CompTIA ITF+ Part 2 Flashcards

To learn the material pertaining to the CompTIA IT Fundamentals Exam

1
Q

What is a hard drive?

A

A hard drive is a device for long term storage. When you power off the PC, the data on the hard drive stays put. It’s available when you turn the PC back on. It’ll be there until you delete it, or if you’re unlucky, until the drive dies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two important measurements for hard drives?

A

Capacity and speed. Capacity is generally more important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many bits are there in one byte?

A

8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many bytes in a kilobyte? Kilobytes in a megabyte? Megabytes in a gigabyte? Gigabytes in a terabyte?

A

1024 (2 to the power of 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four features common to all operating systems?

A

1) It provides a user interface.
2) It provides coordination among hardware components.
3) It monitors health and functionality.
4) It provides a way to store and retrieve data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is HWMonitor?

A

HWMonitor is a hardware monitoring program that reads PC systems main health sensors : voltages, temperatures, powers, currents, fans speed, utilizations, clock speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the equivalent of the taskbar for macOS?

A

The Dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the equivalent of File Explorer for macOS?

A

Finder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the ideal temperature and humidity for a work area where PCs are in use?

A

72 degrees Fahrenheit or about 22 degrees Celsius with 50%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where should a monitor be placed?

A

At eye level, about 16 to 24 inches away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the basic steps of setting up a Desktop PC?

A

1) Start with hardware connectivity – connect power, monitor, keyboard and mouse
2) connect to the network
3) localization and user account setup connect to the network
4) update OS and security
5) uninstall programs and features to personalize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a surge protector do?

A

Protects the computer against a power surge like when lightening hits and there’s extra juice in the wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a UPS?

A

Uninterruptible power supply provides surge protection but also protects the computer from brownouts and blackouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the basics of setting up a mobile device like a tablet?

A

1) accept the EULA
2) connect to the internet
3) update the device’s firmware and OS
4) customize the device by adding email and apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of file needs to run to install an application?

A

An executable file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can applications be updated?

A

Via properties or an update feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can application be uninstalled on Windows?

A

Via Control Panel or through uninstall routines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the basic image file extensions?

A

.tif, .png, .jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the basic compressed file/folder extensions?

A

.zip, .rar, .tar

20
Q

How is Wi-Fi setup?

A

1) Connect a to Small Office/Home Office router (SOHO router) with an ethernet cable
2) Use a browser to access the router homepage
3) Change admin password and network name
4) Add security

21
Q

What are the three internet access options for computing devices?

A

1) wired
2) plug the device into a wall jack
3) wireless (WiFi)

22
Q

What are the criteria for determining the best connection?

A

Mobility, availability, reliability, throughput, connection delay (latency), number of concurrent connections, and level of security

23
Q

What is throughput?

A

The data transfer rate

24
Q

How do wired and wireless connections compare?

A

Wired always wins for availability, reliability, throughput latency, number of connections and level of security. Thus, wired always beats wireless and cellular, except for in the first category mobility. There cellular is king.

25
Q

How is a printer set up?

A

1) Install printer drivers and assure good connectivity.
2) Devices and Printers | Printer Properties | Print a test page
3) Printer properties | Sharing | Share this printer

26
Q

What are some basic physical security measures which can be taken to protect data?

A

Lock computers and use screen filters to avoid unwanted eyes. Shred all documents that contain any sensitive information.

27
Q

What is spyware?

A

Spyware gathers information about system usage, as the name would suggest. Spyware generally installs as part of some otherwise benign program or media. Some spyware collects information about websites you visit or things you purchase. The more vicious kind like cloggers literally report the keystrokes you make.

28
Q

What is ransomeware?

A

Ransomware installs on a computer and at a predetermined time locks up the data. Some will encrypt the entire contents of a hard drive. The ransomware will have some kind of payment mechanism demanding money in exchange for access to your data.

29
Q

How can a system be protected from malware/ransomeware?

A

Protecting against malware starts with keeping the operating system up to date. Both Windows and Mac OS do this automatically as long as the machine is connected to the Internet. The exam might ask about antivirus programs, treat these older applications like modern anti malware software, keep both the applications and definition files updated.

30
Q

What are the steps for dealing with malware?

A

Recognize, quarantine, search and destroy, remediate, educate

31
Q

What makes a good password?

A

Long mix of cases, numbers and symbols

32
Q

How can one remain protected when using public internet?

A

Use secure protocols (HTTPS rather than HTTP, IMAP instead of POP3 for email); Assume every public internet station is compromised

33
Q

What strategies can be used to reduce energy usage on Windows?

A

Adjust the energy usage with the power option applet in the Control Panel, adjust the screen brightness, set aggressive sleep options for moving parts like hard drives

34
Q

What should be used to clean the exterior of a computer?

A

A microfiber towel and mild electronic cleaner

35
Q

What should be used to clean the interior of a computer?

A

Compressed air

36
Q

Where should the interior of a computer be cleaned with compressed air?

A

Outside

37
Q

What should not be used on a monitor?

A

Glass cleaner

38
Q

Where should lithium ion batteries be disposed of?

A

Specifically designated recycling centers

39
Q

What should be checked first for a “dead” computer?

A

Power and connectivity

40
Q

What should be done first for a “stuck” system?

A

Reboot

41
Q

What should be the first step for specific application problems?

A

Web search

42
Q

What are the benefits of databases?

A

Beyond flat-file storage and spreadsheets, databases enable multiple simultaneous user access and queries on multiple fields and records.

43
Q

What is a relational database?

A

A relational database interlinks multiple tables

44
Q

What is the overall layout and structure of a database called?

A

The schema

45
Q

What is used for unique identification of records?

A

A primary key

46
Q

What are primary keys called when used in another table?

A

Foreign keys

47
Q

What kind of file is often used to import data into a table?

A

A CSV file