kahoot games Study Notes on IT Concepts

Wi-Fi Standard

  • Definition: The Wi-Fi standard refers to the protocols set forth by IEEE (Institute of Electrical and Electronics Engineers) under the 802.11 family.

  • Frequency Bands:

    • Common frequency bands include:

    • 2.4 GHz: Older and more widely utilized; covers a larger area but slower speeds.

    • 5 GHz: Provides faster data rates with less range due to higher frequency interference.

  • Key Standard:

    • 802.11 is the standard designation for Wi-Fi networking technologies.

  • Access Point: Refers to a device that allows Wi-Fi devices to connect to a wired network using Wi-Fi.

Backup Management

  • Post-Backup Actions: After a backup is complete, best practices include:

    • Delete the backup: Suggested option for managing storage, though not commonly recommended; usually storage is retained.

    • Verify the backup: Important to ensure data integrity.

    • Schedule the backup: Setting up regular backup intervals.

    • Duplicate the backup: To enhance data redundancy.

Mouse Types

  • Types of Mouse:

    • Mechanical Mouse: Uses a trackball or similar mechanism with moving parts.

    • Optical Mouse:

    • Utilizes a light source (LED) and a camera to detect movement.

    • No moving parts: Unlike mechanical mice, which rely on moving components.

    • Trackball Mouse: A stationary device where the user rotates a ball to control the pointer.

    • PS/2 Connector: Not a mouse type; it refers to a type of connector used for keyboards and mice.

Password Security

  • Single Word Passwords:

    • Issue: Not complex enough, and therefore easy to crack.

    • Best Practice: Use complex passwords combining characters, cases, and numbers.

RAM (Random Access Memory)

  • Definition: Also referred to as system memory, it is the temporary storage that helps in processing data.

  • Function: RAM is primarily short-term memory used to store active data and applications.

Social Engineering

  • Definition: A type of security threat where manipulation is used to trick individuals into providing confidential information.

  • Example: Receiving a phone call requesting personal passwords falls under social engineering.

  • Phishing vs. Social Engineering: Phishing typically involves email, whereas social engineering encompasses various methods of deceit.

Addressing Concepts

  • Physical Addresses (MAC Address):

    • Definition: A MAC (Media Access Control) address is a unique identifier for network interfaces.

    • Size: MAC addresses are 48 bits in size and represented in hexadecimal notation.

    • Hexadecimal Example: Combination of letters (0-F) and numbers (0-9); a MAC address may look like 00:1A:2B:3C:4D:5E.

User Access Levels

  • Definition: The lowest level of access to a user is typically referred to as:

    • Administrative Rights: Full access and control over settings and resources.

    • CIA Triad: Confidentiality, Integrity, Availability.

    • AAA: Authentication, Authorization, Accounting.

Airplane Mode

  • Function: Upon activating airplane mode, a device disables all wireless frequencies, including cellular and Wi-Fi to prevent interference during flights.

Binary Notation

  • Digits Used: Binary notation consists of two digits: 0 and 1.

  • Meaning of Digits:

    • 0 represents OFF

    • 1 represents ON

    • Collectively referred to as Binary Code.

File Extensions and Applications

  • .docx: Microsoft Word document format can be opened with Microsoft Word.

  • File Types Associated: Identifying file types is crucial for understanding compatible applications.

RAID (Redundant Array of Independent Disks)

  • RAID 5 Minimum Drives: To configure a RAID 5 array, a minimum of 3 drives is necessary for data redundancy and parity.

Ethernet Connectors

  • Standard Ethernet Cable Connector: Uses RJ-45 connectors, which are standard in networking environments.

  • RJ-11 Usage: Refers to connections for traditional telephony systems (POTS).

Input/Output Devices

  • Multifunction Printer: A device that serves as both an input and output unit, integrating functions of scanning (input) and printing (output).

  • Others: Scanners are only input devices, while monitors primarily serve as output devices unless specified as touch screen.

Internet Connectivity

  • Best Connection for Desktop: A wired Ethernet connection typically provides the most stable and reliable internet to a desktop computer.

  • Safest Mobile Connection: Cellular connections are often deemed safer than public Wi-Fi or hotspots during travel.

Storage Drive Speeds

  • HDD vs. SSD: Hard Disk Drives are generally slower than Solid State Drives, which utilize flash memory for increased speed.

Gyroscope Function

  • Smartphone Component: The gyroscope within mobile devices helps maintain screen orientation based on the position of the device.

CPU (Central Processing Unit)

  • Definition: Known as the brain of the computer, responsible for processing data and managing instructions.

Email/Instant Messaging Threats

  • Imitation Methods:

    • Various techniques can be used for malicious impersonation via email or messaging, with social engineering being a primary approach.

    • DDoS Attacks: Not performed via email; requires overwhelming servers through traffic, hence not a valid attack vector in this context.

Cloud Backup Safety Features

  • Off-Site Storage: A core feature of cloud backup that enhances data safety by maintaining copies at remote facilities to prevent data loss from local disasters.

Statically Assigned IP Addresses

  • Explanation: Confirmed that printers can have statically assigned IP addresses to ensure they don’t change across sessions.

AAA Process

  • Components:

    • Authentication: Verifying user identity.

    • Authorization: Granting access to resources.

    • Accounting: Monitoring and documenting user activities.

Open-Source Software

  • Definition: Software that is available for free modification and distribution by users.

Security Threats Explained

  • Spam: Refers to unwanted digital communication, sometimes relevant in cybersecurity discussions.

Display Settings

  • Adjusting Viewing Area: If visuals appear too large, users should modify screen resolution and DPI settings for optimal visualization.

Color Order in T568B

  • Wiring Standard: Recall the color coding of Ethernet cables in the T568B standard; details may not be on assessments but useful for practical applications.

UAC (User Account Control)

  • Definition: A Windows security feature aimed at preventing unauthorized changes to the operating system.

Executable Files (.exe)

  • Function: Running executable files initiates processes on the operating system, essential for launching applications.

Anti-Malware Software

  • Best Practice: It is advised against installing multiple anti-malware programs simultaneously as they may conflict with each other.

Security from Interception

  • Best Connection Type: Wired connections provide higher data protection from interception, while wireless connections can be more vulnerable.