Comptia ITF+

¡Supera tus tareas y exámenes ahora con Quizwiz!

CD-ROM(compact disc read-only memory)

A CD-ROM is a pre-pressed optical compact disc that contains data. Computers can read—but not write to or erase—CD-ROMs, i.e. it is a type of read-only memory.

What type of system would use a Hybrid Fiber Coax (HFC) connection?

A Cable Access TV provider that also has Internet service

CD(compact disc)

A Compact Disc, also called a CD are small plastic discs which store and retrieve computer data or music using light. Compact Discs replaced floppy disks because they were faster and could hold more information.

kernel

A Kernel is the central part of an operating system. It manages the operations of the computer and the hardware - most notably memory and CPU time.

F-connector

A connector used to terminate coaxial cable used for transmitting television and broadband cable signals.

Which non-repudiation mechanism records who goes in or out of a particular area without user interaction?

A video surveillance camera

APPLE MAC OS

Apple's OS for macbooks and iMac that when it first arrived in 1984 came with GUI when IBM's PC used only command-line DOS operating system

(BD-ROM)blu-ray disk read only memory

BD-ROM or Blu-ray Disc Read Only Memory is a high definition optical disc storage format of the Blu-ray family that consists of pre-recorded data. BD-ROM can only read audio and video information.Storage devices, similar to CDs and DVDs, but are able to store even larger amounts of data Standard BD: 25 gb Dual-Layer BD: 50 gb Triple Layer BD:100 gb Quad Layer BD:128 gb

What type of connection would you use to connect short-range wireless devices such as a keyboard or a mouse to a computer?

Bluetooth

What type of connection would you use to connect short-range wireless devices such as a keyboard or a mouse to a computer?

Bluetooth creates a so-called Personal Area Network (PAN) to share data with a PC, connect to a printer, use a wireless headset, or connect to a wireless mouse/keyboard.

Which is NOT a likely cause of Wi-Fi signal interference?

Bluetooth.Radio signals pass through solid objects but can be weakened or blocked. One technology that is unlikely to cause interference, however, is Bluetooth. Despite using the same 2.4 GHz frequency range, the modulation technique is different.

What special numeric data type indicates that something is either TRUE or FALSE?

Boolean values

Which of the following data types can NOT store the number 3?

Boolean. A special numeric data type that indicates something is either TRUE or FALSE. Boolean values are stored using a single bit with 1 representing true and 0 representing false. Of the data types listed, a Boolean value is the only one that cannot contain the number 3.

In a database application, what is the difference between a form and a report?

Both display data, but a form can be used to update the contents of the database as well.

Which statement about Firewire or USB is true?

Both ends of a Firewire cable use the same design of a 6-pin connector, which slightly resembles the USB connector but has a beveled edge on one side. Some Apple Mac computers have Firewire ports, but these cables never received mainstream PC support.

What would you use to instruct your computer to execute a different sequence of instructions?

Branching is used to instruct the computer to execute a different sequence of instructions, for example, there may be a branch based on a condition. This causes the program to deviate from the main path. Branches are used to control the flow within the program. Code inside an IF statement is an example of a conditional branch.

Where do you go to configure a pop-up blocker?

Browser settings

What type of software do you need to use if your business functions cannot be performed by "off-the-shelf" software?

Business-specific software

disk-level encryption

Disk-level encryption encrypts an entire volume or entire disk and may use the same key for the entire disk or, in some cases, a different key for each partition or volume. It may also use a Trusted Platform Module (TPM) chip. This chip is located on the motherboard of the system and provides password protection, digital rights management (DRM), and full disk encryption.

What type of business software would you use to store a large amount of information, such as timetables, customer details, and patient records?

Database software

What should you NOT do when configuring and managing a web browser, as it tends to break most websites?

Deactivate client-side scripting

What needs to be considered when deciding priorities for restoring systems as part of disaster recovery?

Dependencies between different systems

CHROME OS

Derived from Linux and developed by Google designed for the budget amrket

specialized business software

Designed to assist with a particular business process or consumer demand

sandbox

Designed to prevent a store app from making system-wide changes and prevent a faulty store app from "crashing" the whole OS or interfering with other apps and applications.

HTTP 80

HTTP is one of the most commonly used protocols on most networks. HTTP is the main protocol that is used by web browsers and is thus used by any client that uses files located on these servers.

What is a best practice for the Service Set Identifier (SSID) of a wireless router?

It should be changed to a more unique name or have its broadcast disabled.

Which of the following is a characteristic of a strong password?

It uses a combination of uppercase, lowercase, numeric, and special characters.

A user plans to travel and needs to remotely connect to the corporate network. What technology can be used to accomplish this?

A VPN (Virtual Private Network) tunnel over an insecure connection

bmp (image file)

A Windows bitmap image format that features low-quality and large file sizes. Lossless format

What type of Central Processing Chip (CPU) would a modern high-end server use?

A 64-bit EM64T chip

Ports

Used to attach peripheral devices and cabling to the computer.The physical input/output interfaces to the networking hardware. These input/output (I/O) ports are positioned so that they appear through holes cut in the case.

remote wipe

Remotely erases all contacts, email, photos, and other data from a device to protect your privacy.

RSI

Repetitive Strain Injury is a condition that occurs when the same task is carried out repeatedly for a long period, making use of the same muscles continuously.

Which is NOT an example of a contingency plan?

Switches are installed in closets within each building where employees work. Contingency plans are used for many purposes. In terms of business continuity, a contingency plan is used to ensure a business process can continue despite problems with information technology. Of the choices listed, installing switches in closets is a standard IT architecture decision and is not related to a failure. Plans related to staff can be considered contingency plans as long as they are implemented in response to a problem or failure. Configuring routers to use alternate routes when the primary route is unavailable is an example of a contingency plan for network redundancy. Using backup power supplies is an example of a power redundancy technique as part of a contingency plan.

You have a new printer to install on your Windows computer. Where would you go in Windows to configure user-configurable settings for the printer?

The Devices and Printers folder

Which of these is a clear warning from the browser that a certificate is invalid?

The address bar is colored maroon and a warning message is displayed.

If technicians are attempting to replicate a problem reported by a user, what are they doing?

Trying to cause the issue to happen again so they can see it for themselves

Which type of server application architecture model separates the database engine from the business logic?

Two-tier application architecture model

What can a user do to prevent the browser from storing cookies or temporary files?

Use private browsing mode.

You have multiple monitors connected to your computer. How would you configure the screens to give you more "real estate" available for viewing?

Use the "Extend these displays" setting.

RCA connector

Used for connecting to video devices to send audio and video signals.

identifier

Used in a program to access a program element, such as a stored value, class, method, or interface.

Standard user account

User account in Windows that has limited access to a system. Accounts of this type cannot alter system files, cannot install new programs, and cannot edit some settings by using the Control Panel without supplying an administrator passwords.

clear text credentials

User credentials that are sent over the network unencrypted, making them easily readable by anyone who could intercept them.

The use of a Graphical User Interface (GUI) to allow users to search and add records is an example of which type of database access method?

User interface/utility

What is a characteristic of an open source software license?

Users have the ability to access the code and the right to modify it.

FILE EXPLORER

Windows Explorer is the file management interface for Windows used to view, create, rename and delete files on local disks, removable drives and the network

What technique is best used when a computer is infected with multiple instances of malware?

Wipe the hard drive and reinstall from a recent clean backup

WEP

Wired Equivalence Protocol. Wireless network encryption system.specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

IEEE 802.11

Wireless Ethernet standard more commonly known as Wi-Fi.

BLUETOOTH

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices.used for PAN (Personal Area Networks) to share data with a PC, printer, wireless headset, wireless mouse/keyboard, etc up to 2.4 fhz

Which is NOT a key function of a Small Office Home Office (SOHO) wireless router?

Wireless routers are among the most commonly used pieces of networking equipment both in the workplace and in SOHO networks. Wireless routers do not, however, provide access to 3G and 4G networks. These are cellular networks that are used by mobile telecommunications devices such as smartphones.

What usually happens to email messages when a client accesses them using the Post Office Protocol v3 (POP3)?

With the Post Office Protocol v3 (POP3), email messages are usually deleted from the server when they are downloaded to an email client. This protocol is intended to be used only when a single device or email client application is used.

Virtual Local Area Network (VLAN)

a logical network that can separate physical devices without regard to the physical location of the device

radio frequency (RF)

a means of provisioning a wireless local network using Wi-Fi standard equipment. While this isn't a means of internet service provision in itself, it is a means for a client to connect to a wireless router offering internet access. Ex:A wireless router

A Storage Area Network (SAN)

a network that provides access to consolidated data storage.

Wireless Network

a network where users can access the Internet without the use of fixed cables (Bluetooth, NFC(near field communication)

digital certificate

a notice that guarantees a user or a Web site is legitimate

Fair Use Policy

a part of U.S. copyright law that allows limited use of some copyrighted material without requiring permission

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Discretionary Access Control (DAC)

an access control model in which the subject has total control over any object that the subject owns along with the programs that are associated with those objects

implicit deny

an access control principle that maintains that if a condition in not explicitly met, it is to be rejected

pop-up ad

an advertisement that appears on the screen while a web page loads or after it has loaded

Display Port

an alternative to DVI that also supports HDMI

scanner

an electronic device that generates a digital representation of an image for data input to a computer. Print, photo, or another object. Typical scanners handle flat objects like documents, receipts, or photographs.

digital signature

an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

Microprocessor

an integrated circuit that contains all the functions of a central processing unit of a computer.

VBScript

an object-oriented scripting language that Microsoft derived from the Visual Basic programming language. (Similar function to JavaScript)

Monitoring Data

analyzing data communications to measure an employees productivity.

FLV (video file)

another container file format designed to deliver Flash Video, for video created in Adobe Flash

snooping

any attempt to get access to information on a host or storage device(data at rest)that you are not authorized to view.

circuit

any two computers wanting to communicate had to open a direct channel known as a circuit. If this circuit was broken, the computers would stop communicating immediately

BATCH FILES

are a collection of command-lie instructions that you store in a .CMD file

network clients

are computers and software that allow users to request resources shared by and hosted on servers.

vhd/vmdk (compression format)

are disk image file formats used with Microsoft Hyper-V and VMware virtual machines respectively. A disk image is a file containing the contents of a hard disk, including separate partitions and file systems. Like an ISO, such a file can often be mounted within an OS so that the content can be inspected via the file browser.

subjects

are users or software processes or anything else that can request and be granted access to a resource.

M4A (audio format)

audio-only file format deriving from the MPEG-4 standards track. Usually uses AAC compression

Database Access

authorizes access to sections of the database

computer-aided design (CAD)

drawing and drafting software that enables users to create and edit blueprints and design drawings quickly and easily

HEATSINKS

is a block of metal with fins that exposes a larger surface area to the air around the component, a greater cooling effect by convention is achieved.

vulnerability

is a design flaw that can cause the application security system to be circumvented or that will cause the application to crash.

Passphrase

is a longer password comprising a number of words.

THREE-TIER

is a separate server as a virtual machine.

PCIe (peripheral component interconnect express)(PCI Express)

is a serial expansion bus standard for connecting a computer to one or more peripheral devices. • Serial communication - xl, x2, x4, x8, xl6, x32 lanes • High performance for devices like high-end graphics adapters • PCI Express throughput per-lane in each direction • Speeds from 250 MB/s to 2 GB/s

Security Assurance

monitoring data communications and employees behavior to ensure they do not divulge confidential information or compromise the security of the organization.

Prioritization

process of deciding what tasks are most important

acquisition

processing,storage, and transmission of personal data is sometimes governed by laws.

project management software

programs for planning and scheduling the people, costs, and resources to complete a project on time

database interfaces

the processes used to add/update information to and extract (or view) information from the database.

software

the programs and other operating information used by a computer.

msi (executable file)(installs applications)

this is a windows installer file used to install and uninstall software applications under windows.

Denial of Service (DoS)

this is any situation where an attacker targets the availability of a service

Eavesdropping and Wiretapping

this is snooping on data or telephone conversations as they pass over the network.

app (executable file)

this is the equivalent of an exe file for macOS

integrity

this means that the information is stored and transferred as intended and that any modification is authorized.

rar (compression format)

this proprietary format is used by WinRAR compression program.

floating point numbers

this type can support decimal fractions such as 4.1,26.4, 5.62. A floating point number(or just float) consumes between 4 and 8 bytes of storage.

gz (compression format)

this type of archive is created an opened by the gzip utility, freely available for UNIX and Linux computers. A number of Windows third party utilities can work with gzip-compressed files.

7z (compression format)

this type of archive is created and opend using the open-source 7-zip compression utility.

desktop publishing(DTP)

through the use of a personal computer, combining text and graphics to produce a high-quality documents, such as newsletters, flyers, brochures, etc.

ALT+F4

to close a tab

Audio Card

to process signals and provide interface for connecting equipment and one or more input and output devices

Authentication

verifying the identity of the person or device attempting to access the system. Process of ensuring that each account is only operated by its proper user.

Digital Visual Interface (DVI)

video and audio interface connecting the monitor and the computer digital. Visual Interface, high-quality digital interface designed for flat-pane display equipment. (1920x1080)

Device Manager

view all the devices that are within the computer, update, delete driver or remove the device

Direct Attached Storage (DAS)

when a computer shares an attached hard drive or folder on an attached drive, it can be reffered to as Direct Attached Storage (DAS) The computer is acting as a file serverA storage access model in which software running on a CPU accesses secondary storage devices in the same computer.

replay attack

where a host captures another hosts response to some server and replays that response in an effort to gain unauthorized access.

key exchange

where two hosts need to know the same symmetric encryption key without any other host finding out what it is.

Loops

with looping, when the logic condition is met, program flow returns to the initial program path. A loop is used to repeat code in your program. Instruct your computer to perform, or repeat, a task until a condition is met. (similar to branches)

Laserjet Printer

works by fixing a fine powder called toner to the paper surface and applied using electrostatic charging then fixed using high heat and pressure in the fuser unit which creates a durable printout with no smear or fade

cellular radio

works in 850 and 1900 MHz frequency bands. A form of broadcast radio that is in wide use for mobile communications, specifically wireless modems and mobile phones

quarantine

you can use anti-virus software to try to remove the infection(cleaning), quarantine the file(the anti-virus software blocks any attempt to open it, or erase the file.

What protocol is used to retrieve email from a server and supports multiple clients connecting to the same mailbox simultaneously?

Internet Message Access Protocol (IMAP)

What is the basic function of a router?

It forwards TCP/IP packets between dissimilar networks.

Frames Per Second (FPS)

Measurement of playback speed of an animation

DDR

double-data rate (DDR) SDRAM.RAM double data-rate random access memory

Accounting

means of recording when and by whom a resource was accessed.

UNSTRUCTURED DATABASE

no rigid formatting, just text files, and images.

Given the equation "3821 __ 6598" during a logical test, which of the following operators would result in a TRUE condition?

"<"

Which of the following HTML code snippets includes properly nested tags?

"<p><em>Hello World!</em></p>" is properly nested. Nesting code is the process of organizing code based on the proper order defined by HTML standards. For this example, the <p></p> is considers a block-level element, and the <em>, which is used to emphasize text, is considered a text-level element. Text-level elements must both open and close within the block-level elements. Although failing to do so may not prevent the code from appearing to execute properly, it will fail validation when checking for errors and warnings.

Given the equation "-39810 __ -39810" during a logical test, which of the following operators would result in a TRUE condition?

"=="

Given the equation "-329 __ -2034" during a logical test, which of the following operators would result in a TRUE condition?

">=" The ">=" operator declares that the value on the left is greater than (or equal to) the value on the right. Looping and branching structures depend on logical tests to determine whether to continue the loop or the branch to follow. A logical test is one that resolves to a TRUE or FALSE value. -The "==" operator declares that the two set values are equal to one another. -The "<" operator declares that the value on the left is less than the value on the right. -The "<=" operator declares that the value on the left is less than (or equal to) the value on the right.

RJ-45 (registered jack 45)

(Ethernet connector) Ethernet network adapter used with twisted pair cable will have this port to connect the computer to the network, via another RJ-45 port in the network equipment.

Which of the following is the correct syntax of using an escape character to include a quote character in a string definition?

"John said \'Hello World\' then left again."

A Personal Identification Number (PIN) is which type of authentication factor?

"Something you know," because you must remember the digits A Personal Identification Number (PIN) is typically a four- to eight-digit number that is commonly used as a second factor of authentication in financial transaction or in physical security devices, like gates to secure parking lots. A PIN is considered "something you know." Although you may physically possess the digits by writing them down, a PIN is still considered something you know. A PIN is knowledge and not a physical device that can be possessed. Biometrics, such as fingerprints, are part of your being and uniquely yours. Your PIN number is not necessarily unique to you and the numbers it uses are not unique either.. Something you have written down does not constitute a factor of authentication, although it is unfortunately seen too frequently with passwords and PINs.

Which of the following uses proper HTML5 syntax?

(<h1> is opening and </h1> is closing) HTML5 uses tag pairs that are properly opened and closed (with a forward slash: "/"). For example, in "<h1>Hello World</h1>", <h1> is the opening tag, </h1> is the closing tag, and the content between them is displayed using a pre-defined format that corresponds to the tag.

Compiled Programming Language

(C++)(C#)(COBOL) Uses human readable instructions, then sends the instructions through a compiler. It takes the human instructions and compiles them into machine instructions. Basically translates the human coding.

CISC

(Complex Instruction Set Computer) A general-purpose microprocessor chip designed to handle a wider array of instructions than a RISC chip, but process each one slow than RISC.

EV-DO

(Evolution-Data Optimized) A technology used by cell phone companies to offer faster data transport than basic CDMA service.

HFS+ (file system)

(Hierarchical File System)OS X file system. Apple Mac workstations and laptops use this

HDMI (High-Definition Multimedia Interface)

(High-Definition Multimedia Interface) A standard type of plug and connector for computer display devices.

MITM

(Man in the middle). Where a host sits between two communicating nodes, and transparently monitors, captures and relays all communication between them.

(Mb)Megabit

(Mb or Mbit) 1,048,576 bits A megabit is a unit of measurement for data size, most often used in discussions of data transfer. It takes eight megabits to make a megabyte. (8mb=1MB)

Using a programmatic database access method to interact with a relational database would require what type of commands?

(SQL)When accessing a database via a programming language, database interaction is handled with SQL commands. SQL is the relational database access language. As such, many programming languages even include libraries that provide default code for database connection and queries. The RDBMS is the software that manages the database structure. UNIX is an example of an operating system that an RDBMS may run on. PHP is one of the many programming languages that can be used to connect to and access database data.

What service must be enabled for you to log on to multiple resources, servers, or sites using a common account and password?

(SSO) Single Sign On

Three-Tier Client-Server Architecture

(Separates in three) the presentation layer, application layer, and data layer into three separate systems.The client should have no direct communications with the data tier.In a three-tier client server application architecture model, the application layer executes the query on the data layer, which resides on a third tier, and returns the result to the client

USB 3.1

(Super Speed +) runs at 10 Gb/s.

USB 3.0

(Super Speed) runs at 5 Gb/s.

While you are performing troubleshooting, a program is not responding and will not close when the exit button is clicked. How can you end the frozen program without losing your other work?

(Task-kill) Press Ctrl+Alt+Del, start the Task Manager, and end the task from the Applications tab.

UDP

(User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating connections between applications on the internet.

FireWire

(Was a competitor to USB, but never received mainstream support.)Also known as IEEE 1394 and IEEE 1394b. The IEEE 1394 bus standard supports data transfer rates of up to 400 Mbps

Trojan Horse

(a program that pretends to be something else)a program designed to breach the security of a computer system while ostensibly performing some innocuous function.

expansion bus

(also called the Input/Output (I/O)bus) Allows the processor(CPU) to communicate with peripheral devices

Bootstrapping

(also known as booting)When a computer is powered on, it needs some standard means for the CPU to start processing instructions and initialize the other components.

JPG or JPEG (Joint Photographic/Pictures Expert Group)(image file)

(an acronym for Joint Pictures Experts Group), a commonly used lossy compression format for digital images, photographic pictures. particularly for those images produced by digital photography. The format supports adjustable degrees of compression. The lossy compression method relies on dithering the image to some extent(changing the color value of some pixels). The user can select a level of compression when saving the file, trading picture quality for reduced file size.

front side bus (FSB)

(another term for system bus) The bus between the CPU and memory on the motherboard. The bus frequency in documentation is called the system speed, such as 400 MHz. Also called the memory bus, front-side bus, local bus, or host bus.

Machine Code

(bits)Zeros and ones that represent simple instructions executed by a processor.(Binary)

bat/cmd/vbs/js/ps1 (executable file)

(command prompts, power shell)contains a sequence of commands either from the operating systems command interpreter or from a scripting language supported by the OS.

parity

(equality) the quality of sameness or equivalence. In reference to computers, parity usually refers to an error-checking procedure in which the number of 1's must always be the same—either even or odd—for each group of bits transmitted without error

Post Office Protocol version 3 (POP3)110

(incoming mail)(receiving)A protocol for retrieving e-mail messages from an e-mail server. POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. POP3 is a later iteration of the POP protocol, and can be used with or without SMTP.

.EXE - (Executable file)

(initiates instructions)An executable file; It commonly will start a program running. Basic type of program file in Windows.

executable file

(initiates)One that contains program code. Unlike a data file, program code can make changes to the computer system. A program file that can cause an application to run on your computer when it is opened. ex. .exe,MSI,app,bat/cmd/VBS/js/ps1

NTFS (New Technology File System)

(just for windows)(More stable and secure than FAT)New Technology File System, for 64-bit it allows much larger partitions (up to 2TB) than FAT, supports extended attributes, allowing for file-level security permissions, compression, and encryption that make it more stable and secure than FAT

n-tier architecture

(most complex and combines all tiers or just 2)N-tier architecture is also called multi-tier architecture because the software is engineered to have the processing, data management, and presentation functions physically and logically separated.

patent

(n.) exclusive rights over an invention; copyright; (v.) to arrange or obtain such rights; (adj.) plain, open to view; copyrighted

Simple Mail Transfer Protocol (SMTP)25

(outgoing)An Internet-standard protocol for sending email messages between servers on IP networks. Because SMTP is generally used to send messages from a mail client to a mail server, you should specify both the POP or IMAP server and the SMTP server when configuring an email application.

ICMP(Internet Control Message Protocol)

(outgoing)Internet Control Message Protocol, sends messages and reports on errors regarding packet delivery

Internet Mail Access Protocol (IMAP) 143

(receiving)A protocol used to retrieve email messages. IMAP is similar to POP3, but with some advanced features. The main difference between the two is that IMAP generally leaves the email on the mail server.

Post Office Protocol (POP)(995)

(receiving/incoming) A protocol used to retrieve email from a mail server. POP3 is a later iteration of the POP protocol, and can be used with or without SMTP.

two-tier model

(seperates)database model in which the client workstation or system runs an application that communicates with the database that is running on a different server

one-tier model

(standalone/doesn't separate)the database and the application exist on a single system; common on desktop systems running a standalone database

markup language

(tell a client application(such as a browser)how to structure the document)A language that provides text and graphics formatting through the use of tags. Examples of markup languages include HTML, XML, and SGML. (tell a client application(such as a browser)how to structure the document)

Root Folder

(the first level of the hierarchy)is the main folder which contains all documents and folders to that project. the root folder is identified by the drive label and backslash. For example, the root folder of the C: drive is C:/. The root folder can contain files and subfolders.

Scareware or rogueware

(web pop-ups)A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware.

Client-side scripting

-displays the pages given by the server to the user -code written needs to ensure that it can make interactive webpages from the source code sent by the server -the client interact with local storage (such as cookies) -programming usually done with JavaScript

Which file extension indicates that the file is an audio clip?

.wav

Compressed File

.zip .rar .tar File that has been shrunk to a smaller size Often to send or store a file it needs to be compressed in some way, to reduce the amount of space it takes up on the storage media or bandwidth required to send it over a network. A compressed file is any file that contains one or more files or directory that is smaller than their original file size. These files make downloading faster easier and allow more data to be stored on removable media. Common compressed file extensions are.ZIP, RAR, ARJ, .TAR.GZ, and.TGZ

Terabit (Tb)

1 trillion bits 1024 Gigabits A terabit is a multiple of the unit bit for digital information or computer storage. The prefix tera (symbol T) is defined in the International System of Units (SI) as a multiplier of 1012 (1 trillion, short scale),[1] and therefore 1 terabit = 1012bits = 1000000000000bits = 1000 gigabits. The terabit has the unit symbol Tbit or Tb.

Petabyte (PB)

1,024 terabytes(TB) commonly used to measure the total data stored in large computer networks or server farms

USB data rate

1.6-480 Mbps

How many students would be represented in a "Student" table containing 150 rows, 17 columns, 1 primary key, and 1 foreign key?

150. In a "Student" table, each student would have one row in the table that contains all of his or her data. The 17 columns would be used to store 17 individual pieces of data about each student.

double byte

16 bits

Thunderbolt 2 speed

20 Gbps

a device supporting the Wi-Fi standard should have a maximum indoor range of up to?

30m(100 feet). Though the weaker the signal, the lower the data transfer rate,

How many Ethernet LAN ports are typically found on a Small Office Home Office (SOHO) network switch?

4-8

USB 2

480 Mbps

What is the decimal number 75 in hexadecimal notation?

4B is how you would write 75 in hexadecimal notation. Hexadecimal notation is often indicated using 0x to precede the hexadecimal digits, so you may also see this written as 0x4b. For hexadecimal, you only need 16 and 1 (75 divided by 16 is 4 remainder of 11, which is represented as "B" in hexadecimal).

Which 802.11 wireless standard has the greatest rate of data throughput?

802.11ac

Which wireless standard provides a 54 Mbps maximum transfer rate?

802.11g acted as an upgrade path for 802.11b, working at 54 Mbps on the 2.4 GHz channel but also allowing support for older 802.11b clients.

Network Attached Storage (NAS)

A (NAS) appliance is one or more hard drives house in an enclosure with basic server firmware, usually running some form of Linux. a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network.

GPRS/EDGE (General Packet Radio Service/Enhanced Data Rates for GSM Evolution)

A 2.5 generation cellular telephone technology based on GSM, can transmit data at 30 kbps to 40 kbps. And EDGE about 3-4 times that.

Which term describes a group of computers and devices that share resources without a router within a small geographical area?

A Local Area Network (LAN) is a group of computers and devices that share resources (without a router) within a small geographic area. A LAN can be a few connected computers, or it can comprise hundreds of computers and devices.

MAC address (Media Access Control)

A MAC address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed.

Server Message Block (SMB)

A Microsoft developed protocol used to provide shared access to files printers and other network resources. It runs on port 445.

key-value database

A NoSQL database model that stores data as a collection of key-value pairs in which the value component is unintelligible to the DBMS

Document Database

A NoSQL(non-relational) database model that stores data in key-value pairs in which the value component is composed of a tag-encoded document.

Integrated Scripting Environment (ISE)

A PowerShell development environment that helps in creating PowerShell scripts.

Secure Sockets Layer (SSL)

A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.

Which of these is NOT part of a motherboard?

A Solid State Drive (SSD)

Simple Network Management Protocol (SNMP)

A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network.

Internet Control Message Protocol (ICMP)

A TCP/IP protocol that sends messages and reports on errors regarding packet delivery.

Which of these is NOT considered an aspect of a Type 1 hypervisor?

A Type 1 hypervisor runs as a software application "within" a host's operating system.

Hypervisor type 1 (Bare Metal)

A Type 1 hypervisor runs directly on the host machine's physical hardware, and it's referred to as a bare-metal hypervisor; it doesn't have to load an underlying OS first. With direct access to the underlying hardware and no other software -- such as OSes and device drivers -- to contend with, Type 1 hypervisors are regarded as the most efficient and best-performing hypervisors available for enterprise computing. Hypervisors such as VMware ESXi, Microsoft Hyper-V server and open source KVM are examples of Type 1 hypervisors.

Hypervisor Type 2

A Type 2 hypervisor is typically installed on top of an existing OS, and it's called a hosted hypervisor because it relies on the host machine's pre-existing OS to manage calls to CPU, memory, storage and network resources. Type 2 hypervisors include VMware Fusion, Oracle VM VirtualBox, Oracle VM Server for x86, Oracle Solaris Zones, Parallels and VMware Workstation.

What type of backup makes an "image" of a system and then restores a computer?

A bare metal backup

uniterruptible power supply (UPS)

A battery power source that provides electric current during a power outage. Ex: Backup power generator

Which non-repudiation mechanism can prove that a person was genuinely operating an account and that it was not hijacked?

A biometric authentication device A biometric authentication device uses physiological identifiers to prove that a person was genuinely the one operating an account and that the account was not hijacked. A video surveillance camera can prove that someone was in a particular area but it cannot prove that a person was genuinely operating a user account. A physical or digital signature can prove that someone created a document, but it does not prove that a person was operating a user account. A token or receipt can prove that a product or service was requested, but it does not prove that a person was operating a user account.

Remote Desktop

A connection mode that enables a user to access any network system from their workstation and perform tasks on the remote system.

branch

A branch is an instruction in a computer program that can cause a computer to begin executing a different instruction sequence and thus deviate from its default behavior of executing instructions in order.

Trademark

A brand that has exclusive legal protection for both its brand name and its design

Hybrid Fiber Coax (HFC)

A broadband cable system architecture that uses both fiber-optic and coaxial cable.

Which type of laptop would NOT use a 64-bit Central Processing Unit (CPU)?

A budget laptop designed for a low price tag

CATV(cable Access TV)

A cable internet connection is usually provided through CATV.Early local cable television systems; short for community antenna television.

How do computers differentiate binary data and map it to letters, numbers, and symbols?

A character set maps letters, numbers, and symbols to binary values.

MOTHERBOARD

A circuit board that contains all of the computer system's main components.

Access Control List (ACL)

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

Batch files

A collection of command-line instructions that you store in a .CMD file. Ex(command) IPconfig/all

Password Policy

A collection of settings to control password characteristics such as length and complexity.

Which of the following statements is true about a column in a table of a relational database?

A column with naturally occurring unique values is a good choice to be the primary key.

A field in a relational table corresponds to which part of a spreadsheet?

A column. A column is another name for a field in a relational table. It is a place in the table where a specific piece of data can be stored on each row. Consider a "Student" table, in which data describing each student is stored in one row in the table—250 students results in 250 rows in the table. Every one of the 250 students has a last name in the lastName column/field in that table.

Bare-Metal Backup

A complete image-based backup of a virtual machine while its running.

peer-to-peer (P2P)

A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server ex :bit torrent

software firewall

A computer running firewall software. For example, the software firewall could protect the computer itself (for example, preventing incoming connections to the computer). Alternatively, a software firewall could be a computer with more than one network interface card that runs firewall software to filter traffic flowing through the computer.

While writing a program, you notice that you use a value multiple times throughout your program but it doesn't change. You decide to create an identifier and assign the unchanging value to that identifier. What did you just create?

A constant

You have created an identifier with a value that cannot be changed. What is this considered?

A constant is a specific identifier that contains a value that cannot be changed within the program. For example, you might want to reference the numerical value for screen dimensions or resolution.

Constants are best used in which situation?

A constant is a specific identifier that contains a value that cannot be changed within the program. For example, you might want to reference the numerical value for screen dimensions or resolution. These numbers stay the same and do not change on the fly like a variable would.

What would you use a Near Field Communication connection for?

A contactless payment reader

first-party cookie

A cookie that is created from the website currently being viewed.

backup

A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.

identity theft

A crime that involves someone pretending to be another person in order to steal money or obtain benefits

Data Definition Language (DDL)

A data definition language (DDL) is a computer language used to create and modify the structure of database objects in a database. These database objects include views, schemas, tables, indexes, etc. new database, table, or index is added with the CREATE command: CREATE DATABASE adds a new database, CREATE TABLE adds new tables to the database, and CREATE INDEX adds an index to the tables, by specifying one or more columns which will be used for faster searching and sorting. The INSERT command adds new data rows into an existing table. It is a Data Manipulation Language (DML) command, not a DDL command, because it changes the content of the database, not the structure. The UPDATE command changes data values, and is also a DML, not DDL, command. The ALTER command is used to modify an existing database structure, i.e., adding or removing columns in an existing

WPA2 (Wi-Fi Protected Access 2)

A data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard.

Why is the process of generating backups such an important feature of an RDBMS(Relational Database Management System)?

A database can contain mission-critical data, which an organization may not be able to afford to lose. Most companies rely on the accuracy and timeliness of their data to stay in business. Backing up data ensures that even if the database becomes corrupt or is destroyed, it can be restored and business can resume.

Why is the level of data integrity greater in a database than in a flat file?

A database can enforce data types for each column in a table, and can validate data as it is entered into those columns.

Why might a database dump be a good option for backup/restore?

A database dump includes both the database data and the structure, so it could be restored whether the offending error was in the data or in the structure

What is a database?

A database is a collection of related data organized in a structured manner for easier access.

datagrams

A datagram is a basic transfer unit associated with a packet-switched network. Datagrams are typically structured in header and payload sections. Datagrams provide a connectionless communication service across a packet-switched network.

all-in-one(AIO)

A desktop system unit that houses the computer's processor, memory, and monitor in a single unit.

disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

Hardware Token

A device held by a user that displays a number or a password that changes frequently, such as every 60 seconds. The number is synchronized with a server and used as a onetime password.

Personal Identification Number (PIN)

A number, often only four digits, used like a password. Another example of something you know as is the response to pattern lock.

port number

A numeric value used as an identifier to applications and services on TCP/IP systems.

WAP (Wireless Access Point)

A device that provides a connection between wireless devices and can connect to wired networks. In computer networking, a wireless access point, or more generally just access point, is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. The AP(access point) usually connects to a router as a standalone device, but it can also be an integral component of the router itself.

What type of password attack involves comparing encrypted passwords against a predetermined list of possible password values?

A dictionary attack A dictionary attack is a specific type of password attack that involves comparing encrypted passwords against a predetermined list of possible matches. These types of attacks are successful against only fairly simple and obvious passwords, as they rely on a dictionary of common words and predictable variations. Using complex passwords makes it much more difficult for attackers to use dictionary attacks. A brute force attack involves attempting all possible combinations of letters, numbers, and special characters. Password guessing involves making random attempts based off knowledge about a person. Password stealing can be performed using technical means such as network eavesdropping, or non-technical means like dumpster diving.

binary digit (bit)

A digit that corresponds to the on and off states of a computer's switches. A bit contains a value of either 0 or 1.A digit that corresponds to the on and off states of a computer's switches. Computer memory and files sizes in Windows are measured in multiples of bits. A bit contains a value of either 0 or 1. (8 bits = 1 Byte) (2 Bytes = 16 bits)

external drive

A disc drive not included in a system unit but rather attached to it via cables.

Document Database (Semi-Structured)

A document database is a type of nonrelational database that is designed to store and query data as JSON-like documents. Document databases make it easier for developers to store and query data in a database by using the same document-model format they use in their application code. The flexible, semistructured, and hierarchical nature of documents and document databases allows them to evolve with applications' needs.

Chip Level Multiprocessing

A dual-core CPU is essentially two processors combined on the same die.

(dll)dynamic link layer

A dynamic-link library (DLL) is a module that contains functions and data that can be used by another module (application or DLL). A DLL can define two kinds of functions: exported and internal. The exported functions are intended to be called by other modules, as well as from within the DLL where they are defined.

SuperSpeed USB

A fast form of USB, with speeds up to 5 Gbps. Also called USB 3.0.

DVD (digital video disc or digital versatile disc)

A faster, larger CD format that can read older CDs, store over 8 GB of data, and hold full-length motion picture videos.

What is the difference between a smartphone and a feature phone?

A feature phone is an older device with limited software functionality.

Tagged Image File Format (TIFF)(image file)

A file format for exchanging bitmapped images (usually scans) between applications.

What protects a network by denying specific types of incoming traffic?

A firewall appliance

packet-filtering firewall

A firewall that examines each packet and determines whether to let the packet pass. To make this decision, it examines the source address, the destination addresses, and other data.

Stateful Inspection Firewall

A firewall that examines the state of a connection as well as simple address, port, and protocol rules to determine how to process a packet.

What computer systems use the extended Hierarchical File System (HFS)?

Apple Mac workstations and laptops

Why would a flat file system not be the optimum choice for data storage for an online shopping cart application?

A flat file system doesn't support multiple concurrent users.A successful online shopping application would be highly likely to have hundreds or thousands of users hitting the database at any given time. A flat file system is not able to support multiple concurrent users. Rather, it only provides access to one user at a time.

heat spreader

A flat heat sink of sorts that adds surface area to a heat-producing component, allowing better heat transfer to the surrounding air; often coupled with a fan for devices that run at a higher temperature.

What is the primary purpose of a flow chart?

A flow chart is used to visualize the graphical sequence of a program. These programs are not completely linear: they consist of different branches and loops. We can use these diagrams to analyze the sequence of instructions and write better code to support that sequence.

What type of device would you connect using a Digital Visual Interface (DVI) port?

A form of flat-panel display equipment

Long Term Evolution (LTE)

A fourth-generation wireless broadband technology that was developed to allow GSM cellular technology to evolve to provide very high-speed Internet access. LTE has a maximum down-link of 150 Mbps, but around 20 Mbps is actually more typical.

File backup

A full backup of all the data in one or more files or filegroups.

Network Media

A general term for all forms of pathways that support network communication.

Spreadsheet

A grid of rows and columns in which you enter text, numbers, and the results of calculations.

SDK (software development kit)

A group of tools that developers use to write apps. For example, Android Studio is a free SDK that is released as open source.

Optical Drive

A hardware device that uses lasers or light to read from, and maybe even write to, CDs, DVDs, or Blu-ray discs.

hardware firewall

A hardware firewall is a physical filtering component that inspects data packets from the network before they reach computers and other devices on a network. A hardware firewall is a free-standing unit that does not use the resources of the computers it is protecting, so there is no impact on processing performance.

Which "something you have" authentication factor can be used to access high-risk applications?

A hardware token

Domain Name System (DNS) or Domain name Server

A hierarchical system for naming resources on the Internet. The purpose of the DNS database is to resolve resource names to IP addresses.

Java

A high-level programming language used to create applications for Web sites.

Cipher Key

A key used to encrypt, or decrypte an encrypted message.

key/value pair database

A key-value database is a type of nonrelational database that uses a simple key-value method to store data. A key-value database stores data as a collection of key-value pairs in which a key serves as a unique identifier. Both keys and values can be anything, ranging from simple objects to complex compound objects. Key-value databases are highly partitionable and allow horizontal scaling at scales that other types of databases cannot achieve

End User License Agreement (EULA)

A legal contract between the author of software and the end user that defines how the software can be used

single-user license

A license that gives you the right to install software on a single computer.

Hyperlink

A link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen

Which of the following application delivery models is considered the "traditional" way to install an application?

A locally-installed application where network connectivity is not required simply doesn't need network access to run. This "traditional" PC-type software application delivery, in which the app is installed locally to the computer's hard drive, can be performed on a standalone machine. When launched, it executes within the computer's memory and is processed by the local CPU.

port number

A numeric value used as an identifier to applications and services on TCP/IP systems. (HTTP 80,FTP,SMTP 25, and so on)

What type of application delivery method should be used when information is of high value to a user and it can't easily be recreated or downloaded?

A locally-installed application, which means the the app and data exist locally, should be used for any information that is of high value to the user and can't easily be recreated or downloaded. This model is best for extremely large files that cannot be compressed and would take a long time to download, or applications that have limited latency rates for transmitting/receiving data over the network.

Botnet

A logical computer network of zombies under the control of an attacker.

How does attenuation affect wireless networking?

A loss of signal strength reduces the data transfer rate.

printer

A machine that prints characters or other images on paper

serial port

A male 9-pin or 25-pin port on a computer system used by slower I/O devices such as a mouse or modem. Data travels serially, one bit at a time, through the port. Serial ports are sometimes configured as COM1, COM2, COM3, or COM4.

Mandatory Access Control (MAC)

A means of restricting access to data based on varying degrees of security requirements for information contained in the objects and the corresponding security clearance of users or programs acting on their behalf. Can be found in military settings.

Pixels per Inch (PPI)

A measure of screen density refers to the number of device pixels on a physical surface.

dots per inch (dpi)

A measurement of image quality for printers.

Dual Inline Memory Module (DIMM)

A memory module (stick) that installs into matching DIMM sockets found on many motherboards. The word "dual" refers to the separate pins or connections on both sides of the module and socket.

load balancing

A method of dividing work among the devices(adapters) on a network.The process of distributing data transfer activity evenly so that no single device is overwhelmed.

file system

A method used by operating systems to store, retrieve, and organize files.

Which of the following is NOT an example of a workstation operating system?

A mobile device operating system like Apple iOS

one-tier model

A model in which the database and applications exist on the same system.

What hardware device is used to obtain Internet access when the service provider delivers a coaxial cable?

A modem

eSATA (External Serial Advanced Technology Attachment)

A modern type of connector for attaching external hard disks

packet switching network

A network in which no fixed path is created between the communicating devices and the data is broken into packets, with each packet transmitted individually and capable of taking various paths from sender to recipient.

Service Set ID (SSID)

A network name used to identify a wireless network. Consisting of up to 32 characters, the SSID travels with the messages on the wireless network. All of the wireless devices on a WLAN must use the same SSID in order to communicate. (14)

Network Protocol

A network protocol identifies each host on the network using a unique address.

IP address

A number that uniquely identifies each computer or device(host) connected to the Internet/network. An IP address is a 32-bit binary value.

What is the difference between a one-time purchase license and a subscription?

A one-time purchase license requires fees for subsequent upgrades, whereas a subscription provides upgrades at no additional cost.

packet

A packet is a wrapper for each data unit transmitted over the network. A packet generally consists of a header(indicating the protocol type, source address, destination address, error correction information, and so on) and a payload(the data). Data is divided into small chunks or packets.

How do you know if a certificate is valid on your browser?

A padlock icon is shown.

Throughout rate

A particular connection can sustain is measured in bits per second (bps) Throughout units are always base 10.

A passphrase is a longer version of which factor of authentication?

A password

Pharming

A phishing attack that automatically redirects the user to a fake site. Uses DNS protocol by locating an IP address.

Which is NOT an example of company confidential information?

A physical address

Which non-repudiation mechanism can prove that the user was an author of a document?

A physical or digital signature A physical or digital signature can be used to prove that a user was an author of a document. These are used for many written documents, including emails and source code. A video surveillance camera can prove that someone was in a particular area, but it cannot prove that a user authored a document. A biometric authentication device can prove that a user was genuinely operating an account, but it cannot prove that a user authored a document. A token or receipt can prove that a product or service was requested, but it cannot prove that a user authored a document.

add-on

A piece of software designed to enhance the capabilities of another piece of software.

What is the authorization concept known as least privilege?

A principle stating that a user should be granted rights necessary to perform a job and nothing more

What is the authorization concept known as implicit deny?

A principle stating that access requires explicit authorization and everything else is rejected

Captive Portal

A technical solution that forces clients using web browsers to complete a specific process before it allows them access to the network. (Authentication)

Where can you find the product key and serial number for your licensed computer?

A product key will be a long string of characters and numbers printed on the box or disk case. It may display when the application starts for the first time, and it can be accessed using the About option on the Help menu.

Bloatware

A program that uses an excessive amount of disk space. (i.e. games, instant messaging programs, etc.)

What should you expect to happen when double-clicking a .msi file?

A program will begin installing.

Transport Layer Security (TLS)

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

Multipurpose Internet Mail Extensions (MIME)

A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.

When set in your browser, what can be configured to act as a firewall and apply other types of content filtering rules?

A proxy server can be configured as a firewall and apply other types of content filtering rules. Some proxy servers work "transparently" so that clients can use them without any extra configuration of the client application. Other proxies require that client software, such as the browser, be configured with the IP address and port of the proxy server.

proxy server

A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. The proxy server may exist in the same machine as a firewall server or it may be on a separate server, which forwards requests through the firewall. An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. A proxy can also log its interactions, which can be helpful for troubleshooting.

Proxy Settings

A proxy server mediates connections between two or more computers, acting to increase both security and privacy in the network. The proxy can either exist as a dedicated server running special software or as just an application running on a generalized machine. There are many ways to configure a proxy server, and an administrator can use them to block content to a network, cache data to increase transfer speeds or to bypass filters.

Why is a query an important tool in database processing?

A query allows a user to extract only the data needed from a database by selecting specific rows and columns from a table.

Why do a report and a query work well together?

A query can be used to extract only the data based on specified criteria, while a report can format and summarize the data making it easier to read and interpret.

What is the relationship between queries and reports?

A query selects and retrieves the correct data, whereas a report formats and summarizes the output.

What is an example of a digital product?

A video download

Mail Exchanger (MX) Record

A record used by e-mail servers for determining the host names of servers responsible for handling a domain's incoming e-mail.

register

A register is a temporary storage area available to the different units within the CPU. The result of the executed instruction is written back to a register or to memory.

An attorney uses a standard form to capture information about new clients. Which type of database would best suit those needs?

A relational database

direct access

A retrieval method in which data can be retrieved without the need to read and discard other data.

How is a script different than a program?

A script is generally smaller and targeted at completing a specific task.

What is a captive portal?

A secure login page presented to a client after connecting to an open access point

In which of the following scenarios is multifactor authentication being used?

A secured room requires a user to swipe an ID badge and then type in a PIN code.

Access Control

A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it.

What is a program BEST described as?

A sequence of instructions for your computer to perform

programs

A sequence of instructions that can be executed(performed) by a computer. A program is also known as software.

What is a Service Set Identifier (SSID) and how is it used?

A series of alphanumeric characters used to identify a WAP and all the devices attached to it

Near Field Communication (NFC)

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. Near Field Communications, peer-to-peer version of RFID; that is, an NFC device can work as BOTH tag and reader to exchange info with other NFC devices. Works at up to 2 inches with rates of 106, 212, and 424 Kbps

airplane mode

A setting within a mobile device that disables the cellular, Wi-Fi, GPS, and Bluetooth antennas so the device cannot transmit signals.

Pre-Shared Key (PSK)

A shared secret that has been previously shared between parties and is used to establish a secure channel. Used on SOHO networks.

How much storage space is consumed by the Boolean data type?

A single bit. Boolean values are a special numeric data type which indicate that something is either TRUE or FALSE, represented with a binary 1 or 0, and consume only a single bit of storage space.

How much storage space is consumed by the character data type?

A single byte

How is binary notation expressed?

A single digit in a range from 0 to 1 is used. This number represents an on or off state. Each column is worth two times the column to its right. This is also known as base 2.

Sony/Philips Digital Interface (S/PDIF)

A single-pin RCA phone jack for transferring digital audio from CD and DVD players to amplifiers and speakers. (3)

script

A smaller piece of code than a program. A script is generally targeted at completing a specific task., whether that task is based within a web-based application or is used by a network administrator to perform a repetitive administrative task.

Mini DisplayPort

A smaller version of DisplayPort that is used on laptops or other mobile devices.

relational database management system (RDBMS)

A software program in which data is organized as a collection of tables, and relationships between tables are formed through a common field.RDBMS keeps a transaction log.

Adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

Thermal paste

A special compound used between CPUs and heat sinks. It fills in microscopic gaps and helps draw heat from the CPU into the heat sink where it is dissipated.

container

A special type of identifier that can reference multiple values(or elements). Ex:array

constant

A specific identifier that contains a value that cannot be changed within the program. the value is constant Ex: Screen dimensions or resolution.

RTF (Rich Text Format)(file format)

A standard file type for text filesthat contain the basic formatting info like font, font size, styles lik bold,italic underline. Useful when you don't know what word processor someone has - send it as an RTF and they will likely be able to read it.

What is the difference between a standard and a procedure?

A standard is a measure by which to evaluate compliance with policy. A standard is a measure by which to evaluate compliance with policy, which is not the same as a procedure: an inflexible, step-by-step listing of the actions that must be completed for any given task. A procedure is not a measure by which to evaluate compliance with policy; this describes a standard. For areas of policy where there are no procedures because the situation has not been fully assessed, there are guidelines, not standards or procedures, which provide guidance. Guidance may also describe circumstances where it is appropriate to deviate from a specified procedure, so the procedure does not provide guidance when a situation has not been fully assessed.

Super VGA (SVGA)

A standard set by the Video Electronics Standards Association (VESA) for a CRT monitor that includes a minimum refresh rate of 70 Hz and a minimum resolution of 800 x 600. up to 8 bit color.

Subroutine

A subordinate routine; specifically, a sequence of computer instructions for performing a specified task that can be used repeatedly.

Which type of device connects computers together in an Ethernet Local Area Network (LAN)?

A switch connects four or eight computers together in a Small Office Home Office (SOHO) Ethernet LAN using RJ-45 network ports and twisted-pair cabling.

os backups

A system backup is the process of backing up the operating system, files and system-specific useful/essential data. Backup is a process in which the state, files and data of a computer system are duplicated to be used as a backup or data substitute when the primary system data is corrupted, deleted or lost.

Which statement is NOT true regarding the relationship between a table and its components?

A table always has the same number of columns as it has rows.A relational table has one row for each entity. For example, if there are five pets in a "Pets" table, it will have five rows. It will have as many columns as it needs to describe each pet. Although it is possible to have an equal number of rows and columns, it will not ALWAYS be equal.

How is a relational table structured?

A table is made up of rows and columns, where all of the rows include the same columns.

RAID 5 (Striping with Parity)

A technique that stripes data across three or more drives(disks) are combined into a single logical drive. And uses parity checking, so that if one drive fails, the other drives can re-create the data stored on the failed drive. RAID 5 drives increase performance and provide fault tolerance. Windows calls these drives RAID-5 volumes.

Thin Film Transistor (TFT)

A technology for LCD displays in which transistors are positioned at each pixel. (3)

Cascading Style Sheets (CSS)

A technology that allows greater style definition and formatting control of HTML elements. Formatting can be placed within the HTML or called remotely from an external style sheet.

Write Once Read Many (WORM)

A technology to write data onto a storage medium and which does not permit changes

sandbox

A testing environment that isolates untested code changes and outright experimentation from the production environment or repository, in the context of software development including Web development and revision control

Which non-repudiation mechanism proves that a user requested a product and that it was delivered?

A token or receipt

Which of the following is NOT an example of Personally Identifiable Information (PII)?

A trade secret Personally Identifiable Information (PII) is data that can be used to identify, contact, or locate an individual. In cases of identity theft, PII is used to impersonate a victim. A trade secret is a piece of company confidential information and does not relate directly to an individual. A date of birth is considered PII because it can be used to identify a person. A mailing address is considered PII because it can be used to locate an individual. A Social Security number is considered PII because it can be used to identify a person.

Spyware

A type of Malware that locates and saves data from users without them knowing about it. Result of a virus or worm infection, Tries to track everything you use the computer for.

Dynamic RAM (DRAM)

A type of RAM. DRAM stores each data bit as an electrical charge within a single bit cell. The electrical charge gradually dissipates, causing the memory cell to lose its information. In order to preserve the information, dynamic memory has to be refreshed periodically by accessing each cell at regular intervals.

png (Portable Network Graphics) (image file)

A type of graphics file format similar to, but newer than, GIF or JPEG full-color 24-bit lossless format designed to replace GIF. it also supports transparency.

data restoration

A type of information protection scheme that enables you to recover stored copies of critical files and folders from another medium.

(EMI) electromagnetic interference

A type of interference that may be caused by motors, power lines, televisions, copiers, fluorescent lights, or other sources of electrical activity.

host firewall

A type of software firewall installed on a host and used to protect the host from network-based attacks.

SSID (Service Set Identifier)

A unique character string used to identify an access point on an 802.11 network.

Internet Protocol (IP) address

A unique set of numbers assigned to a specific computer that is connected to the Internet. This is similar to a house's street address.

What is a weakness of password managers?

A user must trust that the application storing the passwords is secure and cannot be cracked.

Which of the following examples illustrates a successful phishing attack?

A user replies to an email with his bank account number because the message indicated he was required to do so.

During program execution, a value changes and returns a new value to be used. Which type of identifier is this?

A variable

Which is NOT a characteristic of a variable?

A variable is not a fixed value, but instead one that can change during the execution of the program. Every time you assign it a new value, the variable retains that value until it is modified again.

In which situation would you use a vector?

A vector should be used when a container is needed that can grow or shrink in size as elements are added or removed. A vector is best defined as an identifier for a group of variables of the same type. The number of possible elements in a vector can vary during program execution.

A web application is client/server software that uses a web server as its server and what type of software as its client?

A web browser

Which example uses single-factor authentication?

A website requires a username, a password, and a PIN number.

How can you confirm that you have properly configured a Small Office Home Office (SOHO) wireless router?

A wireless client can connect to the router.

WLAN (Wireless Local Area Network)

A wireless local area network (WLAN) is a wireless distribution method for two or more devices that use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection. several versions include 802.11a and 802.11b with data rates of 54 Mbps and 11Mbps. A WLAN is sometimes called a local area wireless network (LAWN).

What type of Network Interface Card (NIC) uses the 802.11b protocol?

A wireless network (Wi-Fi) card

What type of device would use Radio Frequency (RF)?

A wireless router

After a computer starts up, when does the firmware or BIOS (Basic Input/Output System) run?

After the computer completes initial checking for hardware errors

What does a file management system use to control permissions for who is allowed to read, write, or control an object?

An access control list (ACL)

You've been tasked with changing the primary key in the Customer table from the CustID field to the AcctNum field. Which Data Definition Language (DDL) command can do that?

ALTER TABLE

Rule-Based Access Control

An access control model that based on a list of predefined rules(policies) that determine what accesses should be granted

(ASCII)American Standard Code for Information Interchange

ASCII (American Standard Code for Information Interchange) is the most common format for text files in computers and on the Internet. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of seven 0s or 1s). 128 possible characters are defined.

What are the two common ways of presenting character set data?

ASCII and Unicode are the most common character sets used to present data

Data persistence

Ability of a program to *save data* and *return to it and reload it* when it is run.

AGP

Accelerated Graphics Port, PC architecture is based on one of PCI (Peripheral Component Interconnection), PCI with AGI, or PCI Express (PCIe). Used for old graphics adapters only with a bandwidth of 2133 MBps.

AGP:

Accelerated Graphics Port, PC architecture is based on one of PCI (Peripheral Component Interconnection), PCI with AGI, or PCI Express (PCIe). Used for old graphics adapters only with a bandwidth of 2133 MBps.

What does Remote Desktop software allow you to do?

Access and control a different computer via the Internet

Logging events in an audit log is what part of the access control system?

Accounting

What business software supports financial and commercial functions, such as order processing and payroll?

Accounting software

What business software supports financial and commercial functions, such as order processing and payroll?

Accounting software is specifically designed to support financial and commercial functions, such as order processing, accountancy, and payroll.

What type of cooling system would be best in a high-performance overclocked computer system?

Active liquid cooling

What should you do when you suspect that there are multiple issues to troubleshoot?

Address each issue individually.

Which type of account would grant you complete access to a computer?

Administrator

For security purposes, what piece of information should be changed immediately when setting up a wireless router?

Administrator password Wireless routers each have a default administrator name and password. Skilled hackers are likely to know what these default settings are and will have an easy time hacking into the wireless network unless they are changed. The Internet access policy settings allow you to specify which days of the week and which hours of the day clients will be able to access the network. This may or may not be a concern for the wireless network. The wireless channel is the setting that allows you to change the frequency of the signal being broadcasted. This setting is ideal for performance modification, not security. The default SSID is an identifier that is broadcasted by the wireless access point. Changing the SSID is recommended; however, it is not an urgent security configuration.

AAC (audio format)

Advanced Audio Coding, developed from MPEG as a successor to mp3, widely supported

ARPA

Advanced Research Projects Agency, the OG research underpinning TCP/IP was performed in the late 60's and early 70's by them

What does the query SELECT * FROM Customers WHERE state = 'MN' return as an answer?

All fields in the "Customers" table, for those rows where the value of the state column is 'MN'

You submitted the following SQL command for a "Customer" table: DELETE FROM CUSTOMER. What happened next?

All of the records from the "Customer" table were deleted.

You submitted the following SQL command for a "Customer" table: DELETE FROM CUSTOMER. What happened next?

All of the records from the "Customer" table were deleted. Without a WHERE clause to specify which rows should be deleted, all of the rows would be deleted. Adding a clause like "WHERE state = 'MN'" would cause only the rows with Minnesota customers to be deleted. Once the command is submitted, SQL will not automatically double-check to see if you have completed your command. The DROP command would need to be used to delete the structure of the table so that there's no longer a schema. No error message was returned since the command was valid.

data type

All values in a programming language have a "type" - such as a Number, Boolean, Integers, Floating-point numbers, Characters, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5"

A software firewall that is capable of content filtering can perform what action?

Allow or deny specific attachment and payload types, keywords, and file formats If a firewall is capable of content filtering, then it will be able to allow or deny specific attachment and payload types, keywords, and file formats. Windows Defender Firewall is an example of a software firewall integrated with Windows 10. Stateful inspection refers to the ability to monitor an entire session of Transmission Control Protocol (TCP) or User Datagram Protocol (UDP). Packet filtering refers to the ability to perform stateless inspection of each individual packet against a pre-defined rule set. Proxying refers to the ability to place the client session on hold while retrieving content on behalf of the client.

custom installation

Allowing user to decide which features of the software he wants to install in a computer's hard drive

patent

Allows you to protect an idea or invention without even having to create it

RAID 1 (mirroring)

Also called mirroring, this RAID array type provides fault tolerance because all the data is written identically to the two drives in the mirrored set.

What type of file extension should be opened with caution, as it initiates instructions for the computer to carry out?

An .exe is an executable file that launches a program or application. Many email applications restrict users from sending or receiving files with an .exe extension, as they have been known to carry viruses.

Role-Based Access Control (RBAC)

An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization

Where can an employee look to find details about privacy and monitoring of a corporate network?

An Acceptable Use Policy (AUP) An Acceptable Use Policy (AUP), or Fair Use Policy, outlines the allowed uses of a particular service or resource. Agreeing to the AUP typically means you consent to be monitored. An End User License Agreement (EULA) explains the terms of a software license and governs how the software may be used. A Standard Operating Procedure (SOP) is an inflexible, step-by-step listing of the actions that must be completed for any given task. A contract of employment may set out what an employee must agree to as a condition of employment. For example, the employee must agree to abide by the acceptable use policy.

What type of central processor would you find in a mobile phone?

An Advanced RISC Machine (ARM) Central Processing Unit (CPU)

What type of central processor would you find in a tablet?

An Atom brand Central Processing Unit (CPU)

What type of connector would you use to connect a wired router to an Ethernet network?

An Ethernet network adapter used with twisted pair cable will have an RJ-45 port to connect the computer to the network, via another RJ-45 port in the network equipment.

Ethernet Switch

An Ethernet switch is a device for connecting multiple Ethernet devices together. A switch works at the data link layer (layer 2) of the OSI Model. The Ethernet switch will learn the MAC addresses of the attached nodes - this allows the switch to send data to only one attached node (or the correct attached node) when data is received by the switch.

What is the function of an IF conditional statement in code?

An IF conditional statement means that part of the code executes only when certain conditions are true (another part of the code can execute when the condition is false). This statement can be used when information needs to be processed for a variety of different outcomes.

Which of the following is NOT a valid IP address?

An IP address is used to logically identify each device (host) on a given network. The address is either a 32-bit binary value (IPV4) or a 128-bit binary value (IPV6). In IPV4, the IP address is broken into four 8-character binary values called octets. This results in a decimal value between 0 and 255 within each octet. In this question, the IP address 192.168.1.256 is NOT valid because the decimal value must be between 0 and 254.

cloud storage

An Internet service that provides remote storage to computer users.

system identifier (SID)

An SID, short for security identifier, is a number used to identify user, group, and computer accounts in Windows. SIDs are created when the account is first created in Windows and no two SIDs on a computer are ever the same. The term security ID is sometimes used in place of SID or security identifier.

IPS (Intrusion Prevention System)

An active, inline security device that monitors suspicious network and/ or system traffic and reacts in real time to block it Also called a Network Intrusion Prevention System (NIPS).

User Datagram Protocol (UDP)

An alternative to TCP that achieves higher transmission speeds at the cost of reliability.A connectionless transport protocol. Connectionless transport protocols provide unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs.

video graphics adapter (VGA)

An analog style of monitor connector that uses a 15-pin D-sub connection.For the monitor to display images it needs to be connected to the system unit of the PC, and that is achieve by use of a connector. It is used to connect to the analogue monitor. A DE 15 pin connector is the main VGA connector used. The VGA adapter comes with the female port while the cable has the male pins for connection. Below is the cable side of connector. Since the cable has 15 pin which can be inserted in the adapter female part what you need to do is align the two parts and push in. Don't force the cable because you may break the pins. If it is not getting in check and align until the pin moves smoothly in. Using the screw in the cable side tighten the cable to the adapter to make sure it don't move or get loose has you continue using it.

Software Token

An app, or other software that generates a token for authentication. Can be stored as web cookie. a software token ca be replayed.

Video Teleconference (VTC)

An application that allows people to communicate in video and voice. Configure in virtual meeting rooms. Screen sharing.

array

An arrangement of objects in equal rows. Ex: say that you want your program to store a list of user names who have logged on to the computer in the last 24 hours.

What is a social engineering attack?

An attack that depends on human factors and deception rather than technology A social engineering attack involves the use of deception and trickery to fool unsuspecting people into providing sensitive information or violating a security protocol. Social engineering depends on human factors and gullibility to get people to comply with a request that appears to be legitimate. Attackers who engage in social engineering tactics are interested in gaining access to sensitive data or restricted areas and are typically not interested in physically harming the victim. Social engineering attacks may leverage social media as a platform for communicating with a victim; however, they do not depend on code that runs in the background of social media applications. Social engineering attacks do not depend on the use of code that runs on the machine of the intended victim.

Phishing

An attack that sends an email(looks like an offical-looking email but fake in attempt to reveal confidential information) or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Which scenario is an example a stealing a password via a brute-force attack?

An attacker uses password-cracking software to attempt every possible alphanumeric password combination.

What is rule-based access control?

An authorization access model in which access is based on policies that are non-discretionary

What is Role-based Access Control (RBAC)?

An authorization access model that groups users based on administrative or job functions

Command Line Interface (CLI)

An interface that accepts text commands at a prompt, usually for immediate execution with immediate display of output.

Which of the following describes Mandatory Access Control (MAC)?

An authorization access model that has security clearance levels or compartments The Mandatory Access Control (MAC) model uses security clearance levels (if using a hierarchical model) or compartments (domain-based model). Each object and each subject is granted a clearance level, referred to as a label, and given access for that level and all levels below, or if they belong to the same domain. Access based on policies that are non-discretionary is characteristic of an authorization access model that is rule-based, such as Role-Based Access Control (RBAC). Grouping users based on administrative function and assigning a template of permissions is characteristic of an authorization access model such as RBAC. An owner acting as the central authority with full control over who can access a resource is characteristic of an authorization access model called Discretionary Access Control (DAC).

Which of the following describes Discretionary Access Control (DAC)?

An authorization access model that stresses the importance of the owner who has full control over the resource

Which statement about an embedded operating system is true?

An embedded system is a computer system or appliance designed for a very specific function.

unencrypted

An encryption is a secret code given to information when it is passing through the internet. An unencrypted piece of data can be seen by anyone; it is less secure.

TKIP (Temporal Key Integrity Protocol)

An encryption key generation and management scheme used by 802.11i.

Return on security investment (ROSI)

An estimate of return on security investment based on how much will be saved by reduced losses divided by the investment. To calculate ROSI, you perform Risk Assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur.

Sound Card

An expansion card that attaches to the motherboard inside the system unit and that enables the computer to produce sounds by providing a connection for the speakers and microphone.Adapter card that has several ports that converts digital signals to audible sound, and also the reverse. Common devices that connect to the ports include microphones, speakers, and joysticks.

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.

zero-day exploit

An exploit that takes advantage of a software vulnerability that hasn't yet become public, and is known only to the hacker who discovered it. Zero-day exploits are particularly dangerous because the vulnerability is exploited before the software developer has the opportunity to provide a solution for it.

FTPS (File Transfer Protocol Secure)

An extension of FTP that uses SSL or TLS encrypt FTP traffic. Some implementations of FTPS use ports 989 and 990

Where is it recommended that data be backed up?

An external device or digital media

critical data

An indicator that is clearly more significant than other data. This increases the probability for accuracy.

keyboard

An input device that enters data with letters, numbers, symbols, and special function keys. Uses the ps/2 (purple color, 6 pins)

branch

An instruction to your computer to execute a different sequence of instructions.With branching, the program enters a new path based on a new sequence of instructions.

Which type of backup medium protects you from a catastrophic natural event in your area?

An offsite repository An offsite repository protects you from a catastrophic natural event in your area. Natural catastrophic events include disasters such as fires, tornadoes, hurricanes, floods, and earthquakes. These types of events are capable of wiping out the information infrastructure of an entire facility. During a catastrophic natural event, a local NAS device would also be destroyed, since it is physically located onsite. An external drive connected to a PC would be destroyed during a catastrophic natural disaster. Offsite backup options protect data during natural disasters. Digital media is any form of electronic storage. Digital media will also be destroyed during a natural disaster if it is stored onsite.

Hierarchical File System (HFS)

An older Mac OS file system, consisting of directories and subdirectories that can be nested.

Cold Cathode Fluorescent Lamp (CCFL)

An older backlighting technology that uses one or two fluorescent tubes to light a monitor panel. A CCD is composed of picture elements (pixels) that generate an electrical charge in proportion to the intensity of light shined on them. This is used to create a digital image.

When a file is hosted on a network that can be accessed by users signing in, where is it located?

An online workspace

Video Electronics Standards Organization (VESA)

An organization that created several PC standards, including the VGA (video graphics array) connector. (3)

Fiber to the Home (FTTH)

An up-and-coming technology that promises even higher speeds than DSL which provides a direct fiber optic connection to homes. (Verizon's FIOS)

What is a hotfix?

An update that is typically issued on an emergency basis to address a specific security vulnerability

Which of the following is an open source mobile operating system?

Android

What type of utility software is intended to keep users safe from malicious code, such as viruses or Trojans?

Anti-malware

Name Server

Any computer holding records for a part of the namespace is said to be a name server. Name servers that contain the requested resource records for particular namespace are said to be authoritative.

Who created Mini DisplayPort?

Apple

OSI Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

productivity software

Applications designed to help individual computer users complete typical office tasks more efficiently. Examples are word processors, spreadsheet programs, and database applications.

For which reason would you use a Bluetooth Class 1 device with a range of 100m?

As an industrial application

What is the most important question to ask a user when trying to determine what a problem is, and why?

Ask "What has changed?" because the thing that has changed is usually responsible for the problem.

What is one method companies use to collect data from desktop apps?

Asking users for permission to send "usage and troubleshooting" data back to the vendor for analysis

authorized user control

Authorized users may have certain account management privileges, depending on the particular card issuer. You, as the primary cardholder, may be able to give or take away some permissions

Which of the following is a key aspect of a fault tolerant system?

Avoidance of single points of failure A key aspect of fault tolerant systems is that they avoid single points of failure. This is accomplished by designing and implementing data, network, and power redundancy. A system with a high cost to implement and operate may or may not be fault tolerant. High cost does not equate to fault tolerance. Having enough people on staff with the right skills is a good starting point; however, that alone does not make a system fault tolerant. Contingency plans can help systems recover from a problem and are part of the overall business continuity plan. A fault tolerant system can be thought of as a system that can bend without breaking. A contingency plan is enacted in response to a break.

BIOS

Basic Input/Output System provides industry standard firmware that operates the essential components of the PC and ensures the design of each manufacturer's motherboard is PC compatible

What does Internet Message Access Protocol 4 (IMAP4) allow a user to do that Post Office Protocol 3 (POP3) does not?

Because IMAP4 stores emails on the server end as opposed to the client end, it allows users to access the same email from many different devices. This means that when you check your email from a different laptop or mobile device, you see the same messages.

How much storage space is consumed by the integer data type?

Between 1 and 8 bytes

How much storage space is consumed by the floating point number data type?

Between 4 and 8 bytes

When data is transferred between components in the computer or between computers over a network, the throughput rate is measured in what unit?

Bits per second (bps)

CD-RW (compact disc rewritable)

CD technology that accepts multiple reads/writes like a hard drive.A CD that can be written to multiple times.

AMD

CPU vendor such brands like Ryzen, Threadripper, Epyc

CPU vendors such brands like Core, Pentium, Celeron, Atom, Xeon

CPU vendors such brands like Core, Pentium, Celeron, Atom, Xeon

Which is the correct sequence in the process of database creation?

CREATE DATABASE CREATE TABLE INSERT INTO

Adding a new relational database, table, or index is a function of which Data Definition Language (DDL) command?

CREATE. A new database, table, or index is added with the CREATE command: CREATE DATABASE adds a new database, CREATE TABLE adds new tables to the database, and CREATE INDEX adds an index to the tables, by specifying one or more columns which will be used for faster searching and sorting.

Which of the following is NOT a compiled programming language?

CSS (Cascading Style Sheets) are utilized in front-end web page development to style HTML elements. They are neither compiled nor do they need to be converted to machine code.

fiber-optic cable

Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive.

What activities must one preform to make data- driven business decisions?

Capture data, correlate the data, and convert it to meaningful reports.

PCIe 3.0

Card - Each lane offers 1GBps x16

PCIe 2.0

Card - Each lane offers 500MBps x16

multi card readers

Card reader that is attached to a computer and can read many form factors of solid state memory -USB 2.0 for desktops; often built-in to laptops -EX: can read camera SD cards, Sony voice recorder Memory Stick, etc

Which is the most important processor on a motherboard?

Central Processing Unit (CPU)

What step should be performed as early as possible when configuring a wireless access point?

Changing the default password

What is a best practice that you can use to protect your password?

Changing your password every 60 to 90 days

plain text vs ciphertext

Ciphertext is the output of an encryption process, and the input of a decryption process while plaintext is information in human readable form. Cipher text is written in encrypted form and people can't understand or decode it while plain text is just normal text written in any human understandable language like English. Plaintext is an input for an encryption algorithm and can be in form of text, audio, video and also images.

packet transmission

Circuit switching gives you a dedicated, pre-routed, path between the two parties; packet switching breaks up the message into packets and routes them all independently throughout the network. In theory, packet switching allows many more users to be on the network at the same time.

Two-tier

Client server application seperates the database engine , or backend or data layer, from the presentation layer and the application layer, or business logic.

What type of application delivery method requires the least amount of infrastructure from the client?

Cloud-hosted

Collectively speaking, screen sharing, video conferencing, instant messaging, and email are examples of what type of software?

Collaboration software

What type of flat file contains plain text with delimiters to set apart the columns?

Comma Separated Values files are commonly used flat files, identifiable by the file extension .csv. Its a flat-file that contains plain text with delimiters. They can easily be used to load database tables when they are designed so that the columns in the file match up with those in a database table.

Comma Separated Values (CSV)

Comma Separated Values files are commonly used flat files, identifiable by the file extension .csv. They can easily be used to load database tables when they are designed so that the columns in the file match up with those in a database table. CSV file uses commas to identify the end of a column and a line feed for each row. (Flat File Systems)

Which object is NOT utilized by Object-Oriented Programming (OOP)?

Command

Windows PowerShell

Command-line tool included with Windows. Offers a number of powerful scripting tools for automating changes both on local machines and over networks.

Modem

Communications hardware device that facilitates the transmission of data.

adapter

Communications pathways are implemented using an adapter installed in the host to transmit and receive signals and network media between the interfaces to carry the signals.

Line of Business (LOB) functions

Company commission custom-made software to implement LOB functions. Cover functions that cannot be performed by off the shelf software.

What are the expectations of privacy when using business software within a company?

Company policy is used to clarify the complete lack of privacy when using business software at work. The balance between peoples' rights to privacy and a company's legal need to monitor networks is often handled through company policy or a contract of employment. These documents are used to clarify that employees do not have privacy when using corporate networks and business software. Although employees may have certain rights, they agree to the conditions outlined in their company's policy, which ensures that the company can monitor employee communications. Both corporate networks and business software are monitored according to a company's policy and appropriate use guidelines. Companies monitor all traffic and have tools that flag employees who violate policy or law.

What critical point must be considered when building a "smart" or "digita"" home automation solution?

Compatibility between the networking or communication standards supported by the hub and the appliances

How do compilers and interpreters respond to comments in your code?

Compilers and interpreters ignore comments. Comments are part of the programming code that are not executed by the computer but help the developer read and maintain the code. Comments also make the source code easier to read by other developers.

Why is it important to compile code before executing it?

Compiling is the process of converting source code into machine code, which can then be executed directly by the Central Processing Unit (CPU).

If you need to deliver several files to someone via email, what type of software would you use to bundle them into a single package for easy transmission?

Compression

What type of software allows you to reduce the size of files for the sake of transferring them from one location to another?

Compression

What technique would a hacker use to target the availability of network services?

Compromise hosts with bot malware to launch a coordinated attack that overwhelms a web service

What is a symptom of a computer's power supply beginning to fail?

Computer reboots randomly, usually on startup.

Patching and Updating

Computers should be set to receive patches (fixes for programs) and updates (especially for security updates) on a regular basis. Most home and small business devices will get their updates through Windows Update. Corporate networks will often use Windows Server Update Services (WSUS) and/or System Center Configuration Manager (SCCM) to distribute patches and updates. The Microsoft Baseline Security Analyzer (MBSA) can check a system for security settings and needed patches

What type of license allows only a set number of users to access it at any one time?

Concurrent

How can you ensure that an operating system is always kept up to date on all Windows client devices in your network?

Configure Automatic Updates to download and install as soon as they are available.

What can you do to prevent your account from being hacked by repeated guessing attempts?

Configure account lockout.

How can an administrator help make sure that a stolen password cannot be misused indefinitely?

Configuring a password expiration period Users who have had their password intercepted by others may not be aware of it. To make sure that a stolen password has a limited window of use, an administrator can configure passwords to expire after a certain period, such as 60 or 90 days. Configuring session timeout would merely require the attacker to enter the same stolen password more often. Disabling SSO will not prevent a hacker from using someone else's password indefinitely. It would simply require the attacker to enter it for each system accessed. Setting strict password requirements might make it more difficult for a password to be stolen, but it would not do anything to limit the amount of use that an attacker gets from it once it has been hacked.

Local Area Network (LAN)

Connects a group of computers in close proximity, such as in an office building, school, or home. network in a single location

how should you approach troubleshooting when there are multiple levels of work?

Consider multiple approaches, prioritize each level, and divide and conquer.

What should you do before you put a plan into action?

Consider the possible outcomes of the fix action.

object-oriented programming

Creating recognizable things within the code and making them interact through defined methods makes the code easier to maintain and update.

A database administrator is considering adding a primary key to enforce unique rows, defining a format for a phone number, and adding a rule so that a user must enter a date prior to today. What is the administrator adding to the database?

Constraints. There are many kinds of constraints that can be used to make sure the data entered into the database is as accurate as possible. A constraint is like a rule or a law that the DBMS enforces for you.

Variable

Contains a value that can change during the execution of the program.

printed circuit board (PCB)

Contains built-in processors(the chipset), sockets and slots for upgradable components (CPU, RAM, adapter cards, disk drives) and wires(buses)to connect to them. a thin board made of fiberglass or other laminate material on which conductive pathways are "printed", connecting different components on the PCB, such as transistors, resistors, and integrated circuits.

In the Windows operating system, where do you navigate to when you want to install new operating system features?

Control Panel

Interpreter Language

Converts a program written in a higher level language into a lower level language and executes it, beginning execution before converting the entire program. Ex: JavaScript,Perl, and Python

Copying vs moving files

Copying- CTRL+C to copy or right-click and select copy, when you find where you want to drop it you can use CTRL+V or right-click and select paste. Moving- simply select which folder or file you want, left-click and drag it to where you want to move it

Trademark

Copyright to protect a name or logo

Which brand of Central Processing Unit (CPU) would be found in a laptop?

Core Duo

How can you implement access control/protection on your computer?

Create ordinary user accounts for day-to-day access to the computer.

CRUD

Create, Read, Update, Delete An acronym used in database development that stands for

What security practice can a company use to protect its valuable data from catastrophic natural threats?

Creating backup data on servers in other facilities across the country

What fault tolerance technique can allow quick recovery during power outages and network failures?

Creating dispersed redundant data centers and replicating information in real time A fault tolerance technique that can keep critical services online during power outages and network failures involves creating a geographically separate (dispersed) redundant data center and replicating information in real time. This alternate site is known as a hot site. Creating a redundant data center and shipping backup tapes to that location can allow for business continuity, but it will take time to restore backups from tape, thereby not facilitating quick recovery. Replicating information between servers within the data center will protect from isolated hardware failure, but not power outages. Co-locating data centers defeats the purpose, as a fire or other natural disaster will affect both centers. Ideally, the data centers would be geographically separate, or dispersed, so a natural disaster in one area will not affect the other data center.

You are designing a "Customer" table in a relational database. Which of the following fields would be the best candidate for a primary key?

CustomerNumber. The primary key must be able to uniquely identify each customer from all other customers. In past decades, social security numbers were used for that purpose. Now, a good database designer would create a CustomerNumber field to use as the primary key and generate unique numbers for each customer.

SDRAM (synchronous DRAM)

DRAM that is synchronous, or tied to the system clock. This type of RAM is used in all modern systems. It has a 64-bit data bus, meaning that in each clock cycle, 64 bits of information can be delivered to the CPU.

Data Manipulation Language (DML)

DBMS language that changes database content, including data element creations, updates, insertions, and deletions

What is the difference between the DELETE and DROP commands in SQL?

DELETE deletes rows from a table, whereas DROP eliminates the entire table.

What type of network technology would use DOCSIS?

Data Over Cable Service Interface Specification (DOCSIS) is a specification used in systems that provide Internet across Cable Access TV (CATV) lines.

What is computer information theft?

Data Theft Definition. The unauthorized taking or interception of computer-based information. Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.

Which of the following statements best describes data persistence?

Data in memory is lost once the processing is completed. Data in a database is stored persistently and securely so that it can be used again in the future.Persistent data is data that is stored permanently in a database. A copy of the data may be loaded into memory at processing time and lost when processing is complete, but the original data is safely stored in the database.

frames

Data in the link layer is packaged in a unit called a frame. (OSI)

Transport encryption protects data that is in which state?

Data in-transit

data link prevention

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

Data capture and collection

Data points can be collected from many different sources.

digital light processing (DLP) projector

Data projector that uses tiny mirrors to reflect light, which produces crisp, bright, colorful images that remain in focus and can be seen clearly, even in a well-lit room.

Which is the BEST example of importing data to populate a database?

Data records that are already stored in a digital format can be loaded directly into a database.The database expects to receive data in a digital format. Importing data is the process of copying existing digital data that is already stored on another device and pasting it into the database.

What is the process of recovering stored copies of critical files and folders from another medium?

Data restoration

Why do computers save or write data to a storage device?

Data running on a system memory is only preserved while the computer is powered up.

data in transit (or data in motion)

Data that is in transit across a network, such as an email sent across the Internet via HTTPS(443)

Data at rest

Data that is stored on electronic media. stored in persistent storage media.

What type of software is Microsoft SQL?

Database application

What is the term used for the file that includes a copy of the database along with the schema?

Database dump is the term used for a copy of the database or table schema along with the data records—all expressed as SQL CREATE and INSERT statements. The dump is used to create an exact duplicate of the database structure and load an exact copy of the data from the original database.

When processing large numbers of transactions, how does processing speed compare between databases and flat file systems?

Database processing speeds are much faster than flat file speeds.

query language

Designed to retrieve specific records from a data set. The code does not need to be compiled. Ex: Structured Query Language(SQL)

What are the steps in the process of creating a database?

Determine how the database will be used by clients, where it will be hosted, and what information it will store.

Once a theory is confirmed, meaning that you have found the root cause of a problem, what should you do next?

Determine the next steps to resolve the problem.

Non-Relational Databases

Developed to handle large data sets of data that is not easily organized into tables, columns, and rows

Where do you manage drivers on a computer?

Device Manager

What is the process of disabling unused services and default guest accounts, renaming accounts, and setting up security measures (such as a firewall) on a system?

Device hardening

static environment

Devices in which additional hardware cannot easily be added or attached.

cryptographic hash(dictionary and brute force)

Dictionary-the software matches the hash to those produced by ordinary words found in a dictionary. Brute Force-the software tries to match the hash against one of every possible combination it could be.

DVI(digital visual interface)

Digital Visual Interface

You need to partition a disk into two separate drives. Where would you go to do this?

Disk Management

What type of device would you connect using a Digital Visual Interface (DVI) port?

Digital Visual Interface (DVI) is a high-quality digital interface designed for flat-panel display equipment. You would connect the DVI port to the corresponding port on the back of the monitor.

What type of device uses Digital Light Processing (DLP)?

Digital projector

What invention was created to try to enforce copyright protection on digital products?

Digital rights Management systems (DRM)

DVDR

Digital voice data recorder

DC

Direct current

If you purchase and install a third-party graphics card into your workstation, what should you do to ensure its proper operation

Disable the onboard graphics card.

What is the difference between business continuity and disaster recovery?

Disaster recovery creates workflows and resources to use when a specific scenario affects an organization. Disaster recovery creates workflows and resources to use when a specific disaster scenario affects an organization. For each high-risk scenario, the organization develops a plan identifying tasks, resources, and responsibilities for responding to the disaster. Disaster recovery includes prioritization of response activities, data restoration, and restoring access to users. Putting systems and working methods in place to be resilient to failure is part of business continuity. Creating workflows and identifying resources to respond to a specific scenario is part of disaster recovery. Creating contingency plans to mitigate vulnerabilities for system resiliency is part of business continuity planning.

You are notified that your computer has a worm that is actively replicating across the network. What should you do first?

Disconnect the network link

Who created DisplayPort?

DisplayPort was developed by VESA, the organization largely representing PC graphics adapter and display technology companies. It is a royalty-free standard intended to "complement" HDMI. It uses a 20-pin connector and allows connection with various types of devices.

What is a benefit of an Internet of Things-enabled (IoT-enabled) medical device?

Doctors and nurses can monitor a patient and potentially adjust dosage levels remotely.

After resolving a problem for a user, what can you do to help avoid similar problems in the future?

Document lessons learned and implement preventive measures.

What is the last step of the troubleshooting process?

Document your findings, actions, and outcomes in a knowledge base.

Which of the following is NOT a comment line special delimiter?

Dollar ($)

What term describes the threat of someone stealing hard copies that have been thrown out?

Dumpster diving

Dynamic Host Configuration Protocol (DHCP)

Dynamically assigns IP address information (for example, IP address, subnet mask, DNS server's IP address, and default gateway's IP address) to network devices.

dotted decimal notation

Each number represents a byte value, that is an eight-character binary value, also called an octet or a decimal value between 0 and 255. this is referred to as dotted decimal notation.

How is decimal notation expressed?

Each single digit is assigned one of ten values ranging from 0-9 whereby each column is ten times more than the digit to its right. This is also known as base 10.

Dynamic Rate Switching (DRS)

Each station determines an appropriate data rate based on the quality of the signal using a mechanism such as DRS.

Double Data Rate SDRAM (DDR SDRAM)

Electronic memory that operates at double the speed of SDRAMA type of memory technology used on DIMMs that runs at twice the speed of the system clock. Also called DDR SDRAM, SDRAM II, and DDR.A type of RAM that runs at twice the speed of the system bus.

What type of software helps you compose and send messages over the network?

Email client software

What is a privacy concern related to email?

Email is often not encrypted from end to end, meaning there is no privacy assurance. Expectations of privacy when using email should be relatively low. Due to the protocols used, email is rarely encrypted from end to end. This results in email being sent in plain text between various mail servers on the way to the destination. Even if using a secure, SSL encrypted email protocol like IMAP over port 993, email is still not considered private. This is because email is relayed between servers that do not always encrypt the data. When using a web-based email client, ensuring the connection uses HTTPS is important; however, that does not encrypt the email from end to end. An HTTPS session is between the client and the server only. Email is still routinely monitored by corporations to protect their interests; therefore, it is not a private mode of communication.

Database

Enable the user to store, orfanzie, and retrieve information.

Procedures and Functions

Enable you to create segments of code that you will reuse.

Unicode

Enables you to handle character data and express that data across platforms in a uniform way. There are a number of different Unicode encoding standards, including UTF-8,UTF-16, and UTF-32. UTF-8 is used by many websites.

What technique can be used to prevent eavesdropping on a data network?

Encrypting data in-transit Eavesdropping on a data network occurs when a malicious threat snoops or sniffs information as it travels across a network. To prevent eavesdropping, encryption is used to scramble messages in a way that only the intended recipient can unscramble. Digitally signing messages does not prevent sniffing because the data remains in plain text. Digital signatures are used to verify the authenticity of a message. Conducting user awareness training can teach users to use encryption; however, training alone will not prevent eavesdropping. Hashing passwords is a method used to change passwords to a non-human readable format that cannot be reversed. This safeguards passwords, but not data being sent over a network.

File level encryption

Encryption performed per file, where each file owner has a key.

Which of these is a hard drive interface standard?

Enhanced Integrated Drive Electronics (EIDE) was one of the early hard drive connection standards, although most modern computers use the Serial ATA (SATA) standard.

What action can help mitigate the risk of replay attacks?

Ensuring that applications use encryption and time-stamping to make certain that the tokens cannot be misused A replay attack occurs when a malicious actor captures another host's response to a server and replays that response in an effort to gain unauthorized access. This attack often involves exploiting an access token generated by an application. The application needs to use encryption and time-stamping to protect against this threat.

What action can be taken to help validate that software comes from a legitimate source?

Ensuring that driver software is digitally signed by the vendor Nearly all major companies use digital certificates to sign software applications and drivers. Digitally signing is a cryptographic process that verifies the integrity of the software or driver. A computer checks the authenticity of the signature before installing. Just because a website uses Hypertext Transfer Protocol Secure (HTTPS) for encryption does not necessarily mean that the software being retrieved is free from malware or other security threats. Installing software one computer at a time may still result in the spread of malware, as many variants do not immediately show signs of compromise. Although poor peer reviews of software may indicate a problem with an application or driver, having a high number of stars does not indicate the absence of problems.

During the troubleshooting process, what should you do if implement a solution but find that it didn't solve the problem as anticipated?

Establish a new theory or escalate.

You need to move the pictures from your digital camera to your computer. Which type of connection would NOT allow you to do this

Ethernet

SERVER OS

Ex- Windows Server, Linux or UNIX. It's based on similar code to its workstation OS equivalent. Includes software packages to run network services and use different licensing to support more users.

What type of consent is recommended prior to processing and/or storing customer confidential information?

Explicit consent, after explaining how the information will be used and/or stored Before processing and/or storing customer confidential information, it is recommended to obtain explicit consent after explaining how the information will be used and stored. Privacy laws dictate which type of consent is required, but generally, explicit consent is best. Implicit consent assumes that a customer will be okay with information being processed or stored. Implicit consent may be appropriate in some situations, but explicit consent is recommended. Opt-out consent requires customers to specifically decline consent and is common with many forms of Internet advertising. How a company processes or stores company confidential information may be considered part of normal business operations; however, explicit consent is recommended for customer information.

Which protocol is designed to upload and download files between clients and servers?

FTP(file transfer protocol)

What advantage does the File Allocation Table 32 (FAT32) have over the New Technology File System (NTFS)?

FAT32 provides the best compatibility between different types of computers and devices.

rogueware

Fake antivirus software. Also called scareware or ransomware.

Which is an availability-related factor to consider when choosing a third-party cloud service provider?

Fault tolerance When deciding which cloud provider to use, consider the options that they each provide for service availability and fault tolerance. A cloud provider with built-in redundancy and fault tolerance may reduce the impact of service outages, ultimately improving the availability of the resource.

RJ-11 (registered jack 11)

Fax modem uses twisted pair cabling with this connector at the fax end and a (telephone connector) connector suitable for use with the country's phone system at the other end. You are likely to encounter RJ-11 ports on the DSL(Digital subscriber Line) modem/router appliance used to connect a home network to the internet.

What type of fiber optic networking solution is widely deployed in urban areas?

Fiber to the Curb (FTTC) is a compromise solution widely deployed in urban areas. FTTC means that the telecom provider has installed a fiber network terminating at a cabinet somewhere in a nearby street.

File Allocation Table (FAT)

File Allocation Table, a type of file system used for older Windows and is preserved under Windows for compatibility, permits a max file size of 4gb and max partition size of 32gb

Portable Document Format (PDF)

File format for distributing documents. A format developed by adobe systems designed to preserve the visual appearance and layout of each page and enable fast viewing and printing.

What limitations should you consider when comparing different file systems?

File systems are limited in terms of their maximum capacity and the size of individual files.

Program Files

Files that are used in the running of software programs and that do not store data.

How do you fully remove a browser add-on or extension?

Find the location in which it was installed and remove it manually.

What type of software allows you to protect a network by denying specific types of incoming traffic?

Firewall

What is the purpose of firmware in an embedded system?

Firmware provides all the functions for interacting with the device hardware.

What fundamental data type is used to support decimal fractions such as 4.1, 26.4, and 5.62?

Floating point numbers or "floats" contain decimal points. In general, floating point numbers are represented approximately to a fixed number of significant digits and scaled using an exponent in some fixed base; the base for the scaling is normally 2, 10, or 16.

Your team is developing a program and would like to create a visual representation of how it works. Which type would be most helpful?

Flowchart

Which type of constraint is added to a table for the purpose of establishing a relationship with another table?

Foreign key

Extensible Markup Language (XML)

Format increasingly important for data storage, as it allows for a high level of integration between different types of systems

FLAC (audio format)

Free Lossless Audio Codec, achieves file size compression w/o discarding audio data not widely supported

What key role do functions play in both consistency and functionality?

Functions enable you to create segments of code that you will reuse. When using a function, you call the function and its value. Once that value is determined, it is then returned back to the main program for further processing.

masquerading/impersonation

Gaining access to a system by pretending to be an authorized user. This requires that the perpetrator know the legitimate user's ID and passwords.

The latest PC bus standards and networks can support what higher level of throughput speed?

Gbps, or 1,000,000,000 bits per second

When you start a troubleshooting discussion with a user, what should you have them do?

Give you the status of the computer, including any error messages or unusual conditions.

You are removing an old device from your computer and want to ensure all of the old drivers are gone. Where in Windows would you go to delete the drivers?

Go to the Device Manager folder, right-click the device, and select "Uninstall Device."

Least Privilege Policy

Granting only those permissions users need and blocking those that they do not

GUI (Graphical User Interface)

Graphical User Interface which helps make the computer easier to use by non-technical staff and home users.A type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.

GPU

Graphics Processing Unit that displays a high-res image to the user that requires a lot of processing power, especially if the image changes rapidly, as well as video, or used complicated 3D and texture effects like with computer games

What type of license allows a company to install software on an agreed-upon number of computers so all employees can use the software at the same time?

Group use/site

Also known as the mini HDMI

HDMI Type C

Which HDMI connector is also known as the Mini HDMI?

HDMI Type C

Which HDMI connector is also known as the Mini HDMI?

HDMI Type C is the compact version of HDMI connector, also called the Mini HDMI connector, which was introduced in HDMI 1.3. It's used on portable devices, such as camcorders, and has the same number of pins as earlier versions, despite its smaller size.

HD Partitions

Hard Disk Partitions, is the act of dividing it into logically separate storage areas. Maybe help improve performance of the disk or provide a logical separation of different data areas

Where would you place data for long-term storage?

Hard disk drive

Which of the following is a method of verifying a backup of critical files?

Having one of the files restored A method of verifying a backup of critical files is to have one of the files restored. The ability to restore one of the files in a list is a good indication of the possibility of restoring all of the files. Testing as many as possible will provide greater reassurance that the backups are intact and usable. Most backup software can generate a report indicating success or failure of a backup routine; however, the best way to verify success of a backup is to practice restoration. The medium that backup files are stored on does impact the restoration of files; however, it does not affect the verification process. Making multiple copies of critical files may be required by the backup plan; however, those copies must still be verified to ensure that data will be recoverable if needed.

What is a challenge encountered when backing up databases that are always in use?

It requires replication and online backups.

Heuristic identification

Heuristic means that the software uses knowledge of he sort of things that viruses do to try to spot (and block) virus-like behavior.

Notation system that presents the largest numbers using the fewest digits? referred to as base 16 (16 bits of information).

Hexadecimal

Backbone Segments

High bandwidth backbone segments are used between the router and the internet and between the router and the two switches.

Which networking feature did Microsoft recently discontinue in updated Windows 1803?

Homegroups

(HTTP)Hyper Text Transfer Protocol

How the data is transferred to the external site through the servers. A client connects to the HTTP server using its TCP port(the default is port 80) and submits a request for a resource using a uniform resource locator(URL) the server acknowledges the request and return the data.

Scalability

How well a system can scale up, or adapt to the increased demands of growth

Which device is categorized as a Human Interface Device (HID)?

Human Interface Devices (HID) are peripherals that enable the user to enter data and select commands. Examples include keyboards and mice.

Which of the following is NOT a scripting language?

Hypertext Markup Language

HTTPS (Hypertext Transfer Protocol Secure)

Hypertext Transfer Protocol Secure is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security, or, formerly, its predecessor, Secure Sockets Layer.An encrypted version of HTTP. It uses port 443.

IEEE 802

IEEE 802 set of LAN protocols, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4, 5, and 60 GHz frequency bands.

802.11

IEEE 802.11 is the set of technical guidelines for implementing Wi-Fi.IEEE 802.11 refers to the set of standards that define communication for wireless LANs (wireless local area networks, or WLANs). The technology behind 802.11 is branded to consumers as Wi-Fi.

(IOPS)Input/output operations per second

IOPS (input/output operations per second) is the standard unit of measurement for the maximum number of reads and writes to non-contiguous storage locations. IOPS is pronounced EYE-OPS.

top-level domain (TLD)

Identifies the type of organization associated with the domain. ex:.com, .edu,.org, .gov, .uk, .ca

What is the first step in the CompTIA troubleshooting model?

Identify the problem by gathering information

Which of the following BEST defines the AND condition?

If both conditions are TRUE, then the whole statement is TRUE.

What is the advantage of a local network-hosted application, in terms of data storage?

If data is stored on the server rather than the local workstation, it is easier to apply access controls and to back it up.

Which of the following BEST defines the OR condition?

If either condition is TRUE, then the whole statement is TRUE.Logical operators can combine simple relational statements into more complex expressions. With the OR (||) logical operator, the whole statement is TRUE when either condition is TRUE. Both conditions can be TRUE as well with the OR operator. For example, TRUE || FALSE == TRUE, and also TRUE || TRUE == TRUE.

Which of the following BEST defines the XOR condition?

If either, but not both, condition is TRUE, then the whole statement is TRUE.Logical operators can combine simple relational statements into more complex expressions. With the XOR (Exclusive OR) logical operator, the whole statement is TRUE when either condition is TRUE, but not both. So, TRUE XOR FALSE == TRUE, but TRUE XOR TRUE == FALSE.

What is the disadvantage of a "locally installed but network required" delivery method?

If you lose network connectivity, you may lose some capabilities.

What is an advantage of having an application delivery method in which the application and files are saved locally?

If you manage the application and files locally, you can protect all of your information and contain it on your local network behind your firewall.

As you are about to enter a secured building, a stranger waiting outside tells you he is a recent hire and asks you to let him in because he forgot his swipe card. What type of security attack is this?

Impersonation

What action can help mitigate the risk of impersonation attacks?

Implementing strong identity controls, such as badging systems for building access and multi-factor authentication for network access An impersonation attack occurs when a malicious actor assumes the identity of a legitimate party. This can be achieved using social engineering or through technical means including password cracking or theft. Implementing strong identity controls is a mitigation technique for impersonation attacks. Senders and receivers authenticating themselves and using encryption to validate messages is a mitigation technique for Man-in-the-Middle (MitM) attacks. The use of encryption and time stamping to ensure tokens cannot be misused is a mitigation technique for a replay attack. Using a backup power source, which provides a means to safely close down a server, helps protect availability through the use of Uninterruptible Power Supplies (UPS).

subnet mask

In IPv4 addressing, a 32-bit number that, when combined with a device's IP address, indicates what kind of subnet the device belongs to. Subnet mask lets you identify between Network ID and Host ID

What system command would you enter to verify the logical integrity of a file system on a Windows machine?

In Microsoft Windows, the Check Disk (chkdsk) command verifies the logical integrity of a file system. If you follow it with a drive letter and the /f switch, chkdsk can repair the file system data. For example, chkdsk c: /f

Which server application architecture model requires that the client NOT have direct communications with the data tier?

In a three-tier client server application architecture model, the application layer executes the query on the data layer, which resides on a third tier, and returns the result to the client. The client should have no direct communications with the data tier.

Advanced RISC Machine (ARM)

In mobile devices, a 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity.

Methods(object-oriented programming)

In object-oriented programming, a method is a part of an object. A method allows the object to perform an action, whether this action is to modify itself or to return a value.What you can do to an object

private browsing mode

In private (or incognito) mode, the browser doesn't store cookies or temporary files and doesn't add page to the history list.

64-bit

In reference to the Windows operating systems, one that can utilize more than 4 GB of address space. Depending on the version, 64-bit Windows can address a maximum of from 8 to 192 GB. A 64-bit register can theoretically reference 18,446,744,073,709,551,616 bytes, or 17,179,869,184 GB (16 exabytes) of memory. This is several million times more than an average workstation would need to access. What's important is that a 64-bit computer (which means it has a 64-bit processor) can access more than 4 GB of RAM. If a computer has 8 GB of RAM, it better have a 64-bit processor. Otherwise, at least 4 GB of the memory will be inaccessible by the CPU.

32-bit

In reference to the Windows operating systems, one that can utilize up to 4 GB of address space. One bit in the register can reference an individual byte in memory, so a 32-bit system can address a maximum of 4 GB (4,294,967,296 bytes) of RAM. The actual limit is often less around 3.5 GB, since part of the register is used to store other temporary values besides memory addresses. Most computers released over the past two decades were built on a 32-bit architecture, hence most operating systems were designed to run on a 32-bit processor.

Queries often retrieve data from multiple tables. If the same column name is used in two tables, how does SQL know which column to use?

In the SELECT statement, the column name is prefixed by the table name.

If a computer is running a stateless operating system, where would the user's documents be stored?

In the cloud

For what reason would you need to download a codec pack?

Inability to view a video file of a certain format

How is computer data defined?

Information processed or stored by a computer using nothing more complicated than the binary digits 1 and 0.

What type of threat does disk-level encryption protect against?

Information snooping after the theft of a laptop Disk-level encryption is a technique the encrypts the entire contents of a hard drive. This prevents information snooping if a device, like a laptop, is lost or stolen. Disk-level encryption can also be added to removable media like thumb drives or flash cards. When a device is running, the hard drive is no longer encrypted, so a remote hacker can still access sensitive information. Because disk-level encryption only protects data at-rest, information being transmitted is still vulnerable to eavesdropping. A Wi-Fi Man-in-the-Middle (MitM) attack intercepts information flowing between two devices. Disk-level encryption only protects data at-rest, not data in-transit.

Infrared(IR)

Infrared (IR) is a wireless mobile technology used for device communication over short ranges. IR communication has major limitations because it requires line-of-sight, has a short transmission range and is unable to penetrate walls.

Disk Management

Initializes disks, creates partitions, and formats partitions

Using a bare metal backup allows you to skip which step of restoration?

Installing an Operating System (OS)

What power redundancy technique can be used to provide short-term relief from a power outage?

Installing an Uninterruptible Power Supply (UPS) on enterprise servers

What network redundancy technique can be used at the server level (i.e., on a domain controller) to prevent the loss of important domain functionality?

Installing multiple network cards or adapters and configuring load balancing with failover

SATA(Serial Advanced Technology Attachment)

Interface for connecting storage devices like hard disks.Interface for connecting storage devices like hard disks.

Multitouch

Interface that features the use of one or more finger gestures to manipulate lists or objects on a screen without using a mouse or keyboard.

Which statement BEST describes the overall purpose of Windows PowerShell?

It enables you to perform management and administrative tasks in Windows 10 and Windows Server 2016 (and some earlier versions).

What is a privacy concern related to instant messaging?

Instant messaging on corporate networks is subject to review by employers. Instant messaging, like email and other corporate network services, may be subject to monitoring if used on a company device or on a company network. A corporate policy or contract of employment typically explains details of this agreement. Instant messaging on a personal network, such as at home, is not subject to review by an employer. Personal communications on a corporate network are not considered confidential. Company confidential information applies to the company's data, not the employee's data. Using an instant messaging app from your personal smartphone is not subject to review by an employer; however, a policy may be in place prohibiting such activities.

Shell

Interface between the user and the computer

collaboration software

Is software that supports the sharing, processing and management of files, documents and other data types between several users or systems. This sort of software permits two or more remote users to work together on a job or venture.

What is the purpose of the SQL INSERT command?

It adds a new row to a table in a database. The INSERT command adds a new row to an existing table in the database. For example, a SQL statement that includes INSERT INTO CUSTOMER will add a new row of data to the "Customer" table. primary key is added to a table at the time the table is created, as an option in the CREATE TABLE command. It can also be added at a later time, using the ALTER TABLE command. A new field is added to a table with the ALTER TABLE command. A new table is added to the database with the CREATE TABLE command.

Why is meaningful reporting an important factor of data-driven business decisions?

It allows a human to analyze and interpret the information

In a relational database table, what is the significance of creating a field with a varchar data type?

It allows a variable number of characters to be stored for a particular column in each row. The varchar data type provides for a variable-sized field type. If a book title is twenty-seven characters long, twenty-seven bytes are stored. If a title is only three characters long, only three bytes are stored, resulting in a significant savings in storage space.

Which of the following is a limitation of a 32-bit processor in a workstation?

It cannot use more than 4 GB of system memory.

What is a true statement about Data Definition Language (DDL)?

It comprises SQL commands that can add to or modify the structure of a database. Data Definition Language (DDL) includes commands that can manipulate the structure of a database, rather than the data inside the database. Examples include ALTER, CREATE, and DROP. Adding and deleting tables, changing column names and sizes, as well as adding indexing and permissions, are all functions of DDL.

Which is the best way to issue SQL commands to manipulate data in a relational database?

It depends on the user's level of SQL experience, overall purpose, and access permissions.

If there are errors during the Power-On Self-Test (POST), how does the computer tell you what the problem is?

It emits a sequence of beeps that act as a code for the type of problem.

How does RSA's SecurID token provide multi-factor authentication?

It generates a number code synchronized to a code on a server and is combined with a PIN. A SecureID is a hardware token that generates a number code that is synchronized to a code on a server for the user to enter to log on. It is considered a one-time password that typically changes every 60 seconds. A longer version of a password that is easier to remember and more difficult to crack is called a passphrase. A passphrase is an example of single-factor authentication. A smart card that contains a digital certificate paired with a PIN is considered multi-factor authentication; however, a SecurID has a digital screen with a rotating number code. A geographic location is known as "somewhere you are," and you typically use it with a Global Positioning System (GPS). The SecurID does not use geo-positioning.

Why is it important to write comments when coding a program?

It helps the developer read and maintain the code.

What is a file with a .zip extension?

It is a compressed collection of one or more files.

Which statement is NOT true regarding the SQL INSERT statement?

It is a data definition language statement. Data definition statements are SQL statements, such as CREATE DATABASE and CREATE TABLE, that define the structure of a database. The INSERT command adds rows of data into a table, not new objects into a database. Data manipulation statements refer to SQL commands that access or modify the contents of the database. They include operations to add new rows, delete existing rows of data, and update values in the fields inside the table. INSERT is the data manipulation command to add rows of data into a table. INSERT is an SQL statement that can be entered at a command line, inside a program, or using a utility or user interface.

What is Copyright used for?

It is a legal protection granted to certain types of work that gives it holder the right to control the use of the work, including rights of publication, distribution,or sale.

Which of the following best defines a container?

It is a special type of identifier that can reference multiple values or elements.

What does a URL that begins with "https://" signify?

It is an SSL-enabled web address. Secure Sockets Layer (SSL)A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.

What is a disadvantage of Network Attached Storage (NAS) as a backup and restore plan?

It is located onsite, which means it does not protect against all threats.

Where does tracking users' actions fit within the access control system?

It is part of accounting and is required for non-repudiation. Tracking users' actions is part of the accounting function of the access control system. This involves the logging of events such as when a user signs in or accesses a file. Tracking is a key part of non-repudiation, which means a user cannot deny having performed some action. Authentication and authorization are both parts of the access control system in which associated events are often tracked; however, tracking is not part of authentication. Authorization is what gives access rights to entities for certain resources. It is also tracked by the accounting system; however, tracking is not part of authorization. Non-repudiation is a principle that uses tracking along with other techniques, like video surveillance and digital signatures; however, tracking is not specific to non-repudiation and is used for other purposes.

How is intellectual property protected?

It is protected through trademarks,copyrights,and patents.

Which statement BEST defines a virtual machine?

It is used to operate multiple operating systems and virtual computers on existing hardware.

How is pseudocode used in programming?

It is used to write informal programming code that is readable by humans.

After antivirus software detects a virus, what action does the software most commonly take next?

It quarantines the virus and prevents it from being opened.

What value is gained from a comprehensive written policy?

It removes any uncertainty that employees may have about what to do in a given situation. Written policies and procedures help staff understand and fulfill their responsibilities and follow best practices. Having a comprehensive policy removes any uncertainty that employees may have about a given situation and holds employers accountable for following their own policies. Having written policies limits the employer's ability to make changes without providing notice to employees since the official rules are in writing. A comprehensive policy can be distributed in writing, reducing the impact of employee's "I didn't know" responses to policy violations. Written policies come in several forms, which range in flexibility. A guideline can be published that provides recommendations but allows for flexibility and adaptability to market conditions.

How does assembly language work?

It represents machine code in human-readable text.

What function does the Central Processing Unit (CPU) perform in a computer?

It retrieves each instruction or data file from memory and performs an action on it.

What is the key difference between Java and JavaScript?

Java is a programming language, whereas JavaScript is a scripting language.

What language does VBScript share similarities with?

JavaScript

Which of the following is NOT considered platform dependent?

JavaScript is known as an interpreted language, which is capable of running on most platforms.

Which option does NOT describe benefit of journaling in Linux?

Journaling will flush the cache at certain points in the journal.

Older computer peripheral interfaces and slow network links are measured in what type of throughput unit?

Kbps, or 1000 bits per second

Small files are often measured in what unit?

Kilobyte (KB), or 1000 bytes

What is the major technical issue in using a satellite network connection?

Latency problems within the system

What is the networking term that describes the total time it takes a data packet to travel from one node to another?

Latency.Latency is the term used to describe the total time it takes a data packet to travel from one node to another. This is often measured in milliseconds (ms). The greater the latency, or "lag," the higher this number will be.

Which feature of a wireless router allows you to specify precisely which wireless clients may join your network?

MAC(Media Access Control) filtering

You added a speaker add-in card to your desktop computer and want to connect the card to an amplifier. Which color collar would the port you need have?

Lime

What computer systems use the 4th extended file system (Ext4)?

Linux boxes use the 4th extended file system or Ext4, not the Hierarchical File System. Ext4 is a 64-bit file system with support for journaling, which means that the file system tracks changes, giving better reliability and less chance of file corruption in the event of crashes or power interruptions.

LCD:

Liquid Crystal Display, or flat screens, used on portable computers and replaced the old and bulky Cathode Ray Tube (CRT). Red, green, blue are the primary colors

What best practice can prevent a malicious person from snooping on a victim's computer when the victim walks away?

Locking the Windows computer by holding down the "Windows Logo Key" and pressing the "L" key

Which of the following is the best example of a direct/manual database access method?

Log into phpMyAdmin and run SQL statements at the command prompt.

What action should a system take after a user resets the password?

Log the action and inform the user via their registered email address

Which pseudocode populates the first row and second column?

Logons(0,1) = find LastLoggedOnUser and get Time

Which of these cellular standards has the fastest top data rate?

Long Term Evolution (LTE) is a converged 4G standard supported by both the GSM and CDMA network providers. In theory, LTE has a maximum downlink of 150 Mbps.

A program has a piece of code that needs to be repeated over and over until the condition has been fulfilled. What is this an example of?

Looping

What is the main difference between looping and branching?

Loops are used to perform a task until a condition is met.Loops are similar to branches insofar as they deviate from the initial program path according to some sort of logic condition. However, with looping, when the logic condition is met, program flow returns to the initial program path. With branching, the program enters a new path based on a new sequence of instructions.

Attenuation

Loss of strength in a signal as it travels from the sending device to the receiving device

Older bus interfaces and many types of network interfaces work at what signal speed?

MHz, or 1 million cycles per second

Wireless networks and residential Internet links typically have what throughput speed?

Mbps, or 1,000,000 bits per second

When you attempt to change a password, the system returns an error indicating that the new password cannot be the same as the previous five passwords. This is an example of which best practice?

Maintaining a password history A best practice that prevents a user from reusing a previous or old password within the same system is referred to as maintaining a password history. With a password history, any attempt to create a new password that matches a previous password will fail. Password expiration is a best practice that involves forcing a password reset based on a certain number of calendar days or months. Password complexity is a best practice that involves requiring a specific mix of special characters, numbers, and letters in both upper and lower cases. Password length is a best practice in which passwords must be a certain number of digits or greater.

What action can help mitigate against the risk of Man-in-the-Middle (MitM) attacks?

Making senders and receivers authenticate themselves and use encryption to validate messages

exploit

Malware that may be able to infect your computer because your OS or browser software is not up to date and is therefore vulnerable to some sort of exploit.

.Manufacturer websites are a great source for what types of resources?

Manuals, drivers, and knowledge bases

Manufacturer websites are a great source for what types of resources?

Manuals, drivers, and knowledge bases

onboard

Many motherboards include ____ devices (such as network cards, audio cards, gpu, video cards, or USB and Firewire connections).

Map Network Drive

Mapping a drive means that you want permanent access to a folder that is currently residing on another computer, server, or network storage device. Windows will assign a new drive letter to the folder and it can be accessed just like any other drive connected to your computer

How does a markup language, such as HTML, assist a program when rendering code?

Markup language makes data in a document accessible to a program through structured tags.

How does a markup language, such as HTML, assist a program when rendering code?

Markup language makes data in a document accessible to a program through structured, nested tags. By organizing the data in this fashion, it allows greater functionality and additional rendering capabilities in the browser to create a more user-friendly program.

thunderbolt 3

Max speed 40 Gbps; USB Type-C connector

megabit per second (Mbps)

Mbps means megabits per second. Mb is used in reference to download and upload speeds. It takes 8 bits of data to equal 1 byte. MBps stands for megabytes per second. MB is used in reference to file size, or the amount of data transferred. You'll spot these terms when you download a file from the Internet or transfer data from one device to another. They show the rate of transferal. Your connection speed (download and upload) will display as megabits per second. But, you're downloading or transferring megabytes.

Small Outline DIMM (SODIMM)

Memory module used in small form factor and laptop computers

volatile

Memory that is only preserved while the system is powered up. Ex: Random Access Memory (RAM)

Which software package is a Relational Database Management System (RDBMS)?

Microsoft SQL Server

How do mobile and desktop apps compare in regard to security and privacy?

Mobile apps and desktop apps each have their own security concerns and are equally insecure.

Which peripheral device fills cells with color and uses transistors to vary intensity?

Monitor

OEM (Original Equipment Manufacturer)

Most companies producing PCs and laptops are referred to as Original Equipment Manufacturers (OEM) because rather than making each component that goes into a pc, they source components such as cpu's and RAM modules from manufacturers and put them together as a branded PC system.

mpg (video file)

Motion Pictures Expert Group, early standard for video files with lossy compression

One of the most basic security rules is to use passwords that are "easy to remember but difficult to guess." Which password security measure covers this rule?

Password complexity

How do Relational Database Management Systems (RDBMS) handle multiple users accessing the same database concurrently?

Multiple users can view the same record at the same time. If more than one user attempts to update the same record at the same time, the RDBMS locks that record so that only one user at a time can update.

corporate network

Must be protected against intrusion, denial-of-service attacks, and unauthorized access

What is an advantage that the New Technology File System (NTFS) has over the File Allocation Table (FAT)?

NTFS has larger partitions and supports extended attributes, allowing for file-level security permissions, compression, and encryption.

Nodes/Hosts

Network endpoints can be referred to as nodes or hosts.

Naming rules

Names consist of a sequence of letters, digits and underscore('_') characters with no spaces. May not start with an digit and may not be a keyword. Should not start with underscore as compilers do that. While any length is technically allowable, almost all compilers will distinguish names of up to 31 characters.

Which of the following is NOT a Radio Frequency means of creating a wireless network?

Near Field Communication (NFC)

NIC

Network Interface Card which is a wired network that provides an Ethernet port in the computer

What password length is acceptable for an ordinary user account?

Nine to twelve characters

License Theft

Not a valid software license

Your new "Plug-and-Play" printer is not installing properly, even though Windows tried to find a driver using Windows Update. What else can you do to install the device?

Obtain a device driver from the manufacturer.

Where would you find the Front Side Bus (FSB) in a computer?

On the motherboard

gb(gigbit)

One gigabit is equal to 1,000,000,000 bits.A gigabit is very similar to a gigabyte, since they both represent a unit of measurement for digital storage space. However, the difference is found in the byte vs. bit. A gigabit represents ten to the ninth power on the International System of Units (SI).

In a situation where a PC-based database and an application are both hosted on the same computer, what is the application architecture called?

One-tier

Which would be the LEAST desirable architecture option for a database that requires a high degree of scalability?

One-tier

What is the name of the cloud storage agent built into the latest versions of Windows?

OneDrive

On-site vs. off-site

Onsite storage usually entails storing important data on a periodic basis on local storage devices, such as hard drives, DVDs, magnetic tapes, or CDs. Offsite storage requires storing important data on a remote server, usually via the Internet, although it can also be done via direct access.

What type of software license grants users permission to modify the code of the program as they see fit?

Open source

What needs to be installed on a PC to manage computer hardware and software resources?

Operating system

Which brand of Central Processing Unit (CPU) would be found in a 32-bit server?

Opteron

Which brand of Central Processing Unit (CPU) would be found in a 32-bit server?

Opteron is AMD's long-standing version of Intel's Xeon brand, aimed at the server/workstation market. These CPUs usually have multiprocessing and larger memory caches.

CD-R

Optical disc on which users can write once, but not erase, their own items

interference

Other radio-based devices and nearby Wi-Fi networks can also cause interference. Other sources of interference include devices as various as fluorescent lighting, microwave ovens, cordless phones, and power motors and heavy machinery's.

Your keyboard no longer works and is not fixable. You look in the closet and find an old dusty keyboard with a cable that ends in a 6-pin purple-colored connector. What type of connector have you found?

PS/2

Voice over Internet Protocol (VoIP)

Packages voice communication as data packets, transmits them over the network, then reassembles the packets to provide two-way, real time voice communication. Ex:Skype

Address Resolution Protocol (ARP)

Part of the TCP/IP protocol for determining the MAC(media access control) address based on the IP address. The protocol that enables this process of local address discovery to take place. Hosts broadcast ARP messages onto the local network to find out which host MAC address owns a particular IP address.

A user complains about needing to enter a password to access a workstation and wants it removed. What explanation should you give the user before denying the request?

Passwords prevent others from impersonating the user and protect from snooping. Most operating systems allow the use of an account without a password, PIN, or screen lock; however, is it not a good idea to remove this security control. Passwords prevent malicious actors from impersonating a legitimate user and protect the information stored on the device from casual snooping. Malware can affect a computing device regardless of whether or not a password is used. While a password can protect from snooping, social engineering attacks often deceive a user into exposing sensitive information, which may include the user's password. Ransomware encrypts the contents of a user's drive through the use of malware. This is possible regardless of whether or not a password is enabled.

Programmers

People who take the analysts' design and develop, code, and test computer programs.

In which situation would Windows Disk Defragmenter be helpful?

Performance is being affected by used and free storage areas on a hard disk being greatly scattered.

Peripheral Component Interconnect (PCI)

Peripheral Component Interconnect (PCI) is a term used to describe a common connection interface for attaching computer peripherals to a PC's motherboard. It transfers data in parallel over a data bus that is either (PCI) 32- or 64-bits wide.

Human Interface Devices

Peripherals that enable the user to enter data and select commands.

What is the set of rules that determines what actions you are allowed to perform on a computer and what resources you can access?

Permissions

PS/2

Personal System/2, as in PS/2-style mice and keyboards and connectors. Also called mini-DIN connectors. connect the mouse port marked with a mouse icon (usually color-coded green) then switch on the PC

What information can be used as a response to a security question?

Personally Identifiable Information (PII)

What unit is used to measure large storage network and cloud systems?

Petabyte or 1000 TB

What is the difference between plain text and cipher text?

Plain text is an unencrypted message, whereas cipher text is an encrypted message.

Plug and Play

Plug and Play, sometimes, abbreviated PnP, is a catchy phrase used to describe devices that work with a computer system as soon as they are connected. The user does not have to manually install drivers for the device or even tell the computer that a new device has been added. Instead of the computer automatically recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device.

After one of your passwords is stolen from a hacked website, you later learn that someone has accessed your bank accounts at two different companies. What weakness allowed the attacker access the two separate bank accounts?

Poor password management with reuse across many sites A best practice for password management is to use a different password for every website or service. Reusing passwords puts all resources at risk. In this scenario, the password for one website was compromised, but because the same password was used across sites the stolen password was then used to log in to other accounts. Low password complexity increases the chances that an attacker can crack a password; however, it does not explain how the attacker was able to access two different bank accounts. The lack of password expiration or history tracking allows users to keep the same password; however, it does not explain how multiple bank accounts were accessed. A short password length increases the chances that an attacker will crack the password; however, it does not explain how other sites were accessed after the initial hack.

PDF

Portable Document Format, a file format for distributing documents, now an open standard so different productivity apps can use

flash drive

Portable storage device that plugs into a USB port.

script blocker

Povides more control over with websites are allowed to run scripts.

What does the High Definition Multimedia Interface (HDMI) not provide between equipment?

Power to the connected device

Who would typically use a query/report builder to access database data?

Power users and programmers Query and report builders are typically used by those who need to interact closely with a database, but might not want to learn SQL commands. However, programmers also find them useful for quickly extracting data in some situations.

POST(Power on self Test)

Power-On Self-Test which starts right before the Windows loading screen pops up when you turn on the computer. The POST rountine ensures that all the components required to start are present

impersonation

Pretending to be someone else is one of the basic social engineering techniques.

What configuration change can help collect tracking information for accountability purposes?

Preventing users from clearing web browsing history Collecting tracking information for accountability is important for non-repudiation, troubleshooting, and even legal compliance. One configuration change that can help collect information is to prevent users from clearing web browsing history. Requiring users to authenticate with multiple factors is a good security practice; however, it does not change how or what information is collected for tracking. Mandatory Access Control (MAC) is an authorization model that uses labels like confidential or secret. This is not a configuration that can help collect tracking information. Least privilege is a principle, not a configuration, that restricts users from accessing information that they do not need.

Vectors

Programming languages that support containers called vectors that can grow or shrink in size as elements are added or removed

Platform Dependent Programs

Programs that are limited on what computers they will work on based on hardware/software requirements.

What type of software allows stakeholders and users to control costs and manage budgeting through project planning, scheduling, resource allocation, and change management?

Project management software

Which of the following BEST describes the purpose of properties in object-oriented programming?

Properties allow external code to ask the object to show or change the value of one of its fields. They represent an alternative way of accessing a field publicly, instead of using a method to access an attribute.

program

Provide a computer or other machine with coded instructions for the automatic performance of a particular task.

Transport Control Protocol (TCP) or(transmission control protocol)

Provides connection oriented delivery. This means that the delivery is reliable and that packets are delivered in the correct sequence.

Redundant connections

Provides fault tolerance by having redundant internet connections so if one fails, the organization can still has connectivity

Power Supply Unit(PSU)

Provides the electrical power for a PC. Converts standard AC power into various voltages of DC electricity in a PC. A power supply unit converts mains AC to low-voltage regulated DC power for the internal components of a computer. Modern personal computers universally use switched-mode power supplies. Some power supplies have a manual switch for selecting input voltage, while others automatically adapt to the mains voltage.

programming language

Provides the standards, syntax, statements, and instructions for writing computer software.

What is the basic function of an operating system?

Providing an interface between user and machine

How can an administrator reduce the impact of hardware failures?

Provisioning redundant servers and configure a service to failover to a working server Hardware failures can occur with all devices, and those with moving parts, like hard disk drives, are more susceptible. Provisioning redundant components and servers and configuring them to be used as failovers can reduce the impact. Consideration must also be given to the information stored on the server, as a failed hard drive will likely result in unrecoverable stored information.

When set in your browser, what can be configured to act as a firewall and apply other types of content filtering rules?

Proxy settings. A proxy server can be configured as a firewall and apply other types of content filtering rules. Some proxy servers work "transparently" so that clients can use them without any extra configuration of the client application. Other proxies require that client software, such as the browser, be configured with the IP address and port of the proxy server.

How does pseudocode present comments to maintain revisions?

Pseudocode contains comments that are preceded by a special character syntax depending on the language being used. Comments are part of the programming code that are not executed by the computer but that help the developer read and maintain the code. Do keep in mind that each programming language may operate with different comment syntax or special characters.

pseudocode concept

Pseudocode is an informal way of programming description that does not require any strict programming language syntax or underlying technology considerations. It is used for creating an outline or a rough draft of a program. Pseudocode summarizes a program's flow, but excludes underlying details.

What type of encryption is used by mobile applications to encrypt data in-transit?

Public Key Infrastructure (PKI)

You no longer need the data on a hard copy. How can you ensure confidentiality when disposing of the data?

Put it through a shredder.

Which Redundant Array of Independent Risks (RAID) involves striping data across multiple disks and uses parity data?

RAID 5

What is the purpose of Random Access Memory (RAM)?

RAM is a type of volatile memory. It is the main storage area for programs and data when the computer is running.

You find you are unable to control your computer, and a message on the screen states that you must pay a fee before you can once again assume control of your computer. Which type of malware is infecting your computer?

Ransomware

rapid elasticity (cloud computing)

Rapid elasticity is a cloud computing term for scalable provisioning, or the ability to provide scalable services. Experts point to this kind of scalable model as one of five fundamental aspects of cloud computing.Rapid elasticity allows users to automatically request additional space in the cloud or other types of services.

read-only memory (ROM)

Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device. the portion of a computer's primary storage that does not lose its contents when one switches off the power

Implicit Deny

Rejecting access unless a condition is explicitly met.

Microsoft SQL Server is an example of what?

Relational Database Management Systems (RDBMS)Software is required to create and maintain a database schema and the data inside the actual database. SQL Server, Oracle, MS Access, and MySQL

Assembly Language

Represents machine code in human-readable text. Programming language that has the same structure and set of commands as machine languages but allows programmers to use symbolic representations of numeric machine code.

Acceptable Use Policy

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

What is a recommended technique for restoring access to users after disaster recovery?

Restricting user numbers initially so that the system can be monitored and verified as working normally When restoring access to users after recovering from a disaster, limiting the initial number of users can help verify proper system operations in a controlled manner. If a system can handle a limited number, then slowly increase the amount while monitoring performance and watching for errors. Checking the integrity of backup files should be done prior to a disaster. Restoring access to users occurs after the data restoration process. Considering dependencies between systems should occur while prioritizing restoration order. Prioritization occurs before data restoration and before restoring access to users. Restoring access to all users at the same time may cause an intolerable level of stress on the system, causing another failure. Stress testing can be performed later once the system stabilizes.

What does the Boot Camp feature of a Mac allow you to do?

Run a Windows operating system on a Mac

Overclocking

Running the CPU at a speed faster than normally the manufacturer recommends

The Post Office Protocol v3 (POP3) protocol is for incoming mail. Which protocol is used for outgoing mail?

SMTP(Simple Mail Transfer Protocol)

What type of storage device is a hybrid device?

SSD

What term is defined as the ability of a database to increase in size as more information is added to it without increasing costs at the same rate?

Scalability

Which of these uses volatile memory?

Small Outline DIMM (SO-DIMM) is a form of Synchronous Dynamic RAM (SDRAM) used in laptops. This memory stores each data bit as an electrical charge and needs refreshing from a power source, thus making it volatile.

Which type of software would you use to ensure everyone can see the same display output during an online meeting?

Screen sharing software

What should be done if a needed device driver has been "abandoned" by the original manufacturer?

Search forums and other sites for information that may, or may not, legitimize a third-party's driver package.

SD Card (Secure Digital Card)

Secure Digital, officially abbreviated as SD, is a proprietary non-volatile memory card format developed by the SD Card Association for use in portable devices.

Secure File Transfer Protocol (SFTP)

Secure File Transfer Protocol (SFTP) is a secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream. It is part of the SSH Protocol. This term is also known as SSH File Transfer ProtocolA protocol for securely uploading and downloading files to and from a remote host. Based on SSH security. the SSH File Transfer Protocol is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force as an extension of the Secure Shell protocol version 2.0 to provide secure file transfer capabilities

SSH (Secure Shell)

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. Secure Shell (SSH) is a cryptographic protocol and interface for executing network services, shell services and secure network communication with a remote computer. Secure Shell enables two remotely connected users to perform network communication and other services on top of an unsecured network. It was initially a Unix-based command but is now supported on Windows-based systems as well.

What is the preferred installation method when adding new software to a computer?

Selecting the default installation options

semi-structured database

Semi-structured data is information that does not reside in a rational database but that have some organizational properties that make it easier to analyze. With some process, you can store them in the relation database (it could be very hard for some kind of semi-structured data), but Semi-structured exist to ease space. Example: XML data. (Metadata helps identify the data)

How do you install services on your computer?

Services may be installed by Windows and by other applications, such as anti-virus,database, or backup software.

When using Windows, how can you best protect yourself against malicious scripts when browsing?

Setting alerts in the UAC allows the browser to block malicious script, so it would not be able to change the computer configuration without your explicit authorization.

What security-related action helps protect the wireless router in your home?

Setting up encryption and using a password

You need to increase the system memory of your laptop and decide to research the types of memory available. Which would fit in your laptop?

Small Outline DIMM (SODIMM) is a form of Synchronous Dynamic RAM (SDRAM) DRAM used in laptops. This memory stores each data bit as an electrical charge and needs refreshing by an electrical charge.

Alternating Current (AC)

Short for alternating current, AC is an electrical current that reverses or alternates its direction of flow

LOCK SCREEN

Sign in screen to windows before entering

secure sign on

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials...

financial and commercial functions

Software Applications that help in order processing, accountancy, and payroll.

Which factor of authentication can be stolen and replayed from a remote location?

Software Token An app, or other software that generates a token for authentication. Can be stored as web cookie. a software token ca be replayed.

client access license (CAL)

Software bought under license can be installed onto a network server so that all authorized users can access it without being installed on each individual computer.

anti-virus software

Software for blocking malicious (bad) programs, such as viruses or malware, from harming your computer.

Concurrent License

Software license that allows a specific number of copies to be used at one time. A company can allow only a set number of users access to it at any one time.

Client Software

Software that allows a device to request resources from a network. For windows to connect to a network and share resources with other computers, the computers must have appropriate client software.

proprietary software

Software that has been developed by a company and has restrictions on its use, copying, and modification. Proprietary software consists of software that is licensed by the copyright holder under very specific conditions. In general, you can use the software, but you are not allowed to modify the software or distribute it to others.

service pack

Software that is a cumulative package of all security updates plus additional features.

personal information manager (PIM)

Software that is designed to keep individuals organized via the management of contacts, appointments, to-do lists, and email.

Single platform software

Software that is optimized for a particular platform, it can perform better and be simpler to check for errors than cross-platform software.

Software as a Service (SaaS)

Software that is owned, delivered, and managed remotely and delivered over the Internet to contracted customers on a pay-for-use basis or as a subscription based on use metrics.

Firmware

Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware. Ex. The bootstrapping process occurs before the operating system is loaded and is enabled by a low-level operating system called firmware.

Which scenario is an example of shoulder surfing?

Someone steals your password or PIN after watching you type it in Shoulder surfing is a term that describes the security vulnerability of someone behind you watching as you type sensitive information. Common examples of shoulder surfing involve someone watching you typing your password in at a computer, or a PIN code at an ATM. Being aware of your surroundings can help protect you from shoulder surfing. If there are others behind you, position yourself so that there is no direct line of sight from other people and your fingers as you enter information. The dispersion of emails that appear to come from a legitimate source is potentially a phishing attempt or simple spam. The unauthorized access to a room by someone who quietly follows you into it is called piggybacking or tailgating. The use of keystroke-capturing spyware is keylogging.

Which of the following is NOT used as a primary authentication factor?

Somewhere you are "Somewhere you are" is an authentication factor that measures statistics about your specific physical location. This can be used to verify that a user comes from a specific country or is logging in from an expected region. This supplements other authentication factors and is not used as a primary authentication factor. "Something you know" is a primary authentication factor most commonly seen as usernames and passwords. "Something you are" is a primary authentication factor associated with biometrics, like fingerprints or facial recognition. This is commonly used on mobile devices. "Something you have" is a primary authentication factor associated with smart cards or other hardware tokens.

What is an email-based threat that presents various advertising materials, promotional content, or money-making schemes to users?

Spam

Wide Area Network (WAN)

Spans a large geographic area such as a state, province, or country. networks in different geographic locations but with shared links. WAN is more likely to make use of a service provider network.

A manager needs to view last month's sales figures. Which of the following functionalities can be done with a query statement?

Specifying criteria to match values in one or more fields

In which type of email-based social engineering attack does a person pretend to be someone else for the purpose of identity concealment by manipulating an IP address, MAC address, or email header?

Spoofing Spoofing is a type of social engineering attack in which someone pretends to be someone else for the purpose of identity concealment. Hackers will often spoof the IP address, the network adapter's hardware MAC addresses, and email headers.

Viruses and Worms

Spreads within a computer network and can multiply. Can be halted by anti-virus software.

If you had to track and analyze sales data and work on your company accounts, which type of software would you use?

Spreadsheet software

In the event of an application failure, which application architecture model would be the most disruptive to users?

Standalone. Since the standalone, or one-tier architecture stores all of the database data and schema along with the application, the entire system would be unavailable to all users during an application failure. In a two-tier system, there are often multiple database applications accessing the same database server. That database server would still be usable by anyone using applications other than the one that failed. In a three-tier architecture model, the database would still be available to working applications. Also, it's possible that portions of the failed application would still work as well. The n-tier category includes two- and three-tier architectures. In both of these architecture types, only the application that failed, or portions of it, would be unavailable to users.

registered jack (RJ)

Standardized physical network interface for connecting telecommunications or computer networking equipment to a service provided by a telephone service provider or a data network. Ex: RJ-11(telephone) RJ-11 ports on the DSL(Digital subscriber Line) Rj-45 (Ethernet)

ADSL

Stands for 'Asymmetric Digital Subscriber Line'. A fast way of sending computer data over an ordinary phone line - usually used to provide broadband internet access to homes, schools, and offices. An alternative to a cable modem.(up to 24 Mbps)

What operating system is considered to be stateless?

Stateless means there is no record of previous interactions and each interaction request has to be handled based entirely on information that comes with it. Since Chrome OS does not store any files locally on the machine it runs on, is it considered to be a stateless OS.

ESD (Electrostatic Discharge)

Static electricity that can build up and discharge causing damage to electronic components. Antistatic devices help prevent ESD damage.

strings

Strings are any combination of letters, like 'b', 'cats', 'I like to play soccer', or even the empty string ''. There is no real limit on the amount of storage that can be used by a string.

What does the acronym SQL stand for?

Structured Query Language

Which language is typically used by Relational Database Management Systems (RDBMS) to maintain data?

Structured Query Language (SQL)

Structured Query Language (SQL)

Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation. SQL is used to query, insert, create, update, drop, and modify data.

structured databases

Structured data is a data whose elements are addressable for effective analysis. It has been organised into a formatted repository that is typically a database. It concern all data which can be stored in database SQL in table with rows and columns. They have relational key and can easily mapped into pre-designed fields. Today, those data are most processed in development and simplest way to manage information. Example: Relational data.

When writing pseudocode, what are subroutines?

Subroutines are blocks of code that represent duplicate tasks but have been defined separately.Programs can be divided into blocks of instructions that each perform some specific task. For example, where there are duplicate steps, you could write those as separate subroutines and then call them whenever needed. This in return reduces confusion from a development perspective.

Symmetric Multiprocessing (SMP)

Symmetric multiprocessing (SMP) is a computing architecture in which two or more processors are attached to a single memory and operating system (OS) instance. SMP combines multiple processors to complete a process with the help of a host OS, which manages processor allocation, execution and management.

Which of these would NOT use flash memory?

Synchronous Dynamic RAM (SDRAM) is DRAM used in laptops. This memory stores each data bit as an electrical charge and needs refreshing by an electrical charge.

Public Key Infrastructure (PKI)

System for creating public and private keys using a certificate authority (CA) and digital certificates for authentication.

Which is NOT carried by the expansion bus?

System memory data

Operating System (OS)

System software that provides an interface between the user, application programs, and computer hardware. ex:windows, Linux, MAC, Windows Vista

Fiber to the Curb (FTTC)

Takes the fiber even closer to the subscriber, bringing the optical fiber directly to the "curb" near customer homes and/or businesses.

If you are interested in viewing real-time statistics of processor and memory usage, which Windows operating system tool should you open?

Task Manager

How do you distinguish between tasks and processes/services?

Tasks are usually the actions that the user or CPU directs in the foreground. Processes and services run in the background.

What throughput capacity is found in major telecommunications links between data centers, cities, and countries?

Tbps, or 1,000,000,000,000 bits per second

Network prefix and prefix length

Tells the device which network it belongs to.

Newer hard disks and other large storage networks can be measured in what unit?

Terabyte, or 1000 GB

Tbps (Terabits per second)

Terabytes per second (TBps) refers to a data transmission rate equivalent to 1,000 gigabytes, or 1,000,000,000,000 bytes per second. This extremely fast data transfer rate is used to quantify various kinds of data transmission between pieces of equipment or software environments, or for some other kinds of data handling. Terabytes per second may also go by the acronym TB/s.

Given the equation "4 __ 5" during a logical test, which of the following operators would result in a TRUE condition?

The "!=" operator declares that the two values are not equal to one another.Looping and branching structures depend on logical tests to determine whether to continue the loop or the branch to follow. A logical test is one that resolves to a TRUE or FALSE value.

What option on iOS protects email and other apps' data at-rest by using encryption?

The "Data Protection" option

Which connector is a legacy analog video interface?

The 15-pin Video Graphics Array (VGA) port (HD15F/DE-15) is a legacy analog video interface for PC devices. Many graphics adapters and display screens continue to support it.

Which 802.11 wireless standard has the greatest rate of data throughput?

The 802.11ac wireless standard allows data throughput of up to 1.7 Gbps at the time of writing. It uses the 5 GHz band.

In Hypertext Markup Language (HTML), what does the <a> tag do?

The <a> tag indicates that the content links to another resource.These are known as anchor tags and are used to represent an internal page link, or to link with an external page.

In Hypertext Markup Language (HTML), what does the <body> tag do?

The <body> tag indicates the main part of the content as a page to show to the client.

In Hypertext Markup Language (HTML), what does the <h1> tag do?

The <h1> tag indicates that the content is a heading level.

In Hypertext Markup Language (HTML), what does the <html> tag do?

The <html> tag is the top-level parent element that identifies the type of document.

In Hypertext Markup Language (HTML), what does the <p> tag do?

The <p> tag indicates the content is a paragraph-level block.

You've been tasked with changing the primary key in the Customer table from the CustID field to the AcctNum field. Which Data Definition Language (DDL)(Data Definition Language) command can do that?

The ALTER TABLE command can be used to add, remove, and change table columns, primary keys, and foreign keys. The UPDATE command is not a DDL command because it modifies data values inside a table, but doesn't modify the structure of a table. CREATE TABLE is a DDL command used to create a new table, and to establish a primary key at creation time. It cannot, however, be used to modify the primary key after it has been created. The INSERT command only inserts data into an existing table and is not a DDL command.

Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption.

char

The CHAR data type stores character data in a fixed-length field. Data can be a string of single-byte or multibyte letters, numbers, and other characters that are supported by the code set of your database locale.

A register is found within what part of the computer?

The Central Processing Unit (CPU)

Which of the following is NOT an example of a management Graphical User Interface (GUI) or interface snap-in or applet tool?

The Command Line Interface is not a snap-in management tool. It is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (Command lines).

What is symptom of an overheating computer?

The Computer locks up,freezes, or shuts down.

You need to back up just over 9 GB of data from your hard drive to an optical disc so you can store it offsite. You want to use just one disc to keep costs down, and you want to leave as little unused space on the disc as possible. What type of optical media should you use?

The DVD-10 is Single-layer Double-sided with a maximum capacity of 9.4 GB of data and is the best choice to hold the data with little leftover free space.

How is a Graphics Processing Unit (GPU) different from a Central Processing Unit (CPU)?

The GPU is a dedicated processor for display functions.

What part of the Central Processing Unit (CPU) determines whether it is 32-bit or 64-bit?

The General Purpose (GP) register

What unit of measure is used to describe disk capacity?

The Gigabyte (GB), which is 1000 x 1000 x 1000 bytes

What is the advantage of downloading files from a site that begins with HTTPS as opposed to HTTP?

The HTTPS site uses SSL/TLS to encrypt data and provide a secure connection.

frame

The IP datagram is put into a frame. Frames can only be delivered over a local network segment.

Your new device has a web-based configuration. What do you need to access the configuration page?

The Internet Protocol (IP) address

What does a Java Virtual Machine (VM) do?

The Java VM converts source code into machine code to run on the hardware platform.

If you are experiencing a problem caused by an outdated driver, where should you look to update it?

The Support section of the manufacturer's website

Media transfer Protocol(MTP)

The Media Transfer Protocol (MTP) is an extension to the Picture Transfer Protocol (PTP) communications protocol that allows media files to be transferred atomically to and from portable devices.[1] Whereas PTP was designed for downloading photographs from digital cameras, Media Transfer Protocol allows the transfer of music files on digital audio players and media files on portable media players, as well as personal information on personal digital assistants. MTP is a key part of WMDRM10-PD,[1] a digital rights management (DRM) service for the Windows Media platfor

Medium to large files are measured in what unit?

The Megabyte (MB), which is 1000 x 1000 bytes

Which of these is acting as a local file server?

The Network Attached Storage (NAS) device on the network

.odf (file format)

The Open Document Format (ODF) is an XML-based open source file format for saving and exchanging text, spreadsheets, charts, and presentations.

Preboot Execution Environment (PXE)

The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator. The PXE code is typically delivered with a new computer on a read-only memory chip or boot disk that allows the computer (a client) to communicate with the network server so that the client machine can be remotely configured and its operating system can be remotely booted. PXE provides three things:

In a database where each employee is assigned to one project, and each project can have multiple employees, which database design option would apply?

The Project table has a primary key of ProjectID. The Employee table has a primary key of EmployeeID and a foreign key of ProjectID. Each of these tables needs a primary key, to uniquely identify each row with the corresponding ID field: ProjectID for the Project table and EmployeeID for the Employee table. Since each employee is assigned to only one project, the Employee table needs the ProjectID field as well, to identify which project each employee is assigned to. This field becomes the foreign key that relates with the Project table, and each ProjectID can appear in several records of the Employee table.

Into which device would you plug an RJ-11 connector?

The RJ-11 jack is the standard telephone jack in the United States. You would plug this into a telephone or fax line port on the back of a multifunction printer.

What type of connector would you use on the Wide Area Network (WAN) port of a Digital Subscriber Line (DSL) modem?

The RJ-11 ports are on the DSL (Digital Subscriber Line) modem/router appliance used to connect a home network to the Internet. The Internet or Wide Area Network (WAN) port on the router will be the RJ-11 type.

What is the main difference between a Solid State Drive (SSD) and a Hard Disk Drive (HDD)?

The SSD uses flash memory and the HDD uses platters.

What Windows utility monitors the system for changes to core system files and drivers, as well as the registry?

The System Restore utility creates restore points, which are snapshots of the system configuration at a given moment in time. You can use these restore points to revert to an earlier state of your system settings without affecting user data, such as documents.

User Account Control (UAC)

The UAC is intended to prevent unintentional/unauthorized changes to the computer by either prompting for permission to continue, installing a program or hardware device, changing a security setting, or requiring the administrator password before continuing.

Uniform Resource Locator (URL)

The URL contains the information necessary to open a page on the web. Uses the HTTP protocol.

Uniform Resource Locator (URL)

The URL(or web address) contains the information necessary to identify and (in most cases) access an item. The set of letters that identifies the address of a specific resource on the Web.

Which wireless encryption standard improves on Wired Equivalent Privacy (WEP) by adding the Temporal Key Integrity Protocol (TKIP)?

The Wi-Fi Protected Access (WPA) security standard and certification fixed most of the security problems found with Wired Equivalent Privacy (WEP). WPA still uses the same weak RC4 cipher as WEP but adds a mechanism called the Temporal Key Integrity Protocol (TKIP) to make it stronger.

What service does the Windows BitLocker feature provide?

The Windows BitLocker feature provides full disk-encryption protection for the operating system. BitLocker ensures the protection of early startup components and locks volumes in order to prevent access or tampering when the operating system is not running.

What is packet switching?

The ability of one computer to forward information to another using any available pathway

What functionality does an Internet of Things (IOT) home appliance provide to a homeowner?

The ability to check inventory levels or start a washing machine cycle remotely

What functionality does an Internet of Things (IOT) thermostat provide to a homeowner?

The ability to control heating, ventilation, and air conditioning (HVAC) from an app installed on a phone

What functionality does an Internet of Things (IOT) security system provide to a homeowner?

The ability to monitor and control alarms, locks, lighting, and videophone entry systems remotely

What functionality does an Internet of Things (IOT) streaming media device provide to a homeowner?

The ability to play stored content through any smart speaker or TV connected to the home network

hot-swappable

The ability to plug or unplug devices without first powering down the system. USB devices are hot-swappable.

What functionality does an Internet Protocol (IP) camera provide to a business owner?

The ability to see a coverage area through either direct connect or snapshots uploaded to the cloud

burning

The act of copying information onto a compact disc (CD) using hardware called a CD burner. Mimicking the structure of a normal CD.

dumpster diving

The act of digging through trash receptacles to find information that can be useful in an attack.

Process Management

The act of executing and controlling the productive functions of a firm

What type of application delivery method requires the least amount of infrastructure from the client?

The advantage of a cloud-hosted system is that it requires very little infrastructure from the client. Cloud-hosted servers are often hosted on well-established, state-of-the-art hosting environments that can be far superior to most corporate server environments.

What is data correlation?

The analysis of the whole data set to find connections and links betweeen data points

What is a significant advantage of cloud-based backups?

The backups are geographically dispersed. A significant advantage of cloud-based backups is that the backups are geographically dispersed. This protects your data from natural disasters that may physically destroy the original systems and the data residing on those systems. Cloud-based backups rely on the security of the service provider, which is typically defined in the Service Level Agreement (SLA). Depending on the organization's policy and the service company's policy, the backups may or may not be more secure in the cloud. Restore time is likely greater in the cloud, as large amounts of data must be retrieved over the network. The cost of cloud-based backups may or may not be cheaper, depending on the specifics within the Service Level Agreement (SLA).

digital signal processing (DSP)

The basis of sound card is the (DSP) chip, which processes data from the computer to output a signal to drive the speakers and processes audio input from a microphone to convert it to computer data.

What is the basic unit of computer data?

The binary digit or bit, which can represent two values (0 or 1)

What is the first multiple of a bit?

The byte, which represents eight bits

Global System for Mobile Communications (GSM)

The cellular network standards used by AT&T and T-Mobile. (13)

Which pseudocode adds a value to the first element in the array?

The code "Logons(0) = find LastLoggedOnUser and get Forename" adds a value to the first element in the array. The variable that is being set represents a one-dimensional array, because there is only one number inside the parentheses. Array elements begin with 0, so Logons(0) is the first element in the array Logons.

Which pseudocode populates the first row and first column?

The code "Logons(0,0) = find LastLoggedOnUser and get Forename" populates the first row and first column of a two-dimensional array Logons. Array elements begin with 0, so Logons(0) is the first element in a one-dimensional array, and Logons(0,0) is the first element, in both rows and columns, in a two-dimensional array.

Which psuedocode defines a one-dimensional array allowing up to ten rows?

The code "declare Logons(9) as string" defines a simple array allowing up to ten rows. The number of possible elements in an array is fixed when the array is declared.

Which pseudocode creates a two-dimensional array?

The code "declare Logons(9,1) as string" creates a two-dimensional array, with 10 rows across 2 columns, of string data type. The quantity of numbers inside the parentheses corresponds to the dimensions of the array.

Group use/site license

The company can install the software on an agreed number of computers for an unlimited number of employees to use at the same time ex: Concurrent license

What is a privacy concern related to free file storage sites?

The company may use metadata from your files for advertising and marketing purposes. Most providers of "free" services will take the opportunity to scan any content they process on your behalf and extract metadata from it. The service provider will aggregate and summarize this data for advertising and marketing/demographic analysis and may sell it to other companies. As long as the file storage company is a reputable site, it is unlikely that they will sell your files to another company; however, they may sell the metadata. Access controls are usually the responsibility of the consumer. If files are accidentally shared publicly, it is likely the result of the consumer misconfiguring the system. A natural disaster is a physical risk that can happen anywhere; however, it is not a privacy risk.

hard disk drive (HDD)

The computer's nonvolatile, primary storage device for permanent storage of software and documents. HDD 3.5- Desktops HDD 2.5-Laptops

Why is it important to understand the different data types that a computer program can use?

The data type determines what sort of operations can be performed.

Why is a client-server application considered a two-tier architecture?

The database runs on a database server, while the application is run on the client computer.The database processing in a client-server application takes place on a server, while the application resides on the user's workstation. It's a good example of two-tier architecture.

You cannot access the wireless network. In Device Manager, you see a small red X near the network adapter. What does this indicate?

The device has been disabled.

What design consideration can typically be found in a server?

The device has extra copies of many components to make the system more fault tolerant.

What design consideration can typically be found in a gaming console?

The device is optimized to use an HDTV as the primary display and a wireless controller for input.

What design consideration can typically be found in a workstation computer?

The device requires peripheral devices connected to the motherboard via ports.

If you plan on diagnosing a problem by searching technical forums or other Internet resources, what information should you provide if you are getting an error message?

The exact text of the error message.

ext4(file system)

The ext4 journaling file system or fourth extended filesystem is a journaling file system for Linux, developed as the successor to ext3. It is the default file system for most Linux distributions. delivers significantly better performance than ext3 and would usually represent the best choice for new systems

EXT File System

The extended file system, or ext, was implemented in April 1992 as the first file system created specifically for the Linux kernel. It has metadata structure inspired by the traditional Unix File System (UFS) and was designed by Rémy Card to overcome certain limitations of the MINIX file system.[1] It was the first implementation that used the virtual file system (VFS), for which support was added in the Linux kernel in version 0.96c, and it could handle file systems up to 2 gigabytes (GB) in size.[2] ext was the first in the series of extended file systems. In 1993 it was superseded by both ext2 and xiafs, which competed for a time, but ext2 won because of its long-term viability: ext2 remedied issues with ext, such as the immutability of inodes and fragmentation.[3]

Which of the following is a common concern regarding the accuracy of biometrics?

The false-negative and false-positive rate Biometrics can be prone to false negatives, where a valid user is refused access. Similarly, false positives occur when an intruder is misidentified as a valid user or one user is mistaken for another. A device that tracks a person's physical location is a function associated with and a concern of geolocation or geopositioning. Theft of the token from a computer is a concern related to software tokens. For example, the theft of a cookie can be used to steal an active session. Capturing credentials and replaying them on a network is a concern associated with usernames and passwords.

What happens when a user running Word 2003 tries to open a .docx file?

The file may cause issues, since it is a format that was created in Word 2007 or later.

Compression

The file system can automatically reduce the amount of disk space taken up in a file.

Evolved High-Speed Packet Access (HSPA+)

The final wireless 3G data standard, transferring theoretical maximum speeds up to 168 Mbps, although real-world implementations rarely passed 10 Mbps.

You notice that your monitor is flickering a lot. What is a likely explanation for this issue?

The first thing you should do is ensure that the cable is securely connected. If it is, the problem might be that the screen refresh rate is too high or too low. A typical refresh rate for a computer is 60-70 hertz (Hz). Flickering might also be the result of old or incorrect drivers being used

Transport layer

The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. Each application protocol is identified at the transport layer by a port number. There are two transport protocols: Transport Control Protocol (TCP) and User Datagram Protocol (UDP)

What is NOT considered a challenge of using cross-platform applications?

The functional strength and performance of JavaScript/HTML5-based apps is at an advanced level. These apps incorporate native capabilities of mobile platforms, consume less energy on mobile devices, are easier to deploy, and have decent support for cloud services.

What are grinding noises coming from the system most likely a warning sign of?

The hard drive is physically damaged.

boot partition

The hard drive partition where the Windows OS is stored.

fully qualified domain name (FQDN)

The hostname can be combined with information about te domain in which the host i located to produce a Fully Qualified Domain Name(FQDN) The complete domain name of an Internet computer, such as www.CIWcertified.com.

Telepresence

The impression created when remote participants in an interactive video meeting are almost life-sized and vividly clear; useful for sensitive negotiations.

What command would you use if you wanted a computer to drop its current IP address?

The ipconfig /release command will terminate any active TCP/IP connections on all network adapters and free up those IP addresses.

What command would you use if you wanted the computer to obtain a new IP address from the network host?

The ipconfig /renew command will re-establish a TCP/IP connection on all network adapters. This command is often used after the ipconfig /release command, which frees up the IP addresses on all adapters.

What is the primary difference between a LAN and a WAN?

The key difference between a LAN and a WAN is the physical distance that the network spans. The LAN, by definition, is a local network of devices in a particular physical location. A Wide Area Network (WAN) is used to connect devices over great distances, and is often used to network computers in different office branches across the country or even internationally.

What is the key difference, in programming terms, between a procedure and a function?

The key difference, in programming terms, between a procedure and a function is that the latter can return a value to whatever called it, whereas a procedure cannot.

How is a key/value pair database different from a relational database?

The key/value pair database stores only necessary properties with each object. The relational database requires all of the fields (properties) to be defined for each table (object). In a relational database, all attributes of a record are defined up front, and each record has all of the same attributes as the other records. In a key/value pair database, objects and their properties are stored, but each object doesn't have to have all of the properties.

Very High Bitrate DSL (VDSL)

The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiber-optic cabling to increase effective distances.

You've written an SQL query for an "Order" table: SELECT ProductName, Price from ProductMaster. Now your mentor asks you to add this line to your query: ORDER BY PRICE. How will that affect your query results?

The list of product names and prices will now be sorted by price.

What is an example of an Internet of Things (IoT) device?

The main difference between a laptop and a tablet is the lack of a physical keyboard on a tablet. Some devices attempt to bridge this gap by making detachable keyboards for tablets or adding a flipping or rotating screen to convert a laptop into a tablet.

hardware failure

The most common cause of data loss.Generated by a failure, such as power failure or memory parity error.

Which wireless standard would give newer devices the maximum possible transfer rate?

The most recent standard is 802.11ac, which operates on the 5GHz spectrum band and can achieve a maximum transfer rate of 1.7 Gbps. The number of channels available affects the throughput (i.e., speed).

What is used to connect chipsets and sockets using buses?

The motherboard

Software development

The multistep process of designing, writing, and testing computer programs.

rpm (revolutions per minute)

The number of times per minute that a hard disk platter rotates. Indicates the speed of hard drive platters. Common speeds are 5,400, 7,200, 10,000, and 15,000 rpm.

What manages memory on a computer?

The operating system will do the best job it can with the resources available.

In which order are the rows typically stored in a relational table?

The order in which they were entered into the database

Which statement is NOT true regarding SQL permissions?

The owner of a table can assign only the permission to view (not update) data in the table to other users. The owner of a table, or the database administrator, can grant SQL permissions that allow users to view, update, and delete existing data, and to create new data, all using SQL commands.

You have been placed on a project to update the addresses of customers in a "Customer" table. Who can issue the SQL commands to give you permission to update the data in that table?

The owner of the "Customer" table Permissions can be granted by the owner of a database or table—and by anyone to whom that owner has given GRANT permissions. You may have to obtain written permission from the security manager to provide to the database owner, but even the security manager may not have permission to issue the SQL commands. Your supervisor may have to sign off on your request for permissions, but they can't issue the SQL commands unless they own the database or table. Human Resources may have to approve certain security clearances, but would not issue the SQL commands.

Instruction Set Architecture (ISA)

The part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external I/O.

If someone claims to be receiving spim, what problem is occurring?

The person is receiving advertising or promotional schemes through instant messaging.

Hardware

The physical components of a computer.

Command Line

The place where typed commands are given to the operating system

While working at your desk, you get a call from your bank. The representative tells you that he needs you to confirm your account number and password. What is the likely reason for this call?

This is most likely an illegitimate attempt to extract information from you.

In a relational database, what is the relationship between a primary key and a foreign key?

The primary key is in one table and it is matched to the foreign key in a secondary table. The primary key uniquely identifies each row. The foreign key, in a secondary table, is not necessarily unique, but it does match up with the primary key in the first table to create a relationship between the two tables. That way, related data can be extracted from both tables.

hard drive

The primary storage component of a computer which holds all software and data.

If someone refers to an application as "bloatware," what are they saying about it?

The program consumes an excessive amount of system resources. Bloatware is a term that refers to an application that consumes an excessive amount of system resources—typically, processing power or RAM. Some technicians use the term to refer to applications that are automatically installed on a computer that comes "out of the box" as well.

Open Source Software (OSS)

The programs distributed and licensed so that the source code making up the program is freely available to anyone who wants to examine, utilize, or improve upon it.

Resource pooling

The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.

measured service (cloud computing)

The providers ability to control a customers use of resources through metering is referred to as measured service.clients can monitor and measure transactions and use of resources

power redundancy

The provision of a backup power source, such as a generator.

objects

The resources, these could be networks,servers,databases, files, and so on.

In a relational database, data is organized into tables that are made up of rows and columns. The term "record" is a synonym for which of these terms?

The rows in a relational database are also called records. The term "record" has a logical meaning: each patient has a record. It is also a term that was originally used for a row in a flat file, and the term continued to be used after the advent of database technology.

In which step of the troubleshooting process do you question the obvious?

The second step, in which you establish a theory of probable cause

Non-repudiation

The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place. Ex: Video surveillance, biometrics, signatures, receipt-issuing a token or receipt is proof that user requested that product and delivered.

Intergers

The set of whole numbers. For example 5,21, or 6789. An integer data type consumes 1 to 8 bytes of computer storage.

Why is it important to consider the number and size of columns included in a table schema?

The size of each row affects the amount of storage used, and how quickly it can be processed. Storage is important, but processing speed is often a critical factor in database applications. Rows must be kept as succinct as possible by carefully choosing field sizes, because each row is read into memory during processing.

Which of the following is NOT important to consider when choosing a programming language?

The size of the source file is not important when considering which programming language to use for a project.

What is an advantage of developing software using a single-platform model?

The software can perform better, and it is easier to check the software for errors because it was tailor-made for a specific platform.

small office/home office (SOHO)

The sort of equipment and networks used at home and in small businesses are often described as SOHO(small office Home office) A SOHO network is typically based around a single multi-function device.

Hyper Text Markup Language (HTML)

The standard markup language used to create web pages. It is written in the form of HTML elements consisting of tags enclosed in angle brackets (like <html> ).

Your manager has asked you to display the customer database schema. What useful information will your schema provide?

The structure of the database

After performing the standard troubleshooting steps, your built-in Ethernet port still isn't functioning. Which option should you check before escalating the problem?

The system BIOS

What is a basic restriction found in software licensing?

The terms of the license will vary according to the type of software, but the basic restriction is usually that the software may be installed on only one computer (single use license).

drive-by download

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website.

The value "CompTIA" is a representation of which data type?

The value "CompTIA" is a representation of the string data type. A string is a collection of text characters.

Why might a table called "Products" in a relational database have twelve rows?

There are twelve products.A relational table called "Products" is most likely designed to track the different products a company sells or manufactures. There would be one unique row in the table for each product—twelve products, twelve rows.

Redirection

This is where the user tries to open one page but gets sent to another.

802.11a/b/g/n/ac (Wi-Fi standards)

There are a lot of standards for Wi-Fi networks and how they should operate. The standards for Wi-Fi communication are always named beginning with "802.11" and end with different characters such as "a", "b", "n" or "ac". 802.11a-802.11a is also one of the older standards. It supports much higher speeds, up to 54 Mbps, but over the 5GHz band. 802.11b-802.11b is one of the oldest Wi-Fi standards. It supports a theoretical maximum throughput of 11 Mbps over short ranges using the 2.4GHz band. 802.11g- is the successor of 802.11b. It runs over 2.4GHz and supports up to 54 Mbps. 802.11n-802.11n 802.11n is a big upgrade compared to the previously mentioned standards. It is backward compatible with 802.11b and 802.11g and must support 2.4GHz communication. But it can also offer optional support on the 5GHz band and then also has backward compatibility with 802.11a. 802.11ac-The latest Wi-Fi standard (as of 2015-2016) is called 802.11ac. All 802.11ac devices are backward compatible with 802.11n.

Structured databases work well, but why is it sometimes a better choice to store data in unstructured and semi-structured databases?

There are certain types of data (PowerPoint presentations, text files, Word documents, etc.) that are more easily stored without the rigid formatting a structured database requires.

The network number(network ID)

This number is common to all hosts on the same IP network

How is the amount of storage that can be used by a string limited?

There is no limitation to the amount of storage used by a string.

While browsing through a set of directories, you see a folder called New Folder (2). What can you tell about this folder?

There was already a folder called New Folder in the directory at the time it was created.

Network Redundancy

having multiple backups to ensure reliability during cases of high usage or failure

Which of the following BEST describes the purpose of properties in object-oriented programming?

They allow external code to access a field of an object. Properties allow external code to ask the object to show or change the value of one of its fields. They represent an alternative way of accessing a field publicly, instead of using a method to access an attribute.

How do social networking sites attempt to handle privacy concerns for users?

They allow information to be classified, such as marking it as public or private. Social networking sites provide an opportunity to grow social connections and keep in touch with friends; however, the sites come with privacy risks that need to be considered before posting. Privacy controls vary by site, but most have a mechanism for assigning information a classification, such as public, friends-only, or private. Some social media sites are public in nature, in which case privacy is non-existent. However, most sites have some form of privacy controls that can be set. Once information is public, it is nearly impossible to make it private again. Information can quickly be indexed by search engines or archived by other websites. Most social networking sites do not default to private since the primary purpose of the site is to share information.

Which statement BEST describes batch files?

They are a collection of command-line instructions that you store in a .CMD file.

Which of the following BEST describes the purpose of attributes?

They are values and data types that define the object.

How are onboard and add-on Network Interface Cards (NIC) different?

They both function the same

Which of the following accurately describes arrays?

They can be either single-dimensional or multi-dimensional.Arrays can be either single-dimensional or multi-dimensional. An array is an identifier for a group of variables of the same type. The number of possible elements in an array is fixed when the array is declared.

Which of the following BEST describes the purpose of methods?

They define what you can do to an object.

Which negative factor must be considered when developing with interpreted languages?

They must be converted into machine code, therefore increasing runtime.

Why are server operating systems likely to include software packages (or roles)?

They often use one role to run network services and a different role to support specific functions for more users.

Which is NOT a legitimate source for obtaining setup files or device drivers?

Third-party sites such as download.cnet.com

FAT 32 (File Allocation table 32 bit)

This file system retains some features of the original FAT while reducing the maximum size limit of the file cluster so the space on the disk can be more efficient.File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a continuing standard which borrows source code from the original, legacy file system and proves to be simple and robust.[3] It offers useful performance even in lightweight implementations, but cannot deliver the same performance, reliability and scalability as some modern file systems.

Passive Cooling

This is a liquid cooling technique that uses a radiator to pump liquid through several tubes to help cool a CPU

Active Cooling

This is a liquid cooling technique that uses a refrigerator unit to pump refrigerant coolant through the computer to help keep it cool.

DVDRW (digital video disk rewritable)

This type of disc stores data in one long spiral track. It can be written to multiple times.

The host number(host ID)

This unique number identifies a host on a particular network or logical sub-network

If the IT administrator asks you to prevent snooping by sanitizing an old hard drive, what action should you take?

Thoroughly delete and overwrite any traces or bits of sensitive data on the hard drive.

You have a new external hard drive. Which of these ports could be used to connect to the device?

Thunderbolt

What is the main purpose of the Thunderbolt interface?

Thunderbolt is a display interface (like DisplayPort) and a general peripheral interface (like USB or Firewire) developed by Intel and primarily used on Apple workstations and laptops.

Bit Cell

Time needed to transmit a single bit

What is the SQL UPDATE command used for?

To change the value in one or more fields in a table The UPDATE command specifies one or more field values to be updated. If a WHERE clause is added, those fields are updated only for the rows that satisfy the selection criteria. For example, the command could be used to change the grade for one specific student from a B to a C if the studentID was specified in a WHERE clause. A field name can only be changed with the ALTER command. In some cases, the table needs to be dropped and recreated to change a field name. SQL commands are not used to add security updates. A table is dropped from the schema/database with the DROP command, and added with the CREATE TABLE command.

What is the SQL UPDATE command used for?

To change the value in one or more fields in a table The UPDATE command specifies one or more field values to be updated. If a WHERE clause is added, those fields are updated only for the rows that satisfy the selection criteria. For example, the command could be used to change the grade for one specific student from a B to a C if the studentID was specified in a WHERE clause.

What is the purpose of the SQL DROP command?

To delete a table or an entire database

What is the purpose of authorization?

To ensure that the person has the right to access a file or perform an action

When should you use Hexadecimal notation?

To express large numbers more than 10 values to column (up to 15) with 0-9 is 0-9 numbers 10-15 is letters A-F

What is the purpose of patching systems?

To harden systems by keeping operating system files, driver software, and firmware updated

What is the primary purpose of the Windows PowerShell Integrated Scripting Environment (ISE)?

To help create and manage your Windows PowerShell scripts

Why is it important to ask a user questions when first hearing about a problem?

To help you classify the problem in terms o1f nature and scope

Query languages, such as Structured Query Language, are designed for what purpose?

To retrieve specific records from a dataset

What design consideration can typically be found in a laptop?

To use different system components that are smaller, lighter, and draw less power

Application layer (OSI model)

Top level, Layer 7 of the OSI model, it provides application services to a network.Contains protocols that provide the communications formats for exchanging data between hosts such as transmitting an email message or requesting a web page.

What is the best tactic for defeating social engineering?

Training users to recognize and respond to social engineering situations

TCP/IP (Transmission Control Protocol/Internet Protocol)

Transmission Control Protocol/Internet Protocol, suite of protocols works to provide the apps and services we increasingly rely on. A protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.

backdoor applications

Trojans function as backdoor applications. it allows the attacker to access the PC when backdoor is installed.

USB Ports and Connectors

Type A-For connection to the host(flat rectangle shaped) Type B-For connection to a device (square shaped) Type C-A reversible connector type which can be inserted either way up Type B Mini-a smaller connector for connection to a device Type B Micro-an updated connector for smaller devices, such as smartphones and tablets.

LCD (liquid crystal display)

Type of display commonly used on portable computers. LCDs have also replaced CRTs as the display of choice for desktop computer users. LCDs use liquid crystals and electricity to produce images on the screen.

flash memory

Type of nonvolatile memory that can be erased electronically and rewritten. Doesn't need a power source to retain information.

You added a Small Office Home Office (SOHO) access point to your home network. How would you access the management page for the device?

Type the device's IP address into your web browser.

Which of the following is a correct Universal Naming Convention (UNC) format for a shared folder?

UNC format uses a double slash (\\) followed by the server name and then a single slash followed by the shared folder name. The line \\GTSLEARNING\DocShare is an example of correct UNC format.

tar (compression format)

UNIX format writing to magnetic tape. A third party utility is required to create and decompress tar files in windows.

You just bought a new smartphone that did not come with the necessary USB charging cable. In the instructions booklet, a picture of the charging cable depicts the device end of the cable as being flat on both sides and reversible. What type of cable do you need?

USB Type C is a new reversible connector that can be inserted with either side facing up.

Websites tend to use what Unicode Standard?

UTF-8

Data Exfiltration

Unauthorized transfer of data from an organization to a location controlled by an attacker

Patent Infringement

Unauthorized use of another's patent. A patent holder may recover damages and other remedies against a patent infringer.

UEFI

Unified Extensible Firmware Interface provides support for 64-bit CPU operation at boot, a full GUI and mouse operation at boot and better boot security

After you finish installing a fresh copy of Windows, you notice that several unnecessary applications were automatically installed as part of a bundle with the operating system. What should you do?

Uninstall any unnecessary applications by using the uninstall feature

unstructured data

Unstructured data is a data that is which is not organised in a pre-defined manner or does not have a pre-defined data model, thus it is not a good fit for a mainstream relational database. So for Unstructured data, there are alternative platforms for storing and managing, it is increasingly prevalent in IT systems and is used by organizations in a variety of business intelligence and analytics applications. Example: Word, PDF, Text, Media logs.

What is the best long-term solution to ensure compatibility with today's web browsers?

Upgrading web applications

What can be done to change or extend the functionality of a web browser?

Use browser add-ons.

Which action is an example of an appropriate redundancy measure?

Using a backup power generator in a hospital to provide electricity to critical life-support systems Redundancy helps prevent outages and possible data loss; however, the technique used should fit the situation. Using a backup power generator on life-support systems is a good usage of power redundancy. A small office network will likely have only one router and a single path to the Internet. Network redundancy is likely not required in this situation. Redundant Array of Independent Disks 5 (RAID 5) involves striping data across multiple drives and using parity data to rebuild damaged disks. This technique would not be used on removable media. Replication between a primary site and a hot site would be appropriate for high-availability systems, not a home-based office.

What action can help mitigate the risk of unexpected power outages?

Using a backup source, which provides a means to safely close down a server

How do cyber criminals typically use wiretapping to steal information?

Using a hardware device that inserts the hacker between two hosts

Full Device Encryption

Using a passcode or application to completely encrypt your device

computer-aided manufacturing (CAM)

Using computers to operate and control machines and processes to manufacture a product.

A user wants to transmit a sensitive file via an unsecure method such as email. What technique would you recommend?

Using file-level encryption

Most programming languages are similar in their structure and syntax, but it is important to use the specific syntax of a given language. Why?

Using incorrect syntax creates errors, causing the code not to compile or run.

single sign-on (SSO)

Using one authentication credential to access multiple accounts or applications.

Which of these is NOT considered a best practice policy for naming files?

Using spaces in the file name can cause issues. Some software will not recognize file names with spaces, and file names with spaces must be enclosed in quotes when using the command line. How you organize and name your files will have a big impact on your ability to find files later and to understand what they contain.

How does a Uniform Resource Locator (URL) get translated to an Internet Protocol (IP) address?

Using the Domain Name System (DNS) resolution process

What programming language is VBScript based on?

VBScript is a scripting language based on Microsoft's Visual Basic programming language. It provides similar functionality to JavaScript. VBScript is often used by network administrators to perform repetitive administrative tasks.

Which connector is a legacy analog video interface?

VGA

What type of network uses tunneling to encrypt data, protecting communications between two endpoints sent through a public network?

VPN(Virtual Private Network)

What is the primary purpose of storing backups in an offsite location?

Valuable data is protected in case of a disaster.

Attributes(object-oriented programming)

Values and data types that define the object.

What should you be looking for when you read software licensing agreements?

Verification that you have a valid agreement or license to install and use the product

What should NOT be done before trying to install an application?

Verify that the software will run on your computer by pressing the executable command

VGA (video graphics array)

Video Graphic Array (VGA) The VGA translates binary-coded information (0s and 1s) into the color combinations required to make up an image on your computer screen. Video Graphics Array, standard for the res and color depth of computer displays (640x480) 16 colors @60hz

What is the standard resolution of the Video Graphics Array (VGA)?

Video Graphics Array (VGA) standard, which specifies a 640x480 resolution with 16 colors (4-bit) at 60 Hz and is long obsolete.

What type of software allows users to configure virtual meeting rooms to talk face-to-face over the Internet?

Video conferencing software

What does Internet Message Access Protocol 4 (IMAP4) allow a user to do that Post Office Protocol 3 (POP3) does not?

View the same email from many different devices

You need to update a device that was installed two years ago. What action should you take to find the most recent updates?

Visit the website of the company that manufactured the device.

What software assists in the creation of a schematic representation of simplified drawings showing the appearance, structure, or workings of something?

Visual diagramming software

Which type of encryption should be avoided when configuring a wireless router?

WEP

Which wireless encryption standard improves security by adding Advanced Encryption Standard (AES) cipher-based authentication?

WPA2

shoulder surfing

Watching an authorized user enter a security code on a keypad.

WiFi (wireless fidelity)

a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet

MEMORY

When a program starts its instructions are loaded here

Which of the following is NOT a best practice when installing software from a remote location?

When installing software packages remotely, you must take several factors into consideration. One of those is the destination directory for the application. You should not install a program to the root of the C drive. It is better to install programs to the Program Files directory.

Patent Infringement

When someone used,makes,sells, or imports your invention without your permission

Single Points of Failure

When the failure in a single component of a system can cause a system to fail or be seriously degraded

When would open authentication be appropriate for a wireless network?

When the network is completely public and intended for everyone

Which of the following is NOT an example of a function?

While (not a function)(A function is sum,write,prompt)

How are integers represented?

Whole numbers that are in base 10, such as 5, 21, or 65536

Which system uses an automatically generated Service Set Identifier (SSID) and encryption keys to configure wireless networks?

Wi-Fi Protected Setup (WPS) allows the router to use an auto-generated SSID and encryption key, and for these to be communicated to the client without the user having to enter them manually.

WMV (video file)

Window Media Video, a video container file format developed by Microsoft, well supported by media players and can be used as the format for DVD and Blu-ray Discs

.doc/docx (file format)

Word document

Which type of software allows the user to write and edit a document?

Word processing software

What does a programmer do?

Works with programming language(s) to write code for applications

Why might a language like Extensible Markup Language (XML) be commonly used in a document database?

XML(extensible markup language) makes it easier to parse and sort through the data in a variety of types of documents.

Where do you go to configure a pop-up blocker?

You can configure a pop-up blocker in browser settings. Depending on which browser you are using, you can determine specifically how you set the blocker.

File Explorer options

You can find the navigation pane to expand and collapse objects or the breadcrumbs on the address bar and back and forward buttons on the toolbar

What limitation is placed on a number when it is entered as a character data type?

You cannot perform mathematical operations on it.

thunderbolt

You have a new Apple workstation and you are looking for a port on the machine where you can plug in either a monitor or a peripheral. What type of port would you use?

Why should you consult your hardware manufacturer's documentation prior to attempting a Do-It-Yourself fix?

You might void your warranty if you tinker with the hardware.

You just connected a monitor to your VGA port, but the monitor is showing the same thing that is on your laptop screen. What do you need to do in order to have different applications open on each display?

You need to go to the Display options and select the option to extend the desktop across all displays.

After installing an application, you experience difficulty getting it to run. What should you do?

You should inspect the properties of the executable file (or a shortcut to it). The Details tab is useful for troubleshooting, as it will let you know whether you are running a version with the latest patches. The Compatibility tab can be used to run the program in a compatibility mode (for Windows 98, for instance) and adjust the display settings.

What limitation should you be aware of when applying Media Access Control (MAC) filtering on your network devices?

You will need to modify the safe list for each new authorized client device going forward.

You are using a scanner to scan a Word document into your computer. What type of software would you use to convert the image into a computer-editable text document?

You would use Optical Character Recognition (OCR) software to convert a text image into a computer-editable text document.

You are using a scanner to scan a Word document into your computer. What type of software would you use to convert the image into a computer-editable text document?

You would use Optical Character Recognition (OCR) software to convert a text image into a computer-editable text document. Many scanners have this software bundled with the hardware, or it can come as a separate software package.

What type of USB connector would you plug into a host?

You would use USB Type A to connect to a host. The connector and port are both shaped like flat rectangles.

What purpose does branching in programming serve?

Your program runs from the start to the end unless you instruct it to deviate from this path. One way of doing so is to create a branch; this is an instruction to your computer to execute a different sequence of instructions. You use branches to control the flow within your program.

avi (video format)

a legacy Windows-only video format.

Contract of employment

a legal document that sets out the terms and conditions governing a worker's job

What is the advantage of using a Graphic User Interface (GUI) over the Command Line Interface (CLI)?

a GUI is much more visually intuitive, users typically pick up on how to use a GUI faster than a Command Line Interface.

Web Application

a Web Site that allows users to access and interact with software from any computer or device that is connected to the internet

service

a Windows process that does not require any sort of user interaction and thus runs in the background(without a window)

smart card

a card that contains a computer chip that stores electronic money. Contains a chip with authentication data such a digital certificate.

characters

a character (or char) is a single textual character, and can be a letter of the alphabet, a symbol, or, indeed, a numerical character. These consume one byte of storage.

Database

a collection of organized data that allows access, retrieval, and use of data

FOREIGN KEY

a column or group of columns in a relational database table that provides a link between data in two tables

impersonation

a common attack where a person will attempt to figure out a password or other credentials to gain access to a host.

IMAP (Internet Message Access Protocol)

a common protocol for retrieving email messages via the Internet

(ISP)Internet Service Provider

a company that provides access to the internet for a monthly fee. WAN is more likely to use a service provider.

Customer Relationship Management (CRM)

a company-wide business strategy designed to optimize profitability, revenue, and customer satisfaction by focusing on highly defined and precise customer groups

Scripted Language

a computer language that makes use of scripts

(IDS)Intrusion Detection System

a computer program that senses when another computer is attempting to scan or access a computer or network

Personal Computer (PC)

a computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time. a multi-purpose computer whose size, capabilities, and price make it feasible for individual use. An example of personal computers are desktop computers used in homes, schools and small businesses.

file server (network server)

a computer that contains various software and data files for a local area network and contains the network operating system

Schema

a concept or framework that organizes and interprets information

USB(Universal Serial Bus)

a connection technology for attaching peripheral devices to a computer, providing fast data exchange. plug and play 1.1: transfer rate is 12mbps 2.0: 480mbps. 3.0: 5Gbps, 3.1: 10Gbps

dump

a copy of the database or table schema along with the records expressed as SQL statements.

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

digital certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature

Router

a device that forwards data packets between computer networks. A router is the only thing that recognizes an IP address

DMG

a disk image file format used by Apple macOS

dmg (disk image file)

a disk image file format used by Apple macOS.

ISO

a file in one of the formats used by optical media, main formats are ISO 9660 (CDs) and UDF (DVDs and Blu-ray discs)

mount point

a file system configured on a partition on a particular storage device is attached to a particular directory(mount point)within the unified file system using the mount command.

File Attributes

a file's name, the data the file was created, accessed or modified, it's size, it's description, and markers - Read-only (R), Hidden (H), System (S), Archived (A)

Non-Disclosure Agreement (NDA)

a formal legal agreement between two or more parties undertaken by the parties to keep information shared or provided by one party to another confidential.

Byte

a group of 8 bits

network

a group of two or more computer systems linked together

relational database

a highly structured type of database. Information is organized in tables(known as relations).

cookie

a plain text file stored on your machine that contains information about you that's used by a server The purpose of cookies is to store session information so that the website can be personalized for you.

contigency plan

a plan that outlines alternative courses of action that may be taken if an organization's other plans are disrupted or become ineffective

THUNDERBOLT(TB)

a port that transmits both video and data on the same port and cable. The port is shaped the same as the DisplayPort and is compatible with DisplayPort devices. primarily used on Apple workstations and laptops. Used to display interface (like DisplayPort) and as a general peripheral interface

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

DBMS (Database Management System)

a product used for the storage and organization of data that typically has defined formats and structures

Process

a program starts the app code executes in memory as this

driver

a program that determines how a computer will communicate with a peripheral device(software to run hardware)

memory card

a removable storage device used in digital cameras (such as SD cards, compact flashcards)

replication

a replication is a copy (or mirror) of the database hosted on a separate server.

layer and tier

a separate logical function. While a tier is an independent or compartmentalized processing function.

Redundant Array of Independent Disks (RAID)

a set of strategies for using more than one drive in a system. Raid 1- mirroring (2 identical drives) Raid5 - Striping with pairty (3 or more identical drives)

ERGONOMICS

a setup to easily fit the user, such as chair and a desk to make the user be comfortable and work better. Also to reduce RSI

hash

a short representation of data, you take a variable amount of information and the hash function converts it to a fixed length string.

Symmetric Encryption

a single secret key is used to both encrypt and decrypt data. The secret key is so-called because it must be kept secret. if the key is lost or stolen, the security is breached. symmetric encryption is used to encode data for storage or transmission over a network.

WiFi (wireless fidelity or IEEE 802.11a, b, or g)

a standard for transmitting information in the form of radio waves over distances up to about 300 feet.

standard(policies and procedures)

a standard is a measure by which to evaluate compliance with the policy.

product key

a string of characters that certifies that a user is authorized to install a program

.txt (file format)

a text-only file with no binary file information linking the file to a particular software application.

Certificate Authority (CA)

a trusted third-party organization or company that issues digital certificates

DDoS (Distributed Denial of Service)

a type of attack where multiple virus-infected computers are used to target a single system, overwhelming it with traffic, rendering it useless or unresponsive

asymmetric encryption

a type of cryptographic based on algorithms that require two keys -- one of which is secret (or private) and one of which is public (freely known to others).

Open-Source License

a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions.

Kb (Kilobit)

a unit of computer memory or data equal to 1024 bits.

on-access

almost all security software is now configured to scan on-access. This reduces performance somewhat but is essential to maintaining effective protection against malware.

MICROSOFT EDGE:

a web browser to search the internet that's preinstalled on Windows. Windows recommends to use Edge because it provides a consistent browser experience across devices like Android or iOS

garbage in, garbage out (GIGO)

acronym that implies bad input will result in bad output. Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage."

local network adapter or(Ethernet adapter)

allows a computer to join a wired network with other nearby computers by connecting the devices to the same Ethernet switch, or switched fabric in an enterprise network.

password reset mechanism

allows a user who has forgotten a password to self-select a new one.

single-user license

allows user to install software on one computer, make a back-up copy, and sell software after removing from computer

LINUX

based on UNIX OS and developed as a fully open source alternative to UNIX

trust

being convincing or establishing trust, usually depends on the attacker obtaining information about the organization.

UMTS (Universal Mobile Telecommunications System)

broadband, packet-based wireless transmission of text, digitized voice, video, and multimedia at data rates up to and possibly higher than 2 megabits per second, offering a set of services to mobile computer and phone users. See 3G

Kinetics

can refer either to operating a device by moving it around or using a camera in the device to recognize your hand movements.

What command would you enter if you wanted to test the integrity of the E drive and repair any errors that are found?

chkdsk E: /f

Bus

circuitry that connects the various microprocessors and other components on the motherboard.

PROGRAMMING LANGUAGE

code that is used as basis for the apps that are used on your computing device

telecommunications companies

companies that operate national telephone networks

Graphics Interchange Format (GIF) (image file)

compressed bitmap file format (lossless) that supports only 256 colors and is appropriate for the web; supports transparency and animation

identity fraud

compromising someones computer account or masquerading as that person.

Reduced Instruction Set Computer (RISC)

computers designed with a reduced set of computer instructions that includes only the most frequently used instructions so that the computer would get more work done in a shorter amount of time for most applications.

Binary Notation

computers use this notation to calculate and process info. It's a numbering system where each single digit can express only two values, range 0 to 1 (base 2) (Booleen)

switch

connects four or eight computers together in an Ethernet LAN using RJ-45 network ports and twisted pair cabling.

VPN (Virtual Private Network)

connects the components and resources of two private networks over another public network or connects a remote host with an internet connection to a private local network.

internet router/modem

connects the wired and wireless network clients to the internet via a WAN link.

Computer Management

console that contains a number of different administrative snap-ins

third-party cookies

cookies put on a computer by those other than the website being visited, such as advertisers inserting their own cookies on a web page

access point (AP)

creates a Wi-Fi wireless network (WLAN) between computers and mobile devices equipped with suitable adapters and also switches communications between the wired and wireless networks.

wireless(wifi)

data connection use radio signals to transmit signals over the air. With Wi-Fi, a node usually connects to an access point range to about 30m.

Wired

data connections use cabling and either electrical signals over copper wire or light signals over fiber optic to connect nodes.

Transport Encryption

data that is protected such as Secure Sockets Layer(SSL/Transport Layer Security(TLS)

Kbps (Kilobits Per Second)

data transfer rate Kbps - kilobits per second. Short for kilobits per second, a measure of data transfer speed. Modems, for example, are measured in Kbps. Note that one Kbps is 1,000 bits per second, whereas a KB (kilobyte) is 1,024 bytes.A measurement of the number of kilobits transmitted, or capable of being transmitted, in a second.

STORAGE

data written into different types of storage devices like a hard drive or optical discs (Non-Volatile) Ex:HDD (harddisk drive, SSD(Solid State Drive)

Recycle Bin

deleted files are left here; in case you accidentally deleted a file or folder you can come here to recover/retrieve them. Can only hold to 10% of the HD capacity, any larger amount would be permanently deleted to make room for the newly deleted files

Clearing the cache

deletes any cookies stored on the computer hard drive.Clearing the cache just means emptying it, so the next time you display a web page, everything must be downloaded new.An empty cache means there's no confusion. As you visit web pages hereafter, the browser will download fresh copies of everything you see on each page. You've simply forced your browser to rebuild its cache from scratch as it loads or re-loads pages. Any cache-related issues should be cleared up.

Cryptographic hash

designed to make it impossible to recover the original data from the hash and ensure that no two pieces of information produce the same hash. can be used to prove that a message has not been tampered with.

access controls

designed to protect systems from unauthorized access in order to preserve data integrity

MP3 (moving picture expert group layer 3 audio)(audio format)

developed from MPEG, remains the most popular formats for distributing music and is almost universally supported by media players

Cathode Ray Tube (CRT)

device in older television and computers using electron beams to transmit images to the screen

Plug-and-play

device plugged in that connects instantly and can be used right away, Windows will install the device driver on the spot Ex:Peripherals such as a mouse keyboard which use usb.

lossy compression method

discards some original data in images such as reducing the quality of an image

In terms of coding, what does the acronym XML stand for?

eXtensible Markup Language

transaction

each change in the database is referred to as a transaction.

Snap-ins

each of these configures the settings for a different OS sub-system, like disk management or user management

WAV(audio format)

early Windows audio file format, not widely supported by media players but may be used by audio editing apps

SHORTCUT ICONS:

ease of access for programs

Online workspace

enables users to work with common files in a shared space on the web

Internet Layer (TCP/IP)Transport Control Protocol

encapsulates packets onto internet datagrams and deals with routing between different networks.

user account

ensures that the identity of someone using a computer is validated by the operating system at log on.

DUAL-CORE

essentially two processors combined on the same die

Control Unit (CU)

fetches the next instruction in sequence from system memory to the pipeline.

Limitations

file systems have limits in terms of their maximum capacity and the size of individual files.

floats

float stores floating-point values, that is, values that have potential decimal places

ZIP

format developed for the PKZIP utility but now supported "natively" by Windows, Mac OS X, and Linux. This means the OS can create and extract files from the archive w/o having to install a third-party app

hardware address or a Media Access Control (MAC) address

frames use a different addressing method than IP. At the data link layer, each host is identified by the address of its network interface. The MAC address is assigned to the network adapter at the factory. it is a 48-bit value expressed in hex notation. it is often displayed as six groups of two hexadecimal digits with colon or hyphen separators or no separation at all for example. 00:60:8c:12:3a:bc

Guidance(policies and procedures)

guidelines exist for areas of policy where there are no procedures, either because the situation has not been fully assessed or because the decision is complex.

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

PRIMARY KEY

has value in the column ad is used to reference another key, called foreign key.

fan

improves air flow and so helps to dissipate heat.

unified file system

in Linux OS, everything is represented as a file in the file system, including devices.

FAULT TOLERANT

in order for a server to be reliable it needs to starting specifying high quality components and also by using extra copies of components for redundancy

screen resolution

indicates the number of pixels that the computer uses to display the letters, numbers, graphics, and background you see on the screen

Metadata

information about information. Examples of metadata might include the date and time a message was sent, the language it used, and the regions associated with the senders and recipients domains.

Data

information that is stored and processed

PROGRAM SEQUENCE

instructions for your computer to perform

feature updates

introduce new functionality, and therefore pose a small risk to compatibility with other apps or drivers

cross platform software

is a type of software application that which works on multiple operating systems or devices, which are often referred to as platforms.

Relational Database Management System (RDBMS)

is an highly structured type of database. Information is organized in tables known as relations.

real-time operating system (RTOS)

is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. Operating system used by an embedded computer.

SEMI-STRUCTURED DATABASE:

is an unorganized database.

cache

is hardware or software that is used to store something, usually data, temporarily in a computing environment. A small amount of faster, more expensive memory is used to improve the performance of recently accessed or frequently accessed data that is stored temporarily in a rapidly accessible storage media that's local to the cache client and separate from bulk storage. Cache is frequently used by cache clients, such as the CPU, applications, web browsers or operating systems (OSes).

LTE-Advanced (LTE-A)

is intended to provide 300 Mbps down-link, but again this aspiration is not matched by real world performance. Current typical performance for LTE-A is around 40 Mbps.

Journaling File System

is one that keeps track of the information written to the hard drive in a journal.(log)

A varchar data type

is used for data that can contain any number of characters (up to the database limit)

File Transfer Protocol (FTP)

is used to upload and download files between clients and servers. *FTP has no security measures. Not secure as https. (445)

ONE-TIER

is when the database, processing logic, and the database engine are all on one cpu.

BACKUPS AND DATA EXPORT

it backs up the relational data management service.

packet switching protocol

it re-routes data packets if transmission lines are damaged or if router fails to respond. it can utilize an available network path rather than a single dedicated one

Spim

junk IM messages

availability

keeping a service so that authorized users can access and process data whenever necessary. Availability is often threatened by accidents and oversights as well as active attacks.

Digital Projectors

large format display suitable for use in a presentation or meeting

stored locally

local storage. A hard drive or solid state drive (SSD) directly attached to the device being referenced. The term would be used to contrast the storage in that unit from the storage on servers in the local network or on the Internet (see SAN, NAS and cloud storage).

Global Positioning System (GPS) (somewhere you are Authentication)

location based authentication measures some statistic about where you are(your presence in a specific location). This could be a geographic location measured in GPS or IPS(indoor positioning system)or it could be by the IP address. The IP address could also be used to refer to a logical network segment or it cold be linked to a geographic location.

OS or system backup

makes a copy of the OS and installed applications so that a workstation or server can be recovered without having to manually reinstall software and reconfigure settings.

ransomware (scareware)

malware that prevents you from accessing your computer or files and demands that you pay a fine

START MENU

manage programs and easily search different applications

authorization

means of creating one or more barriers around the resource such that only authenticated users can gain access.

Radio Frequency Identification (RFID)

means of tagging and tracking objects using specially-encoded tags. product tags with tiny chips containing information about the item's content, origin, and destination

zip (compression format)

means that the OS can create and extract files form the archive without having to install a third-party application. compressing files to reduce file size

availability

means that the information is accessible to those authorized to view or modify it.

COMMERICAL OS

means the user must purchase a license to install and use the OS software on a particular device.

non-volatile

memory: Refers to a kind of RAM that is stable and can hold data as long as electricity is powering the memory. Ex: Solid-State Drive (SSD)

WINDOWS 10 MOBILE

mobile device of Microsoft like Windows CE, Windows Phone 7 and 8. Failed to succeed like Windows did in the PC market

sever-side scripting

most sites use server-side scripting, meaning that code runs on the server to display the page you are looking at.

PERIPHERAL DEVICES

mouse, keyboard, monitor, speaker, microphone, printer, etc.

Trademark

must be distinctive within the industry in which the company is selling goods and servies

Extranets

networks that allow companies to exchange information and conduct transactions with outsiders by providing them direct, web-based access to authorized parts of a company's intranet or information system

NoSQL DBMS

nonrelational databases that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud

data redundancy

occurs when unnecessary duplicate information exists in a database

Challenge questions

offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

procedure(policies and procedures)

often referred to as SOP(Standard Operating Procedure) is an inflexible, step by step listing of the actions that must be completed for a given task.

Intellectual Property

often the most valuable info asset that an organization owns, various different types of IP and different ways to protect them from theft

Wired Network

on a home network, the computer will be connected to an internet router via Ethernet port. On a business network, the computer will be connected to the wider network via an Ethernet switch.

restoring access

once the integrity of the fail-over or restored system has been verified, you can re-enable user access and start processing transactions again. You might try to restrict user numbers initially, so that the system can be monitored and verified as working normally.

Digital Products

one that is sold or distributed as binary computer data like software, pc games, ebooks, music, tracks, streaming video, video downloads, etc

TASKBAR

opening programs easier for your favorite or mainly used programs which is located at the bottom of the screen.

TAR

originally a UNIX format for writing to magnetic tape (tape archive) but still used with gzip compression (tgz or .tar.gz) as a compressed file format for UNIX, Linux and macOS. Third party utility is required for tar files in Windows

forward

packet switching introduces the ability for one computer to forward information to another.

Partitioning

partitioning a hard disk is the act of dividing it into logically separate storage area. This may be done to improve the performance of the disk to install multiple operating systems, or to provide logical separation of different data areas.

Threads

parts of the program scheduled for execution by the CPU

PIN(personal identification number)

personal identification number A personal identification number, or sometimes redundantly a PIN number, is a numeric or alpha-numeric password used in the process of authenticating a user accessing a system. Personal identification numbers usually range from four to six digits A personal identification number (PIN) is a numerical code used in many electronic financial transactions. Personal identification numbers are usually issued in association with payment cards and may be required to complete a transaction.

opensource

pertaining to or denoting software whose source code is available free of charge to the public to use

POWER SOURCE

portable computers can be run from internal battery packs as well as from building power

What type of software enables you to create sophisticated business briefs that can be projected for display?

presentation software such as power point

Intranets

private company networks that allow employees to easily access, share, and publish information using internet software

Properties(object-oriented programming)

properties are special values that are included within a class/object, usually (depending on the language being used) set using get or set method calls. These are often thought of as a special case that is "in between" a regular data member and a method.

RAR

proprietary format is used by the WinRAR compression program

encrypted

protected or hidden with a secret code

Satellite Systems

provide far bigger areas of coverage than can be achieved using other technologies. Useful in rural areas.

Digital Subscriber Line (DSL)

provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines. The DSL modem/router is connected to the telephone line using a cable with RJ-11 connectors between the WAN port on the router and the telephone point.

PROGRAMMATIC ACCESS

provides libraries to default code for connecting to a database and executing queries.

TCP (Transmission Control Protocol)

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

VBSCRIPT

provides similar functionality to Javascript, often used by networking admins to perform repetitive admin tasks.

Physical Monitoring

recording employees movement, location, and behavior within the workplace, often using CCTV and drugs/alcohol testing.

redundancy

redundancy is the duplication of critical components or functions of a system with the intention of increasing reliability of the system, usually in the form of a backup or fail-safe, or to improve actual system performance, such as in the case of GNSS receivers, or multi-threaded computer processing.

system firmware setup program

refereed to as CMOS setup, BIOS setup, or UEFI setup. This is where Low-level PC settings affecting the operation of the motherboard can be configured.

hardening

refers to a set of policies that make mobile and workstation computers and network appliances more secure.

WINDOWS 10

released in 2015 and is the current windows of today. Microsoft doesn't plan on making another version but instead updating its features periodically

application exploits

replicate without user intervention, in some circumstances. The most common scenario is for the malware to be uploaded to a compromised website and try to trigger exploits in the clients visiting the site via vulnerabilities in the OS, the web browser or web browser plug in, referred to as a drive by download.

ASSEMBLY LANGUAGE

represents a machine code in human-readable text. Specific to a hardware architecture, to complied, interpreted, and query languages which you can use to write code that can be run on a number of platforms.

multifactor authentication

requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)

two-factor authentication

requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) , smart card, or biometric mechanism

mandatory logon

requiring the user to log on before accessing the computer or network.

Link or Network Interface layer

responsible for putting frames onto the physical network

permissions

restricting or granting of access to specific files and folders on a computer network to a user or group of users.

What device is capable of performing packet switching?

router

constraints

rules that enforce data integrity on the Relational Database Management System (RDBMS) automatically. This helps in avoiding the creation of triggers. The following are the Constraints in the RDBMS: • NOT NULL • PRIMARY KEY • FOREIGN KEY • UNIQUE • CHECK NOT NULL

(APIPA) Automatic Private Internet Protocol Addressing

s a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.

quality updates

security and critical updates

WPA (Wi-Fi Protected Access)

security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques; generally used for wireless communications

delimiter

separator, such as a space, comma or semicolon used to separate data elements

Task Scheduler:

sets tasks to run at a particular time

popup blockers

settings to disallow popups

OneDrive

signing in under Microsoft account, it shows the files and folders saved to your cloud storage system on the Internet

Sniffing

snooping on traffic passing over a network is known as sniffing

CROSS-PLATFORM SOFTWARE:

software programs written to run for PCs and laptops for touched-based mobile devices and OS

SINGLE-PLATFORM SOFTWARE:

software programs written to run under a particular OS

Freeware

software that is available free of charge

Shareware

software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.

Malware

software that is intended to damage or disable computers and computer systems.

GHz (gigahertz)

speed of a processor counted by billions of cycles per second

MHz (Megahertz)

speed of a processor counted by millions of ticks per second The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz). The megahertz is commonly used to express microprocessor clock speed. The unit is occasionally used in measurements or statements of bandwidth for high-speed digital data, analog and digital video signals, and spread spectrum signals. Other units of frequency are the kilohertz (kHz), equal to 1,000 Hz or 0.001 MHz, and the gigahertz (GHz), equal to 1,000,000,000 Hz or 1,000 MHz.

APPLICATIONS

such as word processors, spreadsheet programs, browse websites, send email, edit documents, and payroll programs

Data Over Cable Service Interface Specification (DOCSIS)

supports downlink speeds of up to 1.2 Gbps.

Taskkill

terminating a process through task manager which is often called "killing" the process

VIRTUALIZATION

that multiple operating systems can be installed and run simultaneously on a single computer

MP4(Moving picture Experts group layer 4) (video file)

the MPEG-4 standard audio/video file format, acts as a container for audio and video media streams

Fault-tolerant

the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service

Confidentiality

the act of holding information in confidence to authorized users, not to be released to unauthorized individuals

Access time measures:

the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor

Optical Character Recognition (OCR)

the capability of specialized software to interpret the actual letters and numbers on a page to create a digital document that can be edited, rather than a flat picture

Template

the chosen biometric information is scanned and recorded and stored as a template in a database.

two-tier model

the client workstation or system runs an application that communicates with the database that is running on a different server

Latency

the delay in seconds that a packet of data takes to travel over a network ex: lagce

Latency

the delay in seconds that a packet of data takes to travel over a network. Ex: IM(instant message)

message application programming interface(MAPI) protocol

the email client software on the senders computer([email protected])sends the message to the Exchange email server using Microsoft (MAPI)

Copyright

the exclusive legal right, given to an originator or an assignee to print, publish, distribution, sale, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

permissons

the file system maintains an Access Control List(ACL) for each file or folder object. The ACL records which user accounts are allowed to read, write, or control the object.

Device Drivers

the firmware within the device that makes it work with the OS and be able to be configured

Personally Identifiable Information (PII)

the full name, birth date, social security number, postal address, or any other information that allows tracking down the specific person who owns a device

BUS SPEED

the interface between the CPU and system memory

destruction

the loss of a service or data through destruction can occur for a number of reasons

Internet Protocol (IP)

the main protocol in the TCP/IP suite is responsible for logical addressing and routing of packets between hosts and networks. It provides packet delivery for all higher-level protocols within the suite.

hostname

the name given to an IP host. A hostname can be configured as any string with up to ,256 alphanumeric characters.

Screen Resolution

the number of pixels used to create the screen image

security

the practice of controlling access to something(a resource)

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. ex: I cloud, one drive, Dropbox

Routing

the process of deciding which path to take on a network. This is determined by the type of network and the software used to transmit data.

DNS Query

the process of requesting DNS information from a Windows server

database access methods

the processes by which a user might run SQL commands on the database server or update or extract information using a form or application that encapsulates the SQL commands as graphcial controls.

single-factor authentication

the traditional security process, which requires a user name and password

Boolean value

these are a special numeric data type indicating that something is either TRUE or False (with a 1 or 0). They consume a single bit of storage.

Plug-ins

these are designed to play some sort of content embedded in a web page, such as flash, silverlight , or other video/multimedia format.

extensions

these can add functionality to the browser

themes

these change the appearance of the browser using custom images and color schemes

Flash and Silverlight

these two rival development environments, created by Adobe and Microsoft used to provide interactive web application and video.

iso (compression format)

this is a file in one of the formats used by optical media. The main formats are ISO 9960(used by CDs) and UDF (used by DVDs, and Blu-Ray Discs) Many operating systems can mount an image file so that the contents can be read through the file browser.

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

Cellular Data Connection

use radio transmissions but at a greater range than Wi-Fi. Cellular data is more closely associated with internet access for cell phones and smartphones than with computers.

Inkjet Printer

used for good quality color output. Cheap to buy and expensive to run with the ink and high grade paper

mmc.exe

used to create custom snap-ins

accelerometers and gyroscopes

used to detect when the device is moved and change the screen orientation between portrait and landscape modes.

notational system

used to represent different quantities or characters.

Flat File System

useful for tasks such as simple order or sales databases used by a single person or small workgroup. A flat file is also a good way of exporting and importing information between systems.

administrators

user accounts that have complete control over the computer.

TOUCHPAD

the mouse build in to the laptop

CLOCK SPEED

the number of instructions it can process in one second

APPLE iOS

the operating system for all Apple smartphones and tablets

OUTPUT DEVICE

the processed data is shown or played to the user through an output device like a monitor or loudspeaker system

SCRIPTING LANGUAGES

these languages support the automaion and configuration of a particular OS

GigaByte

(Gb) 1000*1000*1000 bytes (1,000,000,000 bytes) Disk capacity A gigabyte (GB), sometimes abbreviated as a gig, is a unit of measurement in computers and similar electronic devices. At first it meant exactly 1 billion bytes, usually referring to the number of bytes in a computer hard drive.

KiloByte

(Kb) 1000 bytes ( 10*10*10 bytes) small files The kilobyte is a multiple of the unit byte for digital information. The International System of Units defines the prefix kilo as 1000; per this definition, one kilobyte is 1000 bytes. The internationally recommended unit symbol for the kilobyte is kB.

megabyte(MB or M)

(MB)about 1 million bytes One megabyte (abbreviated "MB") is equal to 1,000 kilobytes and precedes the gigabyte unit of measurement.(Mb) (Megabits) 1000*1000 bytes= (1,000,000 bytes) many files Megabytes are often used to measure the size of large files. For example, a high resolution JPEG image file might range is size from one to five megabytes. Uncompressed RAW images from a digital camera may require 10 to 50 MB of disk space

PetaByte

(Pb) 1000Tb or 10^15 bytes (1,000,000,000,000,000 bytes) Largest storage networks and cloud systems would have petabytes of capacity

TeraByte

(Tb) 1000GB (1,000,000,000,000 bytes) Individual disk units might be 1 or 2Tb usually used to describe large storage networks

Solid State Drive (SSD)

(non-volatile) Solid State Drive which uses a type of transistor-based memory called flash memory and are much faster than HDDs (Hard Disk Drive)a storage device that typically uses flash memory to store data, instructions, and information

BIOMETRIC AUTHENTICATION

(something you are)like a fingerprint verification on an iPhone or laptop to access or sign in to it. Iris or retina recognition, or facial recognition.

RAM

(volatile)(Random Access Memory) Converts a series of instructions which are stored in system memory. Ex: When a user types using the keyboard or scans a picture, the input is converted to digital data and stored in memory. Ex:system memory

System Memory

(volatile)The primary computer memory that holds instructions and data for currently executing software.The place where the computer holds current programs and data that are in use. This memory is volatile, meaning that it is only preserved while the system is powered up. More system memory(RAM) makes it possible to run more applications. It's provided by RAM modules

NOTIFICATION AREA

usually on the right side of the screen notifying you about what you want like an alarm or an update on a program, etc.

VARIABLES

value that can change during the execution of the program

ALU

Arithmetic Logic Unit, the control unit decodes each instruction in turn and either executes it itself or passes it to here

PENTIUM

was Intel's premium 32-bit CPU brand. Used on "Mid-range" computer

CPU (Central Processing Unit)

Central Processing Unit that receives each instruction or data file from memory and processes it. The device that "runs" software programs. The CPU processes these instructions and directs other components to perform actions such as displaying an image on the screen or printing a document.

CPU:

Central Processing Unit which "runs" software programs. The brain of the computer

WORKSTATION

a type of pc housed in a case that can sit on or under a desk

Cron

a utility often used to run tasks or scripts at a particular time

Task manager

allows the user to shut down processes that aren't responding(taskmgr)

INTERNET OF THINGS (IOT) AND DEVICES

The Internet of Things is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.refers to a world in which many different types of things are embedded with processing and networking functionality Consumer connected devices include smart TVs, smart speakers, toys, wearables and smart appliances. Smart meters, commercial security systems and smart city technologies -- such as those used to monitor traffic and weather conditions -- are examples of industrial and enterprise IoT devices. Other technologies, including smart air conditioning, smart thermostats, smart lighting and smart security, span home, enterprise and industrial uses. In a smart home, for example, a user arrives home and his car communicates with the garage to open the door. Once inside, the thermostat is already adjusted to his preferred temperature, and the lighting is set to a lower intensity and his chosen color for relaxation, as his pacemaker data indicates it has been a stressful day.

INPUT DEVICE

the computer receives data entered by the user through peripheral devices like mice, keyboards, scanners, cameras and microphones

Computer

a system that manipulates data according to a set of instructions

CONTROL PANEL

the location for the basic user-configurable settings for Windows and some apps via applets

Service

a Windows process that doesn't require any sort of user interaction and thus runs in the background (w/o a window)

KERNEL

a computer program which is the core of the OS that controls everything in the system

Management Interface

a graphical or command-line tool used to perform some aspect of system configuration

MAINFRAME

a large high speed workstation and the primary memory of a computer

Patents

a legal protection for some kind of invention that CAN apply to an idea so long as the idea is original (or novel), useful, and distinctive or non-trival

LOOPS

a loop is a sequence of instruction s that is continually repeated until a certain condition is reached. Typically, a certain process is done, such as getting an item of data and changing it, and then some condition is checked such as whether a counter has reached a prescribed number.

EMBEDDED OS

an embedded operating system is essentially a stripped-down operating system with a limited number of features. It is typically designed for very specific functions for controlling an electronic device. For example, all cell phones use an operating system that boots up when the phone is turned on. It handles all the basic interface and features of the phone. Additional programs can be loaded onto the phones, but they are typically JAVA applications that run on top of the operating system.a computer or appliance designed for a very specific function

SERVER

any computer providing services to other computers, usually server implies a powerful computer that supports a number of users simultaneously in a computer network. Server refers to either hardware or software. A hardware server may be running many software servers and sometimes different types of software servers. Ex: web servers, email servers, authentication servers, database servers and so on.

Decimal Notation

decimal system (base 10) is well understood and based on the principal of expressing ten different numbers using a single digit in the range 0 to 9.

Hexadecimal Notation

enables you to express 16 different numbers using a single digit in range 0 to F. Used in programming like IP (internet protocol) networks

WINDOWS POWERSHELL

enables you to perform management and admin. tasks in Windows 10 and Windows Server 2016.

GAMING CONSOLE

have powerful cpus and graphics processors, plus Ethernet and WiFi for wired and wireless home networking and internet connectivity.

DRM (Digital rights management)

invented to try to enforce "per-per-use" for digital products. Vendor may license the file for use on a restricted number of devices when purchasing a digital product.

OBJECT-ORIENTED PROGRAMMING (OOP)

popular way to designing code, the idea is that creating recogniziable things within the code and making them interact through defined method makes the code and making them interact through defined methods makes the code easier to maintain and update.

NETWORKING

portable computers use wireless radio technologies to connect to networks rather than cabled connections

MEDICAL DEVICES

represents another class of devices where use if electronics to remotely monitor and configure that appliance is expanding rapidly. Ex: cardiac monitors, defibrillators, insulin pumps


Conjuntos de estudio relacionados

7. Organophosphates and carbamates

View Set

Computer Science 100 quizzes 1-10 review -- New Perspectives on Computer Science 2016

View Set

CoursePoint+ Chapter 9: Pain Management

View Set

MGT 291- Oakenfull Exam 1 Quiz Questions

View Set

Advantages and Disadvantages of Franchising

View Set

Physics - learning catalytics midterm 2

View Set

Chapter 38 and 39 PrepU Questions

View Set

Psychology: Statistical Significance

View Set

Chapter 4 HW, MGT 4350- Chp 3, MGT Chap 2, MGT 461 Chapter 7&8 TEST 2, Compensation Chapter 1, Chapter 2 - Strategy of Compensation Plans, MGT 461 Exam 2 - Ch. 5-8, Compensation Chapter 3, MGT386 Exam 1

View Set