Looks like no one added any tags here yet for you.
The box where you can type an Internet address is called a(n)_____.
address bar
The acronym for HTML stands for _____.
hypetText Markup Language
_________ is referred to as the physical, tangible components of a computer.
hardware
The acronym CPU stands for ______
central Processing Unit
A collection of stored electronic data, such as, pictures, videos, and music is known as a(n)______ ?
file
The largest network used as a communication tool worldwide is ____.
internet
What is the fourth layer of the OSI model?
transport
What does the "s" in "https" stand for?
security
Windows uses the file extension to associate which application to use when opening and managing a file, which is known as file association.
true
Software that controls the computer are called_____.
operating System
Without manually deleting files, what is the easiest way to remove temporary files fro your system?
disk Cleanup
Which utility program can be used to check a drive for errors and recover data?
chkdsk
The utility used to resize partitions of a hard-drive in the Windows OS is_____.
disk Management
When dealing with an unhappy customer, you should always_____.
listen and acknowledge the problem
When should a problem be escalated?
when you lack access to more extensive resources
Troubleshooting a problem should always begin with_____
interviewing the user
Who is the manufacture of Windows operating systems?
microsoft
A sequence of instructions that a computer can interpret and execute is a(n)____.
program
A compliation of similar web pages is known as______.
website
The acronym Kbps stands for______.
kilobites per second
The OSI model contains multiple layers. What is the name of the name of the first layer?
physical
Virtualization allows for better use of already existing hardware
true
How many blocks of hexadecimal numbers are contained in an IPv6 address?
8
The address 192.162.30.100 belongs in what class?
class C
What is the name of the ethernet port that connects devices to a wire network?
RJ-45
What is the name of the boot that a user completes when they restart a computer?
soft boot
What is another name for memory that is NOT lost when a computer power is cycled?
non- volatile
Devices that accept and store data in memory are called_____
input data
When data moves from the desk memory, the rate at which it moves is known as_____.
transfer Rate
The process of finding and eliminating bugs and errors in a program is called_____.
debugging
Which account is disabled by default and should remain disabled?
guest account
Magnetic hard drive data CANNOT be destroyed?
false
What protocol secures HTTP transmissions for Web server traffic?
SSL
Parent folders pass along what type of permissions?
inherited
Which setting disables all wireless devices on an iOS and Android phone?
airplane mode
Worldwide mobile phones and tablets contain a unique number known as a_____
IMEI
Tethering allows your computer to utilize your cellular network connection to access the internet.
true
What is another name for a virtualized client that lacks an operating system?
zero Client
Computer applications are uniquely identified by a(n)_____.
port number
Unwanted traffic and internet access restrictions of local computers can be blocked through this function of your small office/ home office router.
firewall
What server finds an IP address for a computer when the domain name is known?
DNS
What is the faster clock speed of the CPU______
the more heat the processor generates
Resources that are owned by a third-party and leased to users on a usage basis is known as what type of resource?
public
A device that connects two networks and determines the best way for data packets to move forward to their destinations is called a_____.
router
The_____ is responsible for implementing, modifying and debugging the software necessary to make the hardware work.
systems programmer
A malicious, security- breaking program that is disguised as a useful or legit program, but is actually intended to cause damage.
trojan horse
_____ is a malicious program that reproduces and spreads without human interaction.
worm
An advantage of fiber optic is that it is____
small, light, and fast
How is data transmitted through fiber optic media?
light
How do organizations use authentication technologies?
A. Confirm the identity of a user requesting access to information or assets.