IT Fundamentals Flashcards

1
Q

What does IT stand for?

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of IT

A

It’s broad but it includes
- Building communication networks
-Safe guarding data and info
- Trouble shooting computer problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The two main categories of software are _____ and system software. Explain them.

A

application

Application software is like the meal you order. These are the programs you interact with directly and USE TO ACHIEVE A CERTAIN TASK—like a game, a word processor, or a web browser. They use the foundation the system software provides to serve you specific functions you want.

System software is like the kitchen and staff behind the scenes. It includes the operating system (like Windows or macOS) and utilities that manage resources, control hardware, and make sure everything runs smoothly. You don’t interact with it directly, but it’s essential for the whole system to work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a type of database? A) HTML B) SQL C) CSS

A

B) SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main function of an operating system?

A

To manage computer hardware and software. Allows you to speak with the computer without knowing how to speak the computers language (machine code).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Cloud computing allow you to do.

A

Cloud computing allows you to access on demand computing services over the internet(cloud) so there’s no need for local servers. cloud computing offers data storage and management as well as running your apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CPU stand for?
And what does it do.

A

Central Processing Unit

Bro this is the brain 🧠 of the computer. It executes instructions, processes data and enables software applications to run smoothly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol is used for sending emails?

A

SMTP (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: _____ is the process of converting data into a code to prevent unauthorized access.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a firewall?

A

To protect a network by controlling incoming and outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does an IP address do

A

An IP address uniquely identifies a device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does URL stand for?

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an example of a programming language? A) HTML B) Java C) SQL

A

B) Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of RAM in a computer?

A

To provide temporary storage for data and programs that are currently in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: _____ is a type of malware that replicates itself to spread to other devices.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False: A LAN connects computers over large geographical areas. If false justify your answer

A

False. LAN (Local Area Network) is a network that connects devices within a small localised area whereas a WAN (Wide Area Network)
Whereas a WAN (Wide Area Network) connects computers and LANs over a large geographical area, such as a city, country and even globally.

🙂‍↔️ The internet self is a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the main purpose of a database management system (DBMS)?

A

To store, retrieve, and manage data in databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a common type of cloud service? A) IaaS B) Wi-Fi C) VPN

A

A) IaaS (Infrastructure as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fill in the blank: _____ is the act of identifying and removing security vulnerabilities.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the primary role of a network administrator?

A

To manage and maintain computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False: Software updates are not necessary for security.

A

False
Justification: Software updates are critical for security because they often contain patches that fix vulnerabilities discovered in the software. Cybercriminals actively search for and exploit these vulnerabilities to gain unauthorized access, install malware, or steal sensitive data. By applying updates, users close these security gaps, protecting their systems and data.

Additionally, updates may include improvements to encryption, stronger authentication methods, and bug fixes that enhance overall security and stability. Failing to update software leaves devices and data exposed to known threats, which can be easily exploited by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does VPN stand for?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which layer of the OSI model is responsible for end-to-end communication?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fill in the blank: _____ allows users to access and use software over the internet without installation.

A

Software as a Service (SaaS)

26
Q

What is the purpose of a backup?

A

To create copies of data to protect against loss.

27
Q

True or False: HTTPS is a secure version of HTTP. Justify answer.

A

True

Justification: HTTPS is a secure version of HTTP because it encrypts data sent between the browser and the server, protecting it from interception and tampering.

HTTP stands for Hypertext Transfer Protocol.
HTTPS stands for Hypertext Transfer Protocol Secure.

28
Q

What does DNS stand for?

A

Domain Name System

29
Q

Which of the following is NOT a type of software? A) Firmware B) Hardware C) Application

A

B) Hardware

30
Q

What is the role of a web server?

A

To serve web pages to users over the internet.

31
Q

Fill in the blank: _____ is a system used to assign IP addresses dynamically.

A

DHCP (Dynamic Host Configuration Protocol)

32
Q

What does the term ‘bandwidth’ refer to?

A

The maximum rate of data transfer across a network.

33
Q

True or False: A database can only store text data. justify

A

False.

Justification: Databases can store various data types, including text, numbers, dates, images, videos, and even complex data structures, making them versatile for different applications beyond just text.

34
Q

What is the main purpose of an API?

A

To allow different software applications to communicate with each other.

35
Q

Which of the following is a type of cloud storage service? A) Dropbox B) Windows C) Linux

A

A) Dropbox

36
Q

Fill in the blank: _____ is the primary language used for creating web pages.

A

HTML (Hypertext Markup Language)

37
Q

What does the acronym ‘IoT’ stand for?

A

Internet of Things

38
Q

True or False: A botnet is a network of infected devices controlled by a single entity.

A

True.

Justification: A botnet is a network of devices infected with malware, allowing a single attacker, or “botmaster,” to remotely control them. Botnets are often used for malicious activities, such as launching distributed denial-of-service (DDoS) attacks or sending spam.

39
Q

What is the role of a system analyst?

A

To analyze and design information systems to meet business needs.

40
Q

Which of the following is a benefit of virtualization? A) Increased hardware costs B) Improved resource utilization C) Decreased security

A

B) Improved resource utilization

41
Q

Fill in the blank: _____ is the process of converting source code into machine code.

A

Compilation

42
Q

Operating System (OS):

A

The software that manages computer hardware and provides common services for programs, like Windows, macOS, and Linux.

43
Q

Operating System (OS):

A

The software that manages computer hardware and provides common services for programs, like Windows, macOS, and Linux.

44
Q

CPU (Central Processing Unit):

A

The main part of a computer that performs calculations and executes instructions, often referred to as the “brain” of the computer.

45
Q

RAM (Random Access Memory):

A

Temporary memory that a computer uses to store data it needs immediately. More RAM usually means better multitasking performance.

46
Q

Cloud Computing:

A

Storing and accessing data and applications over the internet (the cloud) rather than on local computers or servers. Examples include Google Drive and AWS.

47
Q

VPN (Virtual Private Network):

A

A service that creates a secure connection to another network over the internet, protecting data and masking the user’s online identity.

48
Q

Firewall:

A

A network security device or software that monitors and filters incoming and outgoing network traffic to protect against unauthorized access.

49
Q

Antivirus:

A

Software designed to detect and remove malware, such as viruses, spyware, and ransomware.

50
Q

Encryption:

A

The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read the information.

51
Q

URL (Uniform Resource Locator):

A

The web address you type in to visit a website, such as “www.example.com.”

52
Q

Phishing:

A

A cyberattack method that uses fake emails or messages to trick users into providing sensitive information, like passwords or credit card details.

53
Q

Bandwidth:

A

The maximum amount of data that can be transmitted over an internet connection in a given time. Higher bandwidth means faster data transfer.

54
Q

Cache:

A

A small amount of memory that stores copies of recently accessed data to make future access faster. Browsers use cache to load pages more quickly.

55
Q

DNS (Domain Name System):

A

The “phonebook” of the internet, which translates human-friendly website addresses (like www.google.com) into IP addresses that computers use.

56
Q

Two-Factor Authentication (2FA):

A

An extra layer of security requiring not just a password but also another factor, like a code sent to your phone, to verify identity.

57
Q

HTTP/HTTPS (nutshell):

A

Protocols used for transmitting web pages. HTTPS is the secure version, meaning data sent between the browser and the server is encrypted.

58
Q

Malware:

A

Malicious software intended to damage or disrupt computers, including viruses, worms, and trojans.

59
Q

GUI (Graphical User Interface):

A

The visual interface on screens, consisting of icons, windows, and menus that users interact with.

60
Q

Database:

A

An organized collection of data stored electronically, often managed by a Database Management System (DBMS), like MySQL or Oracle.

61
Q

Patch:

A

An update released by software developers to fix bugs, security vulnerabilities, or other issues in a program or system.

62
Q

What does the CPU work closely with.

A

The Sytems memory (RAM) and storage devices.

Nayo it has small high speed cache memory (L1,L2 and L3). Speeding up the process to access data all the way from the RAM