CompTIA IT Fundamentals Flashcards
End of Chapter Quiz
What is the purpose of the motherboard?
Connect all components together
What is the purpose of the CPU?
To process data.
What is the purpose of RAM?
Temporary data storage; it makes the computer faster.
What is the purpose of HDDs (Hard Disk Drives) and SSDs (Solid State Drives)?
Long-term data storage.
What is the purpose of optical discs?
Data storage (that is removable.
What does the power supply do?
Converts AC power to DC power for system components.
What is a PSU?
Power Supply Unit
What is a GPU?
Graphics processing Unit
What are two types of communications expansion cards?
NICs (Network cards) and modems
Which expansion card communicates with other computers over telephone lines?
Modem
Which expansion card produces images?
Video card
Which expansion card might have its own GPU?
Video Card
Which expansion card would you plug speakers into?
Audio card (sound card)
What are two methods used to cool processors?
Air cooling and liquid cooling.
Air cooling for processors usually involves which two components?
Heat sink and a fan
Which has more capacity, a DVD SS DL or a DVD DS SL?
The DVD DS SL does, slightly.
Which optical disc stores the most data?
BD-ROM (Blu-ray)
How many megabytes are in a gigabyte?
1024 or a thousand
What are three advantages of SSD over HDD?
Faster startup, faster read times, less power consumption and heat, silent more reliable, less susceptible to shock damage, higher data density.
What is RAID 0?
Disk striping
What is RAID 1?
Disk mirroring
When a system runs out of RAM, what does it use next?
Virtual memory
What is a DDR3 DIMM?
A memory module (RAM)
What type of RAM chips do laptops use?
SODIMM (or MicroDIMM)
______ printers use a powdery plastic substance to create images.
Laser
Color inkjet printers use ink cartridges called ______.
CMYK
____________ printers use heat to burn images into the paper.
Thermal
The oldest computer display devices are ________.
CRTs
________ replaced CRTs as the most common type of display device.
Flat screens
Types of pointing devices include?
mouse, touchpad, joystick, stylus pen, trackball
Flash drives and NAS are examples of what?
External storage devices
The first commonly used digital video connector was what?
DVI
Which video connector has three plugs?
Component
What is the most common video connector, also used with televisions?
HDMI
Popular connectors for external hard drives are ______?
USB, FireWire, eSATA, Thunderbolt
The ________ port was also called the printer port.
parallel
The name of the round keyboard and mouse connector is _______?
PS/2
Twisted-pair netwwork cables have an ________ connector at the end.
RJ-45
Telephone cables have an _______ connector at the end.
RJ-11
Which two external connector types were developed by Apple?
FireWire and Thunderbolt
The most common connector used today for keyboards and mice is ___?
USB
A device that has multiple external hard drives and network capability is called what?
Network Attached Storage (NAS)
Another name for the serial port is _____?
RS-232
_______ are display devices that let you input as well.
Touchscreens
The central part of the operating system is called the ______.
Kernel
A program that runs on top of the OS and allows the user to issue commands is what?
Shell
The five basic functions of an OS are:
Interface between the user and hardware, coordinate hardware components, provide the environment for software to run, monitor system health, and display file and directory structure
The identity that you are known by when you log in is your ________.
User account
In order to run a 64-bit OS, you need a ______ CPU.
64-bit
To monitor system health in Windows, you would use ______.
Performance Monitor
________ is an open-source workstation OS.
Linux
A ______ is a version of Linux.
Distrobution
The current Macintosh OS is called ________.
Mac OS X
Which operating system is named after big cats or California locations?
Mac OS X
Microsoft’s workstation OS is called _______.
Windows
Google’s workstation OS is called ______.
Chrome OS
A _______ is a netbook with Chrome installed on it.
Chromebook
The default OS on an iPad or iPhone is _______.
iOS
Google’s mobile OS is called ______.
Android
Versions of the _____ OS are named after sweet treats.
Android
The OS commonly associated with smartphones with hardware keyboards is _____.
BlackBerry
BlackBerry devices are known for having _______ keyboards.
Physical
The first step to storing files on a hard drive is to ______ the hard drive.
Partition
The _____ determines how files are stored on a hard drive.
File system
The two file systems typically associated with Windows are what?
FAT and NTFS
The file system typically used by Mac OS X is what?
HFS
The three common Linux file systems are what?
ext3, ext4 and XFS
Which command creates a duplicate file in a new location on the hard drive?
Copy
A _______ is a pointer to a file, designed to make it easy to open.
Shortcut
File size and name are examples of what?
File metadata
The hotkey to copy a file in Windows is what?
CTRL+C
______ allow you to customize a computer for a user with disabilities
Accessibility options
To take a picture of a window on your screen, you need to take a _______.
Screen capture
Word processing and spreadsheet programs are considered _____ software.
productivity
Videoconferencing and instant messaging are considered _____ software.
Collaboration
If you want to protect your computer against bad software, you should install _____ software.
Antimalware
To make a file smaller in size, or to package multiple files together in one archive, use _____ software.
compression
The three hardware platforms for software to operate on are _____. _____, and _____.
mobile, desktop, web-based
When assessing software compatibility, check what two things?
Make sure it runs on your OS, and make sure you meet minimum hardware requirements.
The .txt and .rtf extensions indicate what types of files?
Documents
The .doc, .xls, and .ppt file extensions indicate what types of files?
Documents (document, spreadsheet, and presentation)
the .mp3, .wav, .flac, .aac, and .m4a file extensions are for what format?
Audio files
The .jpg, gif, .tiff, .png, and .bmp file extensions indicate what type of file?
image files
The .mpg, .mp4, .flv, .wmv, and .avi file extensions indicate what type of file?
video
The .exe, .msi, .app, .bat, and .scexe file extensions indicate what type of file?
executables
The .rar, .tar, .zip, .dmg, .iso, .7z, and .sz file extensions indicate what type of file?
compressed
Name three types of document file extensions.
.txt, .rft, ..doc/.docx, .xls/.xlsx, .ppt/.pptx, .pdf
Name three types of audio file extensions.
.mp3, .wav, .flac, .aac, and .m4a
Name three types of video file extensions.
.mpg, .mp4, .flv, .wmv, and .avi
Name three types of image file extensions.
.jpg, .gif, .tiff, .png, and .bmp
Name three types of executable file extensions.
.exe, .msi, .app, .bat and.scexe
Name three types of compressed file extensions.
.rara, .tar, .zip, .dmg, .iso, .7z, and .sz
In order to install or run a purchased application, you need a _____.
product key
______ is the process of letting you use the software by linking it to your computer.
activation
______ is the process by which you provide your name and contact information to the software
registration
In Windows, the best way to uninstall applications is through ______.
Control Panel
If you want your Mac OS to be continually updated, what do you need to configure?
Software Update
If you want your Windows OS to be continually updated, what do you need to configure?
Windows Update
In order to make your hardware work, what type of software do you need?
A driver (or device driver)
Who should you contact to get updated device drivers?
The hardware manufacturer
In order to use purchased software, you need a ______, which stipulates the conditions of use.
Software license
How often should you update your security software?
At least once per week
What are two locations from which you might receive an installation file?
A CD-ROM from the manufacturer or download from the Internet?
In order to ensure that your OS gets the most important security updates, even if you don’t know they were released, you should enable _______.
Automatic updates (or Windows Update or Software Update)
Games can be installed or uninstalled as part of ______.
OS features
What are the two most popular broadband connection types?
DSL (Digital Subscriber Line) and Cable Modem
Which is most secure: wired, wireless, or cellular?
Wired
Which gives the greatest mobility: wired, wireless, or cellular?
Cellular
What two TCP/IP configuration parameters are required to communicate on a network?
IP address and subnet mask
If your TCP/IP client wants to get on the Internet, which optional configuration parameter is required?
Default gateway
Which TCP/IP service automatically configures clients with an IP address?
DHCP
Which TCP/IP service resolves host names to IP addresses?
DNS
The _____ service lets computers with private IP addresses get on the Internet.
NAT
Which gives the greatest data throughput: wired, wireless, or cellular?
Wired
Which has the highest delay: wired, wireless, or cellular?
Cellular
Which gives the greatest reliability: wired, wireless, or cellular?
Wired
Which wireless security protocol is the most secure?
WPA2
Other than enabling WPA2, WPA, or WEP, what two wireless network security options can you use?
Disable SSID broadcasts and enable MAC filtering
To configure a wireless router, you should change the ______ and ______ passwords.
Nework (wireless) and admin
When configuring a wireless router, what should you do to the SSID?
Change it from the default
When configuring a wireless router, what should you upgrade at the end of the process?
The router’s firmware
_____ is the feature that configures your computer with an IP address in the 169.254 range if it can’t find a DHCP
APIPA
The current fastest Wi-Fi standard is _____.
802.11ac
______ IP addresses cannot participate on the Internet.
Private
The unique hardware address assigned to your network adapter is called the ______.
MAC address
The four types of _____ area networks are what?
Local (LAN), wide (WAN), personal (PAN), and metropolitan (MAN)
A _____ is a network located in one location, such as an office.
LAN
A _____ is a network that spans geographical locations.
WAN
A network with no servers and eight workstations is referred to as a _____ network.
peer-to-peer
A network with dedicated servers follows the ______ security model.
Client-server (or domain)
A DAS is a hard drive attached where?
To a local computer (internal or external)
A storage solution connected to the network, with its own file management software, is called what?
Network Attached Storage (NAS)
The two best ways to physically link PCs together are what?
A crossover cable and a USB direct link cable
Which technology creates ad hoc networks for file transfers?
Bluetooth
Which operating systems can participate in a workgroup?
Many different ones, including older Microsoft versions, Mac OS X, and Linux
Which operating systems can participate in a homegroup?
Microsoft Windows 7 and newer
Which network sharing method requires a password to join?
Homegroup
Which peer-to-peer network-sharing method does not require user accounts for all users on all computers?
Homegroup
What is the limit to the number of computers on a homegroup?
unlimited
What is the limit to the number of computers in a workgroup?
20 (10 from a practical standpoint)
The two ways to connect a printer to share are what?
Local (USB and Network)
Cloud computing uses which technology to enable several servers to reside on the same server hardware?
virtualization
HTTP and HTTPS use ports ____ and ____.
80 and 443
HTTPS uses what to secure the connection?
SSL and TLS
Three protocols used to transfer files on the Internet are what?
FTP, FTPS, and SFTP
Three common gesture-based interactions for mobile devices are what?
Tap, swipe, and pinch
To scroll down or change a page on a mobile device, which action do you use?
swipe
To zoom in or out in a map on a mobile device, which action do you use?
Pinch
What is the name of the sensor that allows the screen to rotate when you rotate a mobile device?
Gyroscope
What is the name of the sensor that allows a mobile device to act as a compass?
magnetometer
What type of biometric sensor is on newer mobile devices?
Fingerprint scanner
When rebooting a mobile device with biometric security enabled, what must you do to unlock the device?
Enter the passcode
When setting up a wireless connection on a mobile device, what is the first step?
Verify wireless capabilities
When setting up a wireless connection on a mobile device, what is the step after verifying wireless capabilities?
Turn on Wi-Fi
When setting up a wireless connection on a mobile device, what is the step after turning on Wi-Fi?
Locate the SSID
When setting up a wireless connection on a mobile device, what is the step after locating the SSID?
Enter the wireless password.
When setting up a wireless connection on a mobile device, what is the step after entering the wireless password?
Verify Internet connectivity
Which two protocols are used to receive email?
POP3 and IMAP
Which protocol is used to send email?
SMTP
What port number does POP3 use?
110
What port number does IMAP use?
143
What port number does SMTP use?
25
The process of connecting two Bluetooth devices together for communication is called what?
pairing
Which two options can be used to back up an iPhone or iPad?
iTunes or iCloud
What is the name of the mode that immediately disables all wireless connections on a mobile device?
Airplane mode
What does Airplane mode do on a wireless device?
Immediately disables all wireless connections
The name of the app store for iOS is called?
iTunes
The name of the app store for Android is called?
Google Play
Theft of hardware or software is an example of what type of security threat?
Physical
When someone goes through the trash to obtain sensitive information, that is called _____.
Dumpster diving
Asking users to reveal sensitive or personal information over the phone is referred to as _______.
Social Engineering
Trying to obtain sensitive information by using a legitimate-looking email is called what?
Phishing
Looking at someone’s computer to see sensitive information they type in or display is called what?
Shoulder surfing
A problem in the coding of software that is used by an attacker is called what?
An exploit
Malware that attaches itself to an executable program and does damage to your computer is called what?
Virus
Malware that self-replicates and carries a payload of other malware is called what?
worm
A program that appears to be beneficial but is actually malware is called what?
Trojan horse
Malware that tracks your Internet activity and sells that information to marketers is called what?
Spyware
Malware that extorts those infected to pay a fee to remove the malware is called what?
Ransomware
What is excessive, unwanted email referred to as?
Spam
If you forget a password, what type of software can help you recover it?
Password cracker
A virus that changes its form is called what?
Polymorphic
A virus that can affect multiple parts of your computer is called what?
Multipartite
Viruses that attack the antivirus software directly are called what?
Retrovirus
To harden a device, you can disable communications features such as ____ and ____.
Bluetooth, NFC
The key combination of _______ lets a user lock their computer when they leave.
Ctrl+Alt+Delete
_____ is the process of scrambling the data in user files so others cannot read them.
encryption
To protect a computer against viruses and spyware, install _______.
antimalware
The three types of accounts on a computer are what?
Administrator, user, and guest
The _____ user account should be disabled for security purposes unless it is being used.
guest
Passwords should not be ____ between different websites.
reused
Many companies will have passwords _____ periodically as part of a security policy.
expiire
The process of providing proper credentials to access a computer resource is called ______.
authentication
Needing to provide a password and present a smart card to log in is an example of _____ ______.
multifactor authentication
The three types of information used in multifactor authentication are what?
Something you know, something you have, and something you are
The ability to enter login information once and have it transfer to other systems is called what?
Single sign-on
Risks of using public workstations include what three things?
Shoulder surfing, keyloggers (or other malware), and unsecured wireless networks
_____ Wi-Fi networks are unsecure and should not be used.
open
What should be true about a web browser’s version before you use it?
It should be the most current version.
What is the name of the feature that completes your name and address for you in web pages?
autofill
What is the name of a file a website downloads to your computer to identify you?
cookie
What are two ways to identify a secure website?
Starts with HTTPS:// and has a lock symbol in the address bar
What are three symptoms of adware?
Constant popups, home page (or browser) redirection, and search engine redirection
To protect your security, you should limit the use of ______ on the Internet.
Personally identifiable information (PII)
What should you not do if you receive a hyperlink or attachment in a suspicious email?
Click on it.
The first step in the basic workstation setup process is what?
Plug in cables.
After plugging in cables, what is the next step in the basic workstation setup process?
Power on the computer.
After powering on the computer, what is the next step in the basic workstation setup process?
Follow the initial operating system setup wizard.
After completing the OS setup wizard, what is the next step in the basic workstation setup process?
Install security software.
After installing security software, what is the next step in the basic workstation setup process?
Configure peripherals
After configuring peripherals, what is the next step in the basic workstation setup process?
Uninstall unneeded software.
After uninstalling unneeded software, what is the next step in the basic workstation setup process?
Configure and verify the internet connection.
After configuring and verifying the Internet connection, what is the next step in the basic workstation setup process?
Install additional software.
After installing additional software, what is the next step in the basic workstation setup process?
Run software and security updates
After running software and security updates, what is the next step in the basic workstation setup process?
Create other user accounts.
After creating other user accounts, what is the next step in the basic workstation setup process?
Perform basic cable management
When do you configure localization settings during the basic workstation setup process?
During the initial operating system set up wizard
The first place to check when you have a device failure or question is where?
The manufacturer’s documentation or website
Which three external issues should you check for when troubleshooting a computer? (The easy stuff.)
Loose cables or connectors, power, and physical damage
In addition to manufacturer documentation and websites, what are two external resources to check for technical help?
Technical community groups, Internet search, and technical support
In order to preserve your data in the case of hardware failure, you should _______ your data.
Back up
To make sure you run consistent software backups, be sure to ______ them.
Schedule
If you have important data that changes often, you should run backups more _______.
Frequently
What are three options for backup storage locations?
Locally attached storage, network attached storage, offsite/cloud
Which backup storage location option is the fastest, local, network, or cloud?
Local
After backing up data, what is the first thing you should do?
Test and verify that the backup works.
What is the name of the directive that restricts the use of six hazardous materials in the manufacture of various types of electronic equipment?
Restriction of Hazardous Substances (RoHS)
What is the proper disposal method for CRT monitors?
Recycle them.
What is the proper disposal method for batteries?
Recycle them
Which component in laser printers contains a carcinogen and should be recycled?
Toner (toner cartridge)
Computer parts that have low-energy usage modes are called what?
Energy-efficient devices
The common standard for energy efficient devices is what?
Energy Star
Which power mode turns the power off to all devices except the memory, which it keeps active?
Sleep
Which power mode turns off power to all devices and places contents of memory into a file on the hard drive for retrieval upon powering back up?
Hibernation
Which power device allows you to plug in multiple components but offers no power surge protection?
Power strip
Which power device allows you to plug in multiple components and offers power surge protection?
Surge protector
Which power device acts as a surge protector and a battery backup for a computer?
Uninterruptable power supply (UPS)
`Where is the switch located that sets what level of power the computer is expecting from the wall outlet?
On the power supply
For device placement __________ airflow is better. (Higher or lower)
higher
What is the optimal level of humidity for a computer?
Around 50 percent
What is the optimal room temperature for a computer?
A little colder than room temperature, or a little colder than what people prefer
What is the name of interference caused on copper cables by other signals?
Electromagnetic interference (EMI)
What devices can cause EMI? Name three.
Unshielded cables, high-voltage power lines, radio transmitters, motors (even those on refrigerator compressors), microwave ovens, cordless phones, and fluorescent lights
What is ESD?
Electrostatic discharge, or static electricity
Computer components can be damaged by ____ volts of ESD, whereas people can feel ____ volts.
300 and 3,000
Proper mouse and keyboard placement is where, according to ergonomics?
At or slighly below the level of the user’s elbows
When placing a keyboard or mouse for a user, according to proper ergonomics, how should the user’s wrists be?
Not bent, or only slightly bent
When placing a monitor for proper ergonomics, what is the guideline for how high the monitor should be?
The top of the screen should be at or slightly below eye level.
When placing a monitor for proper ergonomics, how far away from the user’s eyes should it be?
At least 18 inches. Ideal is from 18 inches to approximately arm’s length away.
Name three features of proper ergonomic sitting position.
Sit straight up or slightly reclined (90–120 degree angle between your upper body and thighs). Feet should be flat on the floor or on a footrest. Thighs should be parallel to the floor or hips can be slightly above the knees. Support the lower back (lumbar) area. Distribute the pressure on your seat evenly, make sure the area behind your knee is not touching the chair.
Whose guidelines should you follow for proper safety?
Manufacturer’s
When working with computer components, what are three items that can help prevent ESD?
Antistatic wrist strap, antistatic mat, and antistatic bags
When do you configure the screen resolution during the basic workstation setup process?
During the initial operating system setup wizard