Information Technology Concepts BPA test

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 49

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

50 Terms

1

The box where you can type an Internet address is called a(n)_____.

address bar

New cards
2

The acronym for HTML stands for _____.

hypetText Markup Language

New cards
3

_________ is referred to as the physical, tangible components of a computer.

hardware

New cards
4

The acronym CPU stands for ______

central Processing Unit

New cards
5

A collection of stored electronic data, such as, pictures, videos, and music is known as a(n)______ ?

file

New cards
6

The largest network used as a communication tool worldwide is ____.

internet

New cards
7

What is the fourth layer of the OSI model?

transport

New cards
8

What does the "s" in "https" stand for?

security

New cards
9

Windows uses the file extension to associate which application to use when opening and managing a file, which is known as file association.

true

New cards
10

Software that controls the computer are called_____.

operating System

New cards
11

Without manually deleting files, what is the easiest way to remove temporary files fro your system?

disk Cleanup

New cards
12

Which utility program can be used to check a drive for errors and recover data?

chkdsk

New cards
13

The utility used to resize partitions of a hard-drive in the Windows OS is_____.

disk Management

New cards
14

When dealing with an unhappy customer, you should always_____.

listen and acknowledge the problem

New cards
15

When should a problem be escalated?

when you lack access to more extensive resources

New cards
16

Troubleshooting a problem should always begin with_____

interviewing the user

New cards
17

Who is the manufacture of Windows operating systems?

microsoft

New cards
18

A sequence of instructions that a computer can interpret and execute is a(n)____.

program

New cards
19

A compliation of similar web pages is known as______.

website

New cards
20

The acronym Kbps stands for______.

kilobites per second

New cards
21

The OSI model contains multiple layers. What is the name of the name of the first layer?

physical

New cards
22

Virtualization allows for better use of already existing hardware

true

New cards
23

How many blocks of hexadecimal numbers are contained in an IPv6 address?

8

New cards
24

The address 192.162.30.100 belongs in what class?

class C

New cards
25

What is the name of the ethernet port that connects devices to a wire network?

RJ-45

New cards
26

What is the name of the boot that a user completes when they restart a computer?

soft boot

New cards
27

What is another name for memory that is NOT lost when a computer power is cycled?

non- volatile

New cards
28

Devices that accept and store data in memory are called_____

input data

New cards
29

When data moves from the desk memory, the rate at which it moves is known as_____.

transfer Rate

New cards
30

The process of finding and eliminating bugs and errors in a program is called_____.

debugging

New cards
31

Which account is disabled by default and should remain disabled?

guest account

New cards
32

Magnetic hard drive data CANNOT be destroyed?

false

New cards
33

What protocol secures HTTP transmissions for Web server traffic?

SSL

New cards
34

Parent folders pass along what type of permissions?

inherited

New cards
35

Which setting disables all wireless devices on an iOS and Android phone?

airplane mode

New cards
36

Worldwide mobile phones and tablets contain a unique number known as a_____

IMEI

New cards
37

Tethering allows your computer to utilize your cellular network connection to access the internet.

true

New cards
38

What is another name for a virtualized client that lacks an operating system?

zero Client

New cards
39

Computer applications are uniquely identified by a(n)_____.

port number

New cards
40

Unwanted traffic and internet access restrictions of local computers can be blocked through this function of your small office/ home office router.

firewall

New cards
41

What server finds an IP address for a computer when the domain name is known?

DNS

New cards
42

What is the faster clock speed of the CPU______

the more heat the processor generates

New cards
43

Resources that are owned by a third-party and leased to users on a usage basis is known as what type of resource?

public

New cards
44

A device that connects two networks and determines the best way for data packets to move forward to their destinations is called a_____.

router

New cards
45

The_____ is responsible for implementing, modifying and debugging the software necessary to make the hardware work.

systems programmer

New cards
46

A malicious, security- breaking program that is disguised as a useful or legit program, but is actually intended to cause damage.

trojan horse

New cards
47

_____ is a malicious program that reproduces and spreads without human interaction.

worm

New cards
48

An advantage of fiber optic is that it is____

small, light, and fast

New cards
49

How is data transmitted through fiber optic media?

light

New cards
50

How do organizations use authentication technologies?

A. Confirm the identity of a user requesting access to information or assets.

New cards
robot