should always begin with_____

interviewing the user

17
New cards

Who is the manufacture of Windows operating systems?

microsoft

18
New cards

A sequence of instructions that a computer can interpret and execute is a(n)____.

program

19
New cards

A compliation of similar web pages is known as______.

website

20
New cards

The acronym Kbps stands for______.

kilobites per second

21
New cards

The OSI model contains multiple layers. What is the name of the name of the first layer?

physical

22
New cards

Virtualization allows for better use of already existing hardware

true

23
New cards

How many blocks of hexadecimal numbers are contained in an IPv6 address?

8

24
New cards

The address 192.162.30.100 belongs in what class?

class C

25
New cards

What is the name of the ethernet port that connects devices to a wire network?

RJ-45

26
New cards

What is the name of the boot that a user completes when they restart a computer?

soft boot

27
New cards

What is another name for memory that is NOT lost when a computer power is cycled?

non- volatile

28
New cards

Devices that accept and store data in memory are called_____

input data

29
New cards

When data moves from the desk memory, the rate at which it moves is known as_____.

transfer Rate

30
New cards

The process of finding and eliminating bugs and errors in a program is called_____.

debugging

31
New cards

Which account is disabled by default and should remain disabled?

guest account

32
New cards

Magnetic hard drive data CANNOT be destroyed?

false

33
New cards

What protocol secures HTTP transmissions for Web server traffic?

SSL

34
New cards

Parent folders pass along what type of permissions?

inherited

35
New cards

Which setting disables all wireless devices on an iOS and Android phone?

airplane mode

36
New cards

Worldwide mobile phones and tablets contain a unique number known as a_____

IMEI

37
New cards

Tethering allows your computer to utilize your cellular network connection to access the internet.

true

38
New cards

What is another name for a virtualized client that lacks an operating system?

zero Client

39
New cards

Computer applications are uniquely identified by a(n)_____.

port number

40
New cards

Unwanted traffic and internet access restrictions of local computers can be blocked through this function of your small office/ home office router.

firewall

41
New cards

What server finds an IP address for a computer when the domain name is known?

DNS

42
New cards

What is the faster clock speed of the CPU______

the more heat the processor generates

43
New cards

Resources that are owned by a third-party and leased to users on a usage basis is known as what type of resource?

public

44
New cards

A device that connects two networks and determines the best way for data packets to move forward to their destinations is called a_____.

router

45
New cards

The_____ is responsible for implementing, modifying and debugging the software necessary to make the hardware work.

systems programmer

46
New cards

A malicious, security- breaking program that is disguised as a useful or legit program, but is actually intended to cause damage.

trojan horse

47
New cards

_____ is a malicious program that reproduces and spreads without human interaction.

worm

48
New cards

An advantage of fiber optic is that it is____

small, light, and fast

49
New cards

How is data transmitted through fiber optic media?

light

50
New cards

How do organizations use authentication technologies?

A. Confirm the identity of a user requesting access to information or assets.