IT Fundamentals Flashcards
What does IT stand for?
Information Technology
What is the primary purpose of IT
It’s broad but it includes
- Building communication networks
-Safe guarding data and info
- Trouble shooting computer problems
Fill in the blank: The two main categories of software are _____ and system software. Explain them.
application
Application software is like the meal you order. These are the programs you interact with directly and USE TO ACHIEVE A CERTAIN TASK—like a game, a word processor, or a web browser. They use the foundation the system software provides to serve you specific functions you want.
System software is like the kitchen and staff behind the scenes. It includes the operating system (like Windows or macOS) and utilities that manage resources, control hardware, and make sure everything runs smoothly. You don’t interact with it directly, but it’s essential for the whole system to work.
Which of the following is a type of database? A) HTML B) SQL C) CSS
B) SQL
What is the main function of an operating system?
To manage computer hardware and software. Allows you to speak with the computer without knowing how to speak the computers language (machine code).
What does Cloud computing allow you to do.
Cloud computing allows you to access on demand computing services over the internet(cloud) so there’s no need for local servers. cloud computing offers data storage and management as well as running your apps.
What does CPU stand for?
And what does it do.
Central Processing Unit
Bro this is the brain 🧠 of the computer. It executes instructions, processes data and enables software applications to run smoothly.
Which protocol is used for sending emails?
SMTP (Simple Mail Transfer Protocol)
Fill in the blank: _____ is the process of converting data into a code to prevent unauthorized access.
Encryption
What is the purpose of a firewall?
To protect a network by controlling incoming and outgoing traffic.
What does an IP address do
An IP address uniquely identifies a device on a network.
What does URL stand for?
Uniform Resource Locator
Which of the following is an example of a programming language? A) HTML B) Java C) SQL
B) Java
What is the function of RAM in a computer?
To provide temporary storage for data and programs that are currently in use.
Fill in the blank: _____ is a type of malware that replicates itself to spread to other devices.
Virus
What does HTTP stand for?
Hypertext Transfer Protocol
True or False: A LAN connects computers over large geographical areas. If false justify your answer
False. LAN (Local Area Network) is a network that connects devices within a small localised area whereas a WAN (Wide Area Network)
Whereas a WAN (Wide Area Network) connects computers and LANs over a large geographical area, such as a city, country and even globally.
🙂↔️ The internet self is a WAN
What is the main purpose of a database management system (DBMS)?
To store, retrieve, and manage data in databases.
Which of the following is a common type of cloud service? A) IaaS B) Wi-Fi C) VPN
A) IaaS (Infrastructure as a Service)
Fill in the blank: _____ is the act of identifying and removing security vulnerabilities.
Penetration testing
What is the primary role of a network administrator?
To manage and maintain computer networks.
True or False: Software updates are not necessary for security.
False
Justification: Software updates are critical for security because they often contain patches that fix vulnerabilities discovered in the software. Cybercriminals actively search for and exploit these vulnerabilities to gain unauthorized access, install malware, or steal sensitive data. By applying updates, users close these security gaps, protecting their systems and data.
Additionally, updates may include improvements to encryption, stronger authentication methods, and bug fixes that enhance overall security and stability. Failing to update software leaves devices and data exposed to known threats, which can be easily exploited by attackers.
What does VPN stand for?
Virtual Private Network
Which layer of the OSI model is responsible for end-to-end communication?
Transport layer
Fill in the blank: _____ allows users to access and use software over the internet without installation.
Software as a Service (SaaS)
What is the purpose of a backup?
To create copies of data to protect against loss.
True or False: HTTPS is a secure version of HTTP. Justify answer.
True
Justification: HTTPS is a secure version of HTTP because it encrypts data sent between the browser and the server, protecting it from interception and tampering.
HTTP stands for Hypertext Transfer Protocol.
HTTPS stands for Hypertext Transfer Protocol Secure.
What does DNS stand for?
Domain Name System
Which of the following is NOT a type of software? A) Firmware B) Hardware C) Application
B) Hardware
What is the role of a web server?
To serve web pages to users over the internet.
Fill in the blank: _____ is a system used to assign IP addresses dynamically.
DHCP (Dynamic Host Configuration Protocol)
What does the term ‘bandwidth’ refer to?
The maximum rate of data transfer across a network.
True or False: A database can only store text data. justify
False.
Justification: Databases can store various data types, including text, numbers, dates, images, videos, and even complex data structures, making them versatile for different applications beyond just text.
What is the main purpose of an API?
To allow different software applications to communicate with each other.
Which of the following is a type of cloud storage service? A) Dropbox B) Windows C) Linux
A) Dropbox
Fill in the blank: _____ is the primary language used for creating web pages.
HTML (Hypertext Markup Language)
What does the acronym ‘IoT’ stand for?
Internet of Things
True or False: A botnet is a network of infected devices controlled by a single entity.
True.
Justification: A botnet is a network of devices infected with malware, allowing a single attacker, or “botmaster,” to remotely control them. Botnets are often used for malicious activities, such as launching distributed denial-of-service (DDoS) attacks or sending spam.
What is the role of a system analyst?
To analyze and design information systems to meet business needs.
Which of the following is a benefit of virtualization? A) Increased hardware costs B) Improved resource utilization C) Decreased security
B) Improved resource utilization
Fill in the blank: _____ is the process of converting source code into machine code.
Compilation
Operating System (OS):
The software that manages computer hardware and provides common services for programs, like Windows, macOS, and Linux.
Operating System (OS):
The software that manages computer hardware and provides common services for programs, like Windows, macOS, and Linux.
CPU (Central Processing Unit):
The main part of a computer that performs calculations and executes instructions, often referred to as the “brain” of the computer.
RAM (Random Access Memory):
Temporary memory that a computer uses to store data it needs immediately. More RAM usually means better multitasking performance.
Cloud Computing:
Storing and accessing data and applications over the internet (the cloud) rather than on local computers or servers. Examples include Google Drive and AWS.
VPN (Virtual Private Network):
A service that creates a secure connection to another network over the internet, protecting data and masking the user’s online identity.
Firewall:
A network security device or software that monitors and filters incoming and outgoing network traffic to protect against unauthorized access.
Antivirus:
Software designed to detect and remove malware, such as viruses, spyware, and ransomware.
Encryption:
The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read the information.
URL (Uniform Resource Locator):
The web address you type in to visit a website, such as “www.example.com.”
Phishing:
A cyberattack method that uses fake emails or messages to trick users into providing sensitive information, like passwords or credit card details.
Bandwidth:
The maximum amount of data that can be transmitted over an internet connection in a given time. Higher bandwidth means faster data transfer.
Cache:
A small amount of memory that stores copies of recently accessed data to make future access faster. Browsers use cache to load pages more quickly.
DNS (Domain Name System):
The “phonebook” of the internet, which translates human-friendly website addresses (like www.google.com) into IP addresses that computers use.
Two-Factor Authentication (2FA):
An extra layer of security requiring not just a password but also another factor, like a code sent to your phone, to verify identity.
HTTP/HTTPS (nutshell):
Protocols used for transmitting web pages. HTTPS is the secure version, meaning data sent between the browser and the server is encrypted.
Malware:
Malicious software intended to damage or disrupt computers, including viruses, worms, and trojans.
GUI (Graphical User Interface):
The visual interface on screens, consisting of icons, windows, and menus that users interact with.
Database:
An organized collection of data stored electronically, often managed by a Database Management System (DBMS), like MySQL or Oracle.
Patch:
An update released by software developers to fix bugs, security vulnerabilities, or other issues in a program or system.
What does the CPU work closely with.
The Sytems memory (RAM) and storage devices.
Nayo it has small high speed cache memory (L1,L2 and L3). Speeding up the process to access data all the way from the RAM