more for this test Flashcards

1
Q

1 Gigabit equals how much of a Gigabyte

A

1/8th

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the BEST course of action for Sarah if she suspects her mobile device, containing sensitive information, has been stolen?

A

Inform her colleagues and the IT department about the missing device
So they can remotely wipe the device and store stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following features in a file system prevents loss of data during power failure?

A

Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What device converts data from a digital format, suitable for a computer, to a format suitable for transmission over a standard phone line?

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When working with databases, which definition BEST describes a table?

A

The structure consisting of rows and columns that holds data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What application architecture best utilizes multiple layers and allows for better flexibility and maintainability in a system

A

n-tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of fields (or columns) in a Database Management System (DBMS)?

A

They represent specific categories of data in a table
(remember columns are attributes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of NIC provides network connectivity through physical cables?

A

Wired NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary difference between the Unicode and ASCII?

A

Unicode can represent a larger number of characters

while ASCII is limited to a set of 128 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the task scheduler utility do

A

Automating tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an example of an IP-based peripheral device?

A

Network Printer
(own IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is an independent units of software that are responsible for one well-defined task within an operating system and run in the background, often without direct user interaction?

A

Services
( run in the background)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following storage type offers web-based access, and can be easily scaled based on requirements?

A

Cloud storage service
(google drive etccc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which control models follow the principle of least privilege which only gives users permissions required for their tasks?

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the difference between a LAN and a WAN?

A

A LAN connects devices in a single location
WAN connects devices from multiple locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the main purpose of a method within an object in Object-Oriented Programming (OOP)?

A

To provide a means to interact with and manipulate an object’s data

17
Q

Which of the following types of malware is designed to conceal itself within seemingly legitimate software

18
Q

Which among the following units is commonly used to measure the processing speed of a computer?

A

Hertz (Hz)
3.80 GHz cpu

19
Q

Which factor is important in both subscription and one-time purchase software licenses?

A

Need for product keys and serial numbers
Continuous updates

20
Q

Which installation practice helps mitigates compatibility concerns?

A

Reading instructions

21
Q

what allows customization of installation

A

advanced options

22
Q

What is the difference between a procedure and a function in programming?

A

A function returns a value

procedure performs actions but does not return a value

23
Q

What feature of an antivirus software allows users to configure regular system scans at specific times or intervals?

A

Scheduled scans

24
Q

Which of the following BEST describes semi-structured data?

A

Semi-structured data has some organized elements but doesn’t strictly adhere to a tabular format
(Shemedium)

25
Unauthorized information alteration does what
prevents unauthorized modification or tampering of data within the organization's systems
26
What is the primary goal of restoring access during disaster recovery?
To ensure business continuity