kahoot games Study Notes on IT Concepts
Wi-Fi Standard
Definition: The Wi-Fi standard refers to the protocols set forth by IEEE (Institute of Electrical and Electronics Engineers) under the 802.11 family.
Frequency Bands:
Common frequency bands include:
2.4 GHz: Older and more widely utilized; covers a larger area but slower speeds.
5 GHz: Provides faster data rates with less range due to higher frequency interference.
Key Standard:
802.11 is the standard designation for Wi-Fi networking technologies.
Access Point: Refers to a device that allows Wi-Fi devices to connect to a wired network using Wi-Fi.
Backup Management
Post-Backup Actions: After a backup is complete, best practices include:
Delete the backup: Suggested option for managing storage, though not commonly recommended; usually storage is retained.
Verify the backup: Important to ensure data integrity.
Schedule the backup: Setting up regular backup intervals.
Duplicate the backup: To enhance data redundancy.
Mouse Types
Types of Mouse:
Mechanical Mouse: Uses a trackball or similar mechanism with moving parts.
Optical Mouse:
Utilizes a light source (LED) and a camera to detect movement.
No moving parts: Unlike mechanical mice, which rely on moving components.
Trackball Mouse: A stationary device where the user rotates a ball to control the pointer.
PS/2 Connector: Not a mouse type; it refers to a type of connector used for keyboards and mice.
Password Security
Single Word Passwords:
Issue: Not complex enough, and therefore easy to crack.
Best Practice: Use complex passwords combining characters, cases, and numbers.
RAM (Random Access Memory)
Definition: Also referred to as system memory, it is the temporary storage that helps in processing data.
Function: RAM is primarily short-term memory used to store active data and applications.
Social Engineering
Definition: A type of security threat where manipulation is used to trick individuals into providing confidential information.
Example: Receiving a phone call requesting personal passwords falls under social engineering.
Phishing vs. Social Engineering: Phishing typically involves email, whereas social engineering encompasses various methods of deceit.
Addressing Concepts
Physical Addresses (MAC Address):
Definition: A MAC (Media Access Control) address is a unique identifier for network interfaces.
Size: MAC addresses are 48 bits in size and represented in hexadecimal notation.
Hexadecimal Example: Combination of letters (0-F) and numbers (0-9); a MAC address may look like 00:1A:2B:3C:4D:5E.
User Access Levels
Definition: The lowest level of access to a user is typically referred to as:
Administrative Rights: Full access and control over settings and resources.
CIA Triad: Confidentiality, Integrity, Availability.
AAA: Authentication, Authorization, Accounting.
Airplane Mode
Function: Upon activating airplane mode, a device disables all wireless frequencies, including cellular and Wi-Fi to prevent interference during flights.
Binary Notation
Digits Used: Binary notation consists of two digits: 0 and 1.
Meaning of Digits:
0 represents OFF
1 represents ON
Collectively referred to as Binary Code.
File Extensions and Applications
.docx: Microsoft Word document format can be opened with Microsoft Word.
File Types Associated: Identifying file types is crucial for understanding compatible applications.
RAID (Redundant Array of Independent Disks)
RAID 5 Minimum Drives: To configure a RAID 5 array, a minimum of 3 drives is necessary for data redundancy and parity.
Ethernet Connectors
Standard Ethernet Cable Connector: Uses RJ-45 connectors, which are standard in networking environments.
RJ-11 Usage: Refers to connections for traditional telephony systems (POTS).
Input/Output Devices
Multifunction Printer: A device that serves as both an input and output unit, integrating functions of scanning (input) and printing (output).
Others: Scanners are only input devices, while monitors primarily serve as output devices unless specified as touch screen.
Internet Connectivity
Best Connection for Desktop: A wired Ethernet connection typically provides the most stable and reliable internet to a desktop computer.
Safest Mobile Connection: Cellular connections are often deemed safer than public Wi-Fi or hotspots during travel.
Storage Drive Speeds
HDD vs. SSD: Hard Disk Drives are generally slower than Solid State Drives, which utilize flash memory for increased speed.
Gyroscope Function
Smartphone Component: The gyroscope within mobile devices helps maintain screen orientation based on the position of the device.
CPU (Central Processing Unit)
Definition: Known as the brain of the computer, responsible for processing data and managing instructions.
Email/Instant Messaging Threats
Imitation Methods:
Various techniques can be used for malicious impersonation via email or messaging, with social engineering being a primary approach.
DDoS Attacks: Not performed via email; requires overwhelming servers through traffic, hence not a valid attack vector in this context.
Cloud Backup Safety Features
Off-Site Storage: A core feature of cloud backup that enhances data safety by maintaining copies at remote facilities to prevent data loss from local disasters.
Statically Assigned IP Addresses
Explanation: Confirmed that printers can have statically assigned IP addresses to ensure they don’t change across sessions.
AAA Process
Components:
Authentication: Verifying user identity.
Authorization: Granting access to resources.
Accounting: Monitoring and documenting user activities.
Open-Source Software
Definition: Software that is available for free modification and distribution by users.
Security Threats Explained
Spam: Refers to unwanted digital communication, sometimes relevant in cybersecurity discussions.
Display Settings
Adjusting Viewing Area: If visuals appear too large, users should modify screen resolution and DPI settings for optimal visualization.
Color Order in T568B
Wiring Standard: Recall the color coding of Ethernet cables in the T568B standard; details may not be on assessments but useful for practical applications.
UAC (User Account Control)
Definition: A Windows security feature aimed at preventing unauthorized changes to the operating system.
Executable Files (.exe)
Function: Running executable files initiates processes on the operating system, essential for launching applications.
Anti-Malware Software
Best Practice: It is advised against installing multiple anti-malware programs simultaneously as they may conflict with each other.
Security from Interception
Best Connection Type: Wired connections provide higher data protection from interception, while wireless connections can be more vulnerable.