Comptia ITF+ FC0-U61 Module 2 unit 1 study Using Data Types and Units
Mbps (or Mb/s)
1,000,000 bits per second. Many internal computer interfaces have throughputs measured in Mbps. Wireless networks and residential Internet links also typically have this sort of throughput.
Gbps (or Gb/s)
1,000,000,000 bits per second. The latest PC bus standards and networks can support this higher level of throughput.
Tbps (or Tb/s)
1,000,000,000,000 bits per second. This sort of capacity is found in major telecommunications links between data centers, cities, and countries.
Petabyte (PB)
1000 TB or a quadrillion bytes
Kbps (or Kb/s)
1000 bits per second. Older computer peripheral interfaces (or buses) and slow network links would be measured in Kbps.
Kibibyte (KiB)
1024 bytes (2^10)
Mebibyte (MiB)
1024 kibibytes ,1024*1024 bytes (or 1,048,576 bytes).
Gibibyte (GiB)
1024 mebibytes, 1024*1024*1024 bytes (1,073,741,824 bytes).
UTF-16
16 bit Unicode, allowing for 65,536 different combinations
UTF-32
32 bit Unicode, allowing for over 1 million combinations, thus being suitable to store most of the Chinese and Japanese alphabets as well
What is the decimal number 75 in binary and hexadecimal?
4B
Gigahertz (GHz)
A billion cycles per second; a measurement used to express a computer system's clock speed or clock rate.
What part of the process of data analytics is most closely supported by meaningful reporting?
Insights
throughput rate
Number of units going through a process per unit time
Megahertz (MHz)
One million Hz, or one million cycles per second.
Intellectual Property (IP)
Ownership of innovation by an individual or business enterprise; includes patented, trademarked, or copyrighted property.
Boolean values
These are a special numeric data type indicating that something is either TRUE or FALSE (with a 1 or 0). They consume a single bit of storage.
Characters
a character (or char) is a single textual character, and can be a letter of the alphabet, a symbol, or, indeed, a numerical character. For example: a, D, 7, $, @, #. These consume one byte of storage. Note that when a number is entered as a character data type, you cannot perform any mathematical operations on it.
ASCII
a code for representing English characters as numbers, with each letter assigned a number from 0 to 127
security control
a control that protects the assets of an organization from all threats, with a primary focus on external threats
Strings
a string is a collection of text characters. For example: XYZ, Hello world. There is no real limit on the amount of storage that can be used by a string. Generally, you define the string length when you define the data type.
Gigabyte (GB)
a unit of storage measuring roughly one billion bytes (1,000,000,000,000 bytes).
Megabyte (MB)
a unit of storage measuring roughly one million bytes (or 1,000,000 bytes).
Unicode
an international encoding standard for use with different languages and scripts, by which each letter, digit, or symbol is assigned a unique numeric value that applies across different platforms and programs.
Production and fulfilment
analysis of things such as process flows, manufacturing and assembly, delivery and transportation networks, and ordering and billing systems.
what is the basic unit of computer data?
binary digit or bit, which can represent two values (zero or one).
Eight bits is known as what?
byte
What type of legal protection could be obtained for a novel software algorithm?
copyright and patent
clock speed
dictates how many instructions the CPU can process each second
Which data type provides for whole numbers only?
integer
What are the 5 data types?
integer, floating-point, boolean, character, string
Patents
licenses that give an inventor the exclusive right to make, use, or sell an invention for a set period of time
Sales and marketing
marketing—information about individual consumers gleaned from web search and social media histories allows for personalized advertising.
Digital Rights Management (DRM)
technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied
bits per second (bps)
the measurement of transmission speed, defined as the number of bits transmitted each second; each bit is a single zero or one, and a string of 8 bits makes up a byte
Hertz (Hz)
the unit of frequency, equal to one cycle per second
floating point numbers
this type can support decimal fractions such as 4.1, 26.4, or 5.62. A floating-point number (or just "float") consumes between 4 and 8 bytes of storage. Note that the floating-point type could store a whole number too (4.0 for instance).
Which data representation format can encode the widest range of characters?
unicode
Interger
whole numbers. For example 5, 21, or 65536. An integer data type consumes 1 to 8 bytes of computer storage.
Return on security investment (ROSI)
A metric to calculate whether a security control is worth the cost of deploying and maintaining it.
risk assessments
A process used inside of risk management to identify how much risk exists in a given network or system
Access Control
A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it.
Kilobyte (KB)
A unit of computer storage equal to approximately one thousand bytes.
UTF-8
An 8-bit character encoding system that includes ASCII and is the most common character encoding system used today.
Copyright
An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work.
Security Control Types
Backup, Access control, High availability
What is the difference between the char and string data types?
Character refers to a single letter, number, space, punctuation mark, or symbol that can be represented using a computer while String refers to a set of characters.
Which notation system supports presenting the largest numbers using the fewest digits: Binary, Decimal, or Hexadecimal?
Hexadecimal
Trademarks
Designs and names, often officially registered, by which merchants or manufacturers designate and differentiate their products
What data protection technology could you implement in order to restrict the type of activity that users could employ on digital products that they have purchased or rented?
Digital Rights Management (DRM)
