CompTIA IT Fundamentals Flashcards

End of Chapter Quiz

1
Q

What is the purpose of the motherboard?

A

Connect all components together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the CPU?

A

To process data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of RAM?

A

Temporary data storage; it makes the computer faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of HDDs (Hard Disk Drives) and SSDs (Solid State Drives)?

A

Long-term data storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of optical discs?

A

Data storage (that is removable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the power supply do?

A

Converts AC power to DC power for system components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a PSU?

A

Power Supply Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a GPU?

A

Graphics processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two types of communications expansion cards?

A

NICs (Network cards) and modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which expansion card communicates with other computers over telephone lines?

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which expansion card produces images?

A

Video card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which expansion card might have its own GPU?

A

Video Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which expansion card would you plug speakers into?

A

Audio card (sound card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two methods used to cool processors?

A

Air cooling and liquid cooling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Air cooling for processors usually involves which two components?

A

Heat sink and a fan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which has more capacity, a DVD SS DL or a DVD DS SL?

A

The DVD DS SL does, slightly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which optical disc stores the most data?

A

BD-ROM (Blu-ray)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many megabytes are in a gigabyte?

A

1024 or a thousand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are three advantages of SSD over HDD?

A

Faster startup, faster read times, less power consumption and heat, silent more reliable, less susceptible to shock damage, higher data density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is RAID 0?

A

Disk striping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is RAID 1?

A

Disk mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When a system runs out of RAM, what does it use next?

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a DDR3 DIMM?

A

A memory module (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of RAM chips do laptops use?

A

SODIMM (or MicroDIMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
______ printers use a powdery plastic substance to create images.
Laser
26
Color inkjet printers use ink cartridges called ______.
CMYK
27
____________ printers use heat to burn images into the paper.
Thermal
28
The oldest computer display devices are ________.
CRTs
29
________ replaced CRTs as the most common type of display device.
Flat screens
30
Types of pointing devices include?
mouse, touchpad, joystick, stylus pen, trackball
31
Flash drives and NAS are examples of what?
External storage devices
32
The first commonly used digital video connector was what?
DVI
33
Which video connector has three plugs?
Component
34
What is the most common video connector, also used with televisions?
HDMI
35
Popular connectors for external hard drives are ______?
USB, FireWire, eSATA, Thunderbolt
36
The ________ port was also called the printer port.
parallel
37
The name of the round keyboard and mouse connector is _______?
PS/2
38
Twisted-pair netwwork cables have an ________ connector at the end.
RJ-45
39
Telephone cables have an _______ connector at the end.
RJ-11
40
Which two external connector types were developed by Apple?
FireWire and Thunderbolt
41
The most common connector used today for keyboards and mice is ___?
USB
42
A device that has multiple external hard drives and network capability is called what?
Network Attached Storage (NAS)
43
Another name for the serial port is _____?
RS-232
44
_______ are display devices that let you input as well.
Touchscreens
45
The central part of the operating system is called the ______.
Kernel
46
A program that runs on top of the OS and allows the user to issue commands is what?
Shell
47
The five basic functions of an OS are:
Interface between the user and hardware, coordinate hardware components, provide the environment for software to run, monitor system health, and display file and directory structure
48
The identity that you are known by when you log in is your ________.
User account
49
In order to run a 64-bit OS, you need a ______ CPU.
64-bit
50
To monitor system health in Windows, you would use ______.
Performance Monitor
51
________ is an open-source workstation OS.
Linux
52
A ______ is a version of Linux.
Distrobution
53
The current Macintosh OS is called ________.
Mac OS X
54
Which operating system is named after big cats or California locations?
Mac OS X
55
Microsoft's workstation OS is called _______.
Windows
56
Google's workstation OS is called ______.
Chrome OS
57
A _______ is a netbook with Chrome installed on it.
Chromebook
58
The default OS on an iPad or iPhone is _______.
iOS
59
Google's mobile OS is called ______.
Android
60
Versions of the _____ OS are named after sweet treats.
Android
61
The OS commonly associated with smartphones with hardware keyboards is _____.
BlackBerry
62
BlackBerry devices are known for having _______ keyboards.
Physical
63
The first step to storing files on a hard drive is to ______ the hard drive.
Partition
64
The _____ determines how files are stored on a hard drive.
File system
65
The two file systems typically associated with Windows are what?
FAT and NTFS
66
The file system typically used by Mac OS X is what?
HFS
67
The three common Linux file systems are what?
ext3, ext4 and XFS
68
Which command creates a duplicate file in a new location on the hard drive?
Copy
69
A _______ is a pointer to a file, designed to make it easy to open.
Shortcut
70
File size and name are examples of what?
File metadata
71
The hotkey to copy a file in Windows is what?
CTRL+C
72
______ allow you to customize a computer for a user with disabilities
Accessibility options
73
To take a picture of a window on your screen, you need to take a _______.
Screen capture
74
Word processing and spreadsheet programs are considered _____ software.
productivity
75
Videoconferencing and instant messaging are considered _____ software.
Collaboration
76
If you want to protect your computer against bad software, you should install _____ software.
Antimalware
77
To make a file smaller in size, or to package multiple files together in one archive, use _____ software.
compression
78
The three hardware platforms for software to operate on are _____. _____, and _____.
mobile, desktop, web-based
79
When assessing software compatibility, check what two things?
Make sure it runs on your OS, and make sure you meet minimum hardware requirements.
80
The .txt and .rtf extensions indicate what types of files?
Documents
81
The .doc, .xls, and .ppt file extensions indicate what types of files?
Documents (document, spreadsheet, and presentation)
82
the .mp3, .wav, .flac, .aac, and .m4a file extensions are for what format?
Audio files
83
The .jpg, gif, .tiff, .png, and .bmp file extensions indicate what type of file?
image files
84
The .mpg, .mp4, .flv, .wmv, and .avi file extensions indicate what type of file?
video
85
The .exe, .msi, .app, .bat, and .scexe file extensions indicate what type of file?
executables
86
The .rar, .tar, .zip, .dmg, .iso, .7z, and .sz file extensions indicate what type of file?
compressed
87
Name three types of document file extensions.
.txt, .rft, ..doc/.docx, .xls/.xlsx, .ppt/.pptx, .pdf
88
Name three types of audio file extensions.
.mp3, .wav, .flac, .aac, and .m4a
89
Name three types of video file extensions.
.mpg, .mp4, .flv, .wmv, and .avi
90
Name three types of image file extensions.
.jpg, .gif, .tiff, .png, and .bmp
91
Name three types of executable file extensions.
.exe, .msi, .app, .bat and.scexe
92
Name three types of compressed file extensions.
.rara, .tar, .zip, .dmg, .iso, .7z, and .sz
93
In order to install or run a purchased application, you need a _____.
product key
94
______ is the process of letting you use the software by linking it to your computer.
activation
95
______ is the process by which you provide your name and contact information to the software
registration
96
In Windows, the best way to uninstall applications is through ______.
Control Panel
97
If you want your Mac OS to be continually updated, what do you need to configure?
Software Update
98
If you want your Windows OS to be continually updated, what do you need to configure?
Windows Update
99
In order to make your hardware work, what type of software do you need?
A driver (or device driver)
100
Who should you contact to get updated device drivers?
The hardware manufacturer
101
In order to use purchased software, you need a ______, which stipulates the conditions of use.
Software license
102
How often should you update your security software?
At least once per week
103
What are two locations from which you might receive an installation file?
A CD-ROM from the manufacturer or download from the Internet?
104
In order to ensure that your OS gets the most important security updates, even if you don't know they were released, you should enable _______.
Automatic updates (or Windows Update or Software Update)
105
Games can be installed or uninstalled as part of ______.
OS features
106
What are the two most popular broadband connection types?
DSL (Digital Subscriber Line) and Cable Modem
107
Which is most secure: wired, wireless, or cellular?
Wired
108
Which gives the greatest mobility: wired, wireless, or cellular?
Cellular
109
What two TCP/IP configuration parameters are required to communicate on a network?
IP address and subnet mask
110
If your TCP/IP client wants to get on the Internet, which optional configuration parameter is required?
Default gateway
111
Which TCP/IP service automatically configures clients with an IP address?
DHCP
112
Which TCP/IP service resolves host names to IP addresses?
DNS
113
The _____ service lets computers with private IP addresses get on the Internet.
NAT
114
Which gives the greatest data throughput: wired, wireless, or cellular?
Wired
115
Which has the highest delay: wired, wireless, or cellular?
Cellular
116
Which gives the greatest reliability: wired, wireless, or cellular?
Wired
117
Which wireless security protocol is the most secure?
WPA2
118
Other than enabling WPA2, WPA, or WEP, what two wireless network security options can you use?
Disable SSID broadcasts and enable MAC filtering
119
To configure a wireless router, you should change the ______ and ______ passwords.
Nework (wireless) and admin
120
When configuring a wireless router, what should you do to the SSID?
Change it from the default
121
When configuring a wireless router, what should you upgrade at the end of the process?
The router's firmware
122
_____ is the feature that configures your computer with an IP address in the 169.254 range if it can't find a DHCP
APIPA
123
The current fastest Wi-Fi standard is _____.
802.11ac
124
______ IP addresses cannot participate on the Internet.
Private
125
The unique hardware address assigned to your network adapter is called the ______.
MAC address
126
The four types of _____ area networks are what?
Local (LAN), wide (WAN), personal (PAN), and metropolitan (MAN)
127
A _____ is a network located in one location, such as an office.
LAN
128
A _____ is a network that spans geographical locations.
WAN
129
A network with no servers and eight workstations is referred to as a _____ network.
peer-to-peer
130
A network with dedicated servers follows the ______ security model.
Client-server (or domain)
131
A DAS is a hard drive attached where?
To a local computer (internal or external)
132
A storage solution connected to the network, with its own file management software, is called what?
Network Attached Storage (NAS)
133
The two best ways to physically link PCs together are what?
A crossover cable and a USB direct link cable
134
Which technology creates ad hoc networks for file transfers?
Bluetooth
135
Which operating systems can participate in a workgroup?
Many different ones, including older Microsoft versions, Mac OS X, and Linux
136
Which operating systems can participate in a homegroup?
Microsoft Windows 7 and newer
137
Which network sharing method requires a password to join?
Homegroup
138
Which peer-to-peer network-sharing method does not require user accounts for all users on all computers?
Homegroup
139
What is the limit to the number of computers on a homegroup?
unlimited
140
What is the limit to the number of computers in a workgroup?
20 (10 from a practical standpoint)
141
The two ways to connect a printer to share are what?
Local (USB and Network)
142
Cloud computing uses which technology to enable several servers to reside on the same server hardware?
virtualization
143
HTTP and HTTPS use ports ____ and ____.
80 and 443
144
HTTPS uses what to secure the connection?
SSL and TLS
145
Three protocols used to transfer files on the Internet are what?
FTP, FTPS, and SFTP
146
Three common gesture-based interactions for mobile devices are what?
Tap, swipe, and pinch
147
To scroll down or change a page on a mobile device, which action do you use?
swipe
148
To zoom in or out in a map on a mobile device, which action do you use?
Pinch
149
What is the name of the sensor that allows the screen to rotate when you rotate a mobile device?
Gyroscope
150
What is the name of the sensor that allows a mobile device to act as a compass?
magnetometer
151
What type of biometric sensor is on newer mobile devices?
Fingerprint scanner
152
When rebooting a mobile device with biometric security enabled, what must you do to unlock the device?
Enter the passcode
153
When setting up a wireless connection on a mobile device, what is the first step?
Verify wireless capabilities
154
When setting up a wireless connection on a mobile device, what is the step after verifying wireless capabilities?
Turn on Wi-Fi
155
When setting up a wireless connection on a mobile device, what is the step after turning on Wi-Fi?
Locate the SSID
156
When setting up a wireless connection on a mobile device, what is the step after locating the SSID?
Enter the wireless password.
157
When setting up a wireless connection on a mobile device, what is the step after entering the wireless password?
Verify Internet connectivity
158
Which two protocols are used to receive email?
POP3 and IMAP
159
Which protocol is used to send email?
SMTP
160
What port number does POP3 use?
110
161
What port number does IMAP use?
143
162
What port number does SMTP use?
25
163
The process of connecting two Bluetooth devices together for communication is called what?
pairing
164
Which two options can be used to back up an iPhone or iPad?
iTunes or iCloud
165
What is the name of the mode that immediately disables all wireless connections on a mobile device?
Airplane mode
166
What does Airplane mode do on a wireless device?
Immediately disables all wireless connections
167
The name of the app store for iOS is called?
iTunes
168
The name of the app store for Android is called?
Google Play
169
Theft of hardware or software is an example of what type of security threat?
Physical
170
When someone goes through the trash to obtain sensitive information, that is called _____.
Dumpster diving
171
Asking users to reveal sensitive or personal information over the phone is referred to as _______.
Social Engineering
172
Trying to obtain sensitive information by using a legitimate-looking email is called what?
Phishing
173
Looking at someone’s computer to see sensitive information they type in or display is called what?
Shoulder surfing
174
A problem in the coding of software that is used by an attacker is called what?
An exploit
175
Malware that attaches itself to an executable program and does damage to your computer is called what?
Virus
176
Malware that self-replicates and carries a payload of other malware is called what?
worm
177
A program that appears to be beneficial but is actually malware is called what?
Trojan horse
178
Malware that tracks your Internet activity and sells that information to marketers is called what?
Spyware
179
Malware that extorts those infected to pay a fee to remove the malware is called what?
Ransomware
180
What is excessive, unwanted email referred to as?
Spam
181
If you forget a password, what type of software can help you recover it?
Password cracker
182
A virus that changes its form is called what?
Polymorphic
183
A virus that can affect multiple parts of your computer is called what?
Multipartite
184
Viruses that attack the antivirus software directly are called what?
Retrovirus
185
To harden a device, you can disable communications features such as ____ and ____.
Bluetooth, NFC
186
The key combination of _______ lets a user lock their computer when they leave.
Ctrl+Alt+Delete
187
_____ is the process of scrambling the data in user files so others cannot read them.
encryption
188
To protect a computer against viruses and spyware, install _______.
antimalware
189
The three types of accounts on a computer are what?
Administrator, user, and guest
190
The _____ user account should be disabled for security purposes unless it is being used.
guest
191
Passwords should not be ____ between different websites.
reused
192
Many companies will have passwords _____ periodically as part of a security policy.
expiire
193
The process of providing proper credentials to access a computer resource is called ______.
authentication
194
Needing to provide a password and present a smart card to log in is an example of _____ ______.
multifactor authentication
195
The three types of information used in multifactor authentication are what?
Something you know, something you have, and something you are
196
The ability to enter login information once and have it transfer to other systems is called what?
Single sign-on
197
Risks of using public workstations include what three things?
Shoulder surfing, keyloggers (or other malware), and unsecured wireless networks
198
_____ Wi-Fi networks are unsecure and should not be used.
open
199
What should be true about a web browser’s version before you use it?
It should be the most current version.
200
What is the name of the feature that completes your name and address for you in web pages?
autofill
201
What is the name of a file a website downloads to your computer to identify you?
cookie
202
What are two ways to identify a secure website?
Starts with HTTPS:// and has a lock symbol in the address bar
203
What are three symptoms of adware?
Constant popups, home page (or browser) redirection, and search engine redirection
204
To protect your security, you should limit the use of ______ on the Internet.
Personally identifiable information (PII)
205
What should you not do if you receive a hyperlink or attachment in a suspicious email?
Click on it.
206
The first step in the basic workstation setup process is what?
Plug in cables.
207
After plugging in cables, what is the next step in the basic workstation setup process?
Power on the computer.
208
After powering on the computer, what is the next step in the basic workstation setup process?
Follow the initial operating system setup wizard.
209
After completing the OS setup wizard, what is the next step in the basic workstation setup process?
Install security software.
210
After installing security software, what is the next step in the basic workstation setup process?
Configure peripherals
211
After configuring peripherals, what is the next step in the basic workstation setup process?
Uninstall unneeded software.
212
After uninstalling unneeded software, what is the next step in the basic workstation setup process?
Configure and verify the internet connection.
213
After configuring and verifying the Internet connection, what is the next step in the basic workstation setup process?
Install additional software.
214
After installing additional software, what is the next step in the basic workstation setup process?
Run software and security updates
215
After running software and security updates, what is the next step in the basic workstation setup process?
Create other user accounts.
216
After creating other user accounts, what is the next step in the basic workstation setup process?
Perform basic cable management
217
When do you configure localization settings during the basic workstation setup process?
During the initial operating system set up wizard
218
The first place to check when you have a device failure or question is where?
The manufacturer's documentation or website
219
Which three external issues should you check for when troubleshooting a computer? (The easy stuff.)
Loose cables or connectors, power, and physical damage
220
In addition to manufacturer documentation and websites, what are two external resources to check for technical help?
Technical community groups, Internet search, and technical support
221
In order to preserve your data in the case of hardware failure, you should _______ your data.
Back up
222
To make sure you run consistent software backups, be sure to ______ them.
Schedule
223
If you have important data that changes often, you should run backups more _______.
Frequently
224
What are three options for backup storage locations?
Locally attached storage, network attached storage, offsite/cloud
225
Which backup storage location option is the fastest, local, network, or cloud?
Local
226
After backing up data, what is the first thing you should do?
Test and verify that the backup works.
227
What is the name of the directive that restricts the use of six hazardous materials in the manufacture of various types of electronic equipment?
Restriction of Hazardous Substances (RoHS)
228
What is the proper disposal method for CRT monitors?
Recycle them.
229
What is the proper disposal method for batteries?
Recycle them
230
Which component in laser printers contains a carcinogen and should be recycled?
Toner (toner cartridge)
231
Computer parts that have low-energy usage modes are called what?
Energy-efficient devices
232
The common standard for energy efficient devices is what?
Energy Star
233
Which power mode turns the power off to all devices except the memory, which it keeps active?
Sleep
234
Which power mode turns off power to all devices and places contents of memory into a file on the hard drive for retrieval upon powering back up?
Hibernation
235
Which power device allows you to plug in multiple components but offers no power surge protection?
Power strip
236
Which power device allows you to plug in multiple components and offers power surge protection?
Surge protector
237
Which power device acts as a surge protector and a battery backup for a computer?
Uninterruptable power supply (UPS)
238
`Where is the switch located that sets what level of power the computer is expecting from the wall outlet?
On the power supply
239
For device placement __________ airflow is better. (Higher or lower)
higher
240
What is the optimal level of humidity for a computer?
Around 50 percent
241
What is the optimal room temperature for a computer?
A little colder than room temperature, or a little colder than what people prefer
242
What is the name of interference caused on copper cables by other signals?
Electromagnetic interference (EMI)
243
What devices can cause EMI? Name three.
Unshielded cables, high-voltage power lines, radio transmitters, motors (even those on refrigerator compressors), microwave ovens, cordless phones, and fluorescent lights
244
What is ESD?
Electrostatic discharge, or static electricity
245
Computer components can be damaged by ____ volts of ESD, whereas people can feel ____ volts.
300 and 3,000
246
Proper mouse and keyboard placement is where, according to ergonomics?
At or slighly below the level of the user's elbows
247
When placing a keyboard or mouse for a user, according to proper ergonomics, how should the user’s wrists be?
Not bent, or only slightly bent
248
When placing a monitor for proper ergonomics, what is the guideline for how high the monitor should be?
The top of the screen should be at or slightly below eye level.
249
When placing a monitor for proper ergonomics, how far away from the user’s eyes should it be?
At least 18 inches. Ideal is from 18 inches to approximately arm’s length away.
250
Name three features of proper ergonomic sitting position.
Sit straight up or slightly reclined (90–120 degree angle between your upper body and thighs). Feet should be flat on the floor or on a footrest. Thighs should be parallel to the floor or hips can be slightly above the knees. Support the lower back (lumbar) area. Distribute the pressure on your seat evenly, make sure the area behind your knee is not touching the chair.
251
Whose guidelines should you follow for proper safety?
Manufacturer's
252
When working with computer components, what are three items that can help prevent ESD?
Antistatic wrist strap, antistatic mat, and antistatic bags
253
When do you configure the screen resolution during the basic workstation setup process?
During the initial operating system setup wizard