ITF EXAM Flashcards

1
Q

Decimal

A

also referred to as base 10
express ten different numbers using a single digit in the range 0-9
values more than ten require 2 digits of decimal to express

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Binary

A

each single digit can express two values
range 0 to 1
can represent on/off states of transistors
can be referred to as base 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hexadecimal

A

16 different numbers using a single digit
range 0-F
A-F = 10-15
IPv6 and host addresses are expressed using hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Conversion

A

byte is 8 bits
double-byte is 16 bits
Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Throughput Units

A

Kbps, Mbps, Gbps, Tbps
Always base 10
how much data is transferred over a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integers

A

whole numbers
consumes 1 to 8 bytes of computer storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Float

A

decimal fractions
consumes 4 and 8 bytes of storage
could be whole numbers too ie: 4.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Boolean

A

special numeric data type indicating that something is either True/False with a 1 or 0
consumes a single bit of storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Char (characters)

A

single textual char
letter, symbol, number
one byte of storage
cannot perform math operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

String

A

collection of text characters
no storage limit
string length defined with data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unicode (Data Representation)

A

enables to handle data and express it across platforms in a uniform way
ASCII can be expressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASCII (Data Representation)

A

each number or character in a text file or string is represented by seven bit binary number
seven bit binary 128 different values can be expressed (0-127)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Basics of computing

A

input, processing, output, storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Input

A

command or info made availabe for computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Processing

A

retrieval, modification, manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Output

A

info sent out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Storage

A

used to retain digital data
SSD, CD, USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Troubleshooting Steps

A
  1. Identify the problem
    Gather information
    Duplicate the problem, if possible
    Question users
    Identify symptoms
    Determine if anything has changed
    Approach multiple
    problems individually
  2. Research knowledge base/
    Internet, if applicable
  3. Establish a theory of probable cause
    Question the obvious
    Consider multiple approaches
    Divide and conquer
  4. Test the theory to determine the cause
    Once the theory is confirmed
    (confirmed root cause), determine
    the next steps to resolve the problem
    If the theory is not confirmed,
    establish a new theory or escalate
  5. Establish a plan of action to resolve the
    problem and identify potential effects
  6. Implement the solution or
    escalate as necessary
  7. Verify full system functionality
    and, if applicable, implement
    preventive measures
  8. Document findings/lessons
    learned, actions, and outcomes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RJ - 11

A

Telephone Connector
4 to 6 wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RJ - 45

A

Ethernet Connector
8 pin connection
most commonly connected to CAT 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wireless Ethernet connections

A

WiFi, Bluetooth, NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bluetooth

A

3 classes:
class 1, 100mW, 100meters 328ft
class 2, 2.5 mW, 10 meters, 33 feet
class 3, less than 10 meters

most Bluetooth devices use class 2 radios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NFC

A

Near Field Communication:

Apple Pay, Enables file transfer, tap to print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Peripheral Devices

A

USB, FireWire, Thunderbolt, Bluetooth, RF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

FireWire

A

IEEE1394
transfers info between digital devices
audio and video
2 version
-FireWire 400 (4 or 6 wire)
-FireWire 800 (9 pin connector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Thunderbolt

A

high-speed connector introduced by Apple
used for high-speed storage and video
supports daisy chained peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

RF

A

Radio Frequency
mice and keyboards that don’t support Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Graphic Devices

A

VGA Analog
DV1 Digitaland Analog
HDMI Digital
Display Port Digital
Mini Display Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

VGA

A

Video Graphics Array
dual conversions process can cause display issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DVI

A

Digital Video Interface
compatible with VGA
computer monitors and projectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

HDMI

A

High Definition Multimedia Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

File Systems

A

FAT32 NFTS HFS+ ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

3.5 mm Mini Jack

A

Light Blue: Line in
Lime Green: stereo headphone/speaker
Pink: Microphone

5.1 and 7.1:
Black: rear speaker
Orange: center or subwoofer
Silver: side stereo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

S/PDIF

A

digital audio to HDVTs or receivers
on older pcs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

DVI

A

can be adapted to a VGA connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

SATA

A

Serial Advanced Technology Advancement
connect ATA drives to the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Port Cluster

A

allows external devices to plug into

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Expansion/Bus Slot

A

provides installation point for hardware expansion card
motherboards have at least 1 and most have 3 or more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

BIOS(Basic Input Output System)/Firmware

A

ROM(read-only chip) on motherboard
runs programs that are essential to computer
hands responsibility over to OS
Firmware: software program with a set of instructions on the hardware device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

UEFI

A

unified extensible firmware initiative
enhanced firmware used on computers since 2014

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CMOS

A

used to integrate circuits
complementary metal oxide semiconductor
found in: microprocessors, batteries, digital camera image sensors

BIOS settings stored in the CMOS chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

RAM

A

faster than storage devices, volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CPU

A

handles all instructions from hardware/software

2 types of CPU:
ARM(Advanced RISC Machine) processor: 32-bit, used by phones, tablets, small computers

Processors that run Windows and macOS laptops, servers, workstations:
32-bit and 64-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

SoC - System on a chip

A

combines electronic circuits of various computer components onto a single integrated chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

32 bit processor

A

32 bits of data per clock cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

64 bit processor

A

supports 64 and 32-bit OS and apps
each processor core runs like a separate processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

GPU

A

dedicated processor that performs display functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

NIC - Network Interface Card

A

also called ethernet card
uses RJ-45 connector
computer expansion card for connecting to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Wired Ethernet

A

port enables a computer to connect to any ethernet network
amber lights indicate max speed signal the port can use
signal lights indicate speed and connection activity
a green light indicates network activity blinks on/off as Netowkr adapter sends/receives data
signal lights don’t go off if a working connection is not attached or if computer is turned off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Intellectual Property

A

Copyright is automatic legal protection granted to certain types of work indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale.

Trademark name/logo. An ordinary trademark is indicated by the ™ symbol. A registered trademark is indicated by ®.

A patent is legal protection for some kind of invention and must be applied and registered for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Data Driven Business Decision

A

Data capture and collection -data points can be collected from many different sources.
data correlation -the information layer requires software to perform data correlation. This means analyzing the whole data set and finding connections and links between data points.
meaningful reporting-to inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Storage Unit of Measure

A

Bit - 1 or 0
Byte - 00010011
■ KiloByte (KB)—1000 bytes (or 103 or 101010 bytes). Small files are often measured in KB.
■ MegaByte (MB)—10001000 bytes (or 1,000,000 bytes). Many files would be measured in megabytes.
■ GigaByte (GB)—1000
1000*1000 bytes (1,000,000,000 bytes). Gigabytes are usually used to talk about disk capacity.
■ TeraByte (TB)—1000 GB (1,000,000,000,000 bytes). Some individual disk units might be 1 or 2 terabytes but these units are usually used to describe large storage networks.
■ PetaByte (PB)—1000 TB or 1015 bytes (1,000,000,000,000,000 bytes). The largest storage networks and cloud systems would have petabytes of capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Throughput Units

A

■ Kbps (or Kb/s)—1000 bits per second. Older computer peripheral interfaces (or buses) and slow network links would be measured in Kbps.
■ Mbps (or Mb/s)—1,000,000 bits per second. Many internal computer interfaces have throughputs measured in Mbps. Wireless networks and residential Internet links also typically have this sort of throughput.
■ Gbps (or Gb/s)—1,000,000,000 bits per second. The latest PC bus standards and networks can support this higher level of throughput. ■ Tbps (or Tb/s)—1,000,000,000,000 bits per second. This sort of capacity is found in major telecommunications links between data centers, cities, and countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Processing Speed

A

■ Megahertz (MHz)—1 million (1,000,000) cycles per second. Older PC bus interfaces and many types of network interface work at this slower signaling speed.

■ Gigahertz (GHz)—1000 million (1,000,000,000) cycles per second. Modern CPUs and bus types plus fiber optic network equipment work at these much faster speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Installation Types

A
  • Plug-and-play-This means that when you connect a new device, Windows identifies it and tries to install a device driver.
    -driver installation-There may be occasions when Plug-and-Play does not work and you need to install driver software manually before the device can be recognized. Windows ships with a number of default drivers and can also try to locate a driver in the Windows Update website. If no driver is available from there, you need to obtain one from the device vendor. The device may come with setup software or you may be able to download a driver from the vendor’s website.
    -Other required steps- Following installation there may be other required steps to complete configuration of the device.
  • IP-based peripherals-Some types of devices are not connected to the computer via a peripheral port but accessed over a network. Such a device will be configured with an Internet Protocol (IP) address.
  • Web-based configuration steps-The device vendor will normally provide a tool to locate the device on the network and then open a web configuration page in a browser. You can use the configuration page to set device options.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

motherboard

A

The motherboard is a Printed Circuit Board (PCB) with some built-in processors (the chipset), sockets and slots for upgradable components (CPU, RAM, adapter cards, disk drives), and wires (buses) to connect them together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Firmware/BIOS

A

Low-level PC settings affecting the operation of the motherboard can be configured via the system firmware setup program. This may also be referred to as CMOS setup, BIOS setup, or UEFI setup. You can normally access the system setup program with a keystroke during the power-on (boot) process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Storage

A

Hard Drive - based on a magnetic disk technology
SSD- use a type of transistor-based memory called flash memory and are much faster than HDDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cooling

A

Heatsink-passive cooling device/block of metal with fins
Fan-active cooling device/requires power to run
Liquid Base cooling- system of pumping water around the chassis/active cooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

SOHO Network(Small Office Home Office)

A

Can perform these functions:
Switch- connect 4-8 computers in ethernet LAN
Access Point-creates a wifi wireless network (WLAN)
Internet router/modem-connects the wired and wireless network clients to the Internet via a WAN link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Fiber Optic

A

faster internet service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Cable

A

The cable modem or modem/router is interfaced to the computer through an Ethernet adapter and to the cable network by a short segment of coax, terminated using an F-connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DSL

A

Digital Subscriber Line is a SOHO internet type that works over an ordinary telephone line. Most residential DSL services are asymmetric (ADSL), meaning that the uplink (up to about 1.4 Mbps) is slower than the downlink (up to about 24 Mbps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Satellite

A

provide far bigger areas of coverage
connections experience severe latency problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Cellular

A

radio transmissions greater range than Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Radio Frequency

A

Radio Frequency (RF) is a means of provisioning a wireless local network using Wi-Fi standard equipment. While this isn’t a means of Internet service provision in itself, it is a means for a client to connect to a wireless router offering Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

LAN

A

Local Area Network
network in a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

WAN(Wide Area Network)

A

Networks in different geographic locations but with shared links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Basics of packet transmission

A

Network signals must be packaged in such a way that each host is able to understand them. Also, each host must have a means of recognizing the location of other hosts on the network. These functions are provided by a network protocol. A network protocol identifies each host on the network using a unique address. It also defines a packet structure. A packet is a wrapper for each data unit transmitted over the network. A packet generally consists of a header (indicating the protocol type, source address, destination address, error correction information, and so on) and a payload (the data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Hard Drive: Solid State vs Spinning Disk

A

HDDs are based on a magnetic disk technology. SSDs use a type of transistor-based memory called flash memory and are much faster than HDDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Local Storage Types

A

RAM, Hard Drive, Optical, Flash Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Local Network Storage Types

A

NAS, File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

DNS

A

URL to IP translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

IP address

A

logically identify each host on a network
encodes two pieces of information:
Network ID and host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Media Access Control (MAC) address

A

identifies host by the address of its network interface at the data link layer
48 bit value
expressed in hex
00:60:8c:12:3a:bc or 00608c123abc
0060.8c12.3abc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Address Resolution Protocol (ARP)

A

protocol that enables this process of local address discovery to take place
ARP messages onto the local network to find out which host MAC address “owns” a particular IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

URL consists of:

A

Protocol : host location : file path
http:// : storecomptia.org/itf/ : index.htm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

HTTP and HTML

A

HTTP is the basis of the World Wide Web.
HTTP is usually used to serve HTML web pages, which are plain text files with coded tags (HyperText Markup Language) describing how the page should be formatted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

POP3

A

the messages are usually deleted from the server when they are downloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

IMAP

A

supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

SMTP

A

deliver/send messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Modem

A

transmit frames across WAN link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Router

A

forward packets between local network and the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Switch

A

connects four or eight computers together in an Ethernet LAN using RJ-45 network ports and twisted-pair cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Access Point

A

creates a Wi-Fi wireless network (W LAN) between computers and mobile devices equipped with suitable adapters and also switches communications between the wired and wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Firewall

A

can control how hosts and network applications are accessible to one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

SSL/TLS

A

SSL/TLS is closely associated with use of the HTTP application, referred to as HTTPS or HTTP Over SSL or HTTP Secure but can also be used to secure other TCP/IP application protocols. HTTPS operates over port 443 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

SSID

A

name for WLAN
It is a good idea to change the SSID from the default to something unique to your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

802.11a

A

5Gz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

802.11b

A

2.4Gz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

802.11g

A

2.4Gz

92
Q

802.11n

A

2.4Gz
5Gz

93
Q

802.11ac

A

5Gz
new standard

94
Q

802.11 standards

A

Most SOHO routers support 802.11g/n or 802.11g/n/ac. This means that you can have a mix of client devices. For example, you might have a new router that supports 802.11ac but computers and tablets with wireless adapters that only support 802.11n. You can use the access point in compatibility mode to allow these devices to connect. Compatibility modes can slow the whole network down, especially if 802.11b clients have to be supported. If possible, use newer standards only.

95
Q

Best Practices

A

Change SSID
Change default password
Encrypted vs unencrypted

96
Q

encrypted vs unencrypted

A

encryption systems consists of a cipher that scrambles the message and a key vs open authentication mode used on public AP data sent over the wireless network is unencrypted a captive portal can allow client to authenticate over HTTPS so the login is secure

97
Q

Encryption modes:

A

WEP, WPA, WPA2

98
Q

What info do you need to configure a wireless network manually?

A

require that the router be identified by its SSID. In addition, the encryption type and authentication information are required.

99
Q

Operating System (OS)

A

interface between applications and hardware

100
Q

workstation OS

A

runs traditional desktop PC or laptop

101
Q

mobile device OS

A

smartphones and tablets

102
Q

server OS

A

include software packages/roles
simpler command line interface rather than GUI to make it more secure and reliable

103
Q

Embedded OS

A

a computer or appliance designed for a very specific function
In an embedded system, the embedded OS acts as firmware. It provides all the functions for interacting with the device hardware.

104
Q

Two types of PC firmware:

A

Basic Input/Output System (BIOS)
Unified Extensible Firmware Interface(UEFI)

105
Q

Hypervisor (Type 1)

A

installed directly on computer and interacts directly with hardware

106
Q

File Systems

A

NTFS = Compression, Encryption, Permissions, Journaling, Case Aware
FAT32 = n/a
HFS+ = Compression, Permissions, Journaling, Case Aware
ext4 = Encryption, Permissions, Journaling, Case Aware

107
Q

Disk Management

A

format mass storage devices and manage partitions
A disk must have a t least one partition and each partition must be formatted with a file system.

108
Q

Folders/directories

A

Linux > directories>in the directory path /home/andy, home is a subdirectory of the root directory and andy is a subdirectory of home.
Windows > C:\WINDOWS\System32. WINDOWS is a subfolder of the root and System32 is a subfolder of WINDOWS.

109
Q

File Types and Extensions

A

The last part of the file name represents an extension which describes what type of file it is.

110
Q

Permissions

A

To view, create, modify, or delete a file in a folder, you need the correct permissions on that folder

111
Q

Processes

A

main unit governing a program and managing memory resources allocated to it by the OS

112
Q

Services

A

Windows process that does not require user interaction and runs in the background

113
Q

Task Scheduler

A

Utility that sets tasks to run at a specific time
In Linux Cron is used to run tasks or scripts at a particular time

114
Q

Pagefile

A

virtual memory when OS loads more data than it can fit

115
Q

Disk Management

A

format mass storage and manage partitions

116
Q

console/command line

A

configure an OS using typed commands

117
Q

GUI

A

graphical user interface
controlled via mouse, keyboard and or touchscreen

118
Q

productivity software

A

applications that help users complete typical office tasks

119
Q

web browser software

A

for information research, to contact customers

120
Q

spreadsheet software

A

can be used for tracking and analyzing sales data
Example: Microsoft Excel

121
Q

word processing software

A

applications that help users write and edit documents

122
Q

Presentation Software

A

enables users to create sophisticated slide shows

123
Q

visual diagramming software

A

provides templates and shapes for different kinds of diagrams
Example: Microsoft Visio

124
Q

collaboration software

A

multiple users can work together on the same file/project

125
Q

email client software

A

works in conjunction with an email server
often coupled with Personal Information Manager (PIM)

126
Q

PIM

A

Personal Information Manager software provides features for storing and organizing information such as contacts and calendar events.

127
Q

online workspace

A

file is hosted on a network and users can sign in to access it

128
Q

Instant Messaging Software

A

allows users to communicate in real time with no delay unlike with email

129
Q

video conferencing software

A

allows users to configure virtual meeting rooms with options for voice, video and instant messaging

130
Q

project management software

A

breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure completion of tasks

131
Q

Accounting Software

A

supports financial and commercial functions

132
Q

Database software

A

enables user to store, organize, retrieve information

133
Q

Enterprise Level Database products examples:

A

SQL server and Oracle

134
Q

Business Specific software

A

to implement specific line of business functions

135
Q

flow chart

A

view sequence as a graphical flow chart to understand processess

136
Q

compiled programming languages

A

must transform code to executable binary before it can run
Examples:
C++
C#
COBOL
PASCAL

137
Q

Interpreted Programming Languages

A

no need to compile program it runs with the context of an interpreted which converts machine code at run time
Examples include:
scripting languages such as JavaScript, Perl, Python,

138
Q

Query Languages

A

designed to retrieve specific records from dataset and code does not need to be compiled
Example: SQL, XML

139
Q

Assembly Languages

A

machine code in human readable text and specific to a hardware architecture

140
Q

Markup Languages

A

not a programming language but a means of making data in a document accessible to a program
Example: HTML, XML

141
Q

Locally Installed Application Delivery Methods

A

local hardware
dont depend on network connection

142
Q

Local Network Hosted Application

A

client workstations access the application using a remote terminal or viewer
does not require the host to access the internet
Example: Citrix XenApp

143
Q

Cloud Hosted Application

A

clients connect to the application servers over the internet
clients/servers must have reliable internet connection

144
Q

Application architecture models

A

One Tier - hosted on the same computer
Two Tier - client(application/presentation)-server application separates
Three Tier - presentation and application layers are also split
N-Tier - more complex architecture example: shopping on amazon

145
Q

caching/clearing cache

A

done from the browsers settings dialog or configuration page

146
Q

private browsing

A

browser does not store cookies or temporary files and doesn’t add pages to the history list

147
Q

proxy settings

A

can be configured as a firewall and apply other types of content filtering rules
configure a proxy manually by entering IP address and port number.

148
Q

client side scripting

A

tends to break most websites because they depend on the functionality scripting allows
can be disabled by configuring settings

149
Q

Script Blocker

A

controls which websites are allowed to run scripts

150
Q

What are the different types of licenses?

A

Single Use
Group use/site license
concurrent license
open sourced vs proprietary
subscription vs one time purchase
product keys and serial numbers

151
Q

software installation best practice

A

compatible with OS
hardware meets app requirements
special instructions or known issues
valid agreement or license to install

152
Q

What are the 3 types of Interpreted Languages?

A

Scripting Languages
Scripted Languages
Markup Languages

153
Q

Organizational Techniques

A

pseudocode concepts
flow-chart concepts / sequence

154
Q

Logic Components

A

Looping and branching

155
Q

pseudocode concepts

A

no particular programming language specified

156
Q

flow chart

A

sequence of steps there are branches and loops

157
Q

branching

A

instruction to the computer to execute a different sequence of instructions

158
Q

looping

A

instruct computer to perform or repeat a task until a condition is met

159
Q

Identifiers

A

Variables and Constants

160
Q

Containers

A

Arrays and Vectors

161
Q

Objects

A

Properties, Attributes, and Methods

162
Q

Variables

A

stores temporary values

163
Q

constants

A

value stored does not change

164
Q

arrays

A

multi dimension container and can be used in the same manner as variables

165
Q

vectors

A

single dimension array
one column or one row in array

166
Q

functions

A

small section of code that is reusable, performs a very specific task, allows you to feed it relevant information

167
Q

properties

A

components or subtypes

168
Q

attributes

A

describes properties of an object or object itself

169
Q

methods

A

define procedure or what an object can do

170
Q

What is a database used for?

A

create, import/input, query, reports

171
Q

flat file system

A

enables you to store your information in sheets

Example; Excel Spreadsheet, CSV

172
Q

database

A

enforces data type, manage multiple tables and link fields, can support multiple users

173
Q

flat file vs database

A

database supports multiple concurrent users, scalability, speed, variety of data

174
Q

Records (in Database)

A

each row represents a separate record in the database

175
Q

Field(in Database)

A

each column represents a field

176
Q

Storage(data persistence)

A

a database represents a way for an app to store data persistently and securely

177
Q

relational database

A

structured database where information is organized in tables

178
Q

RDBMS

A

Relational Database Management Systems use Structured Query Language (SQL) to maintain and query data in the database.
Examples of RDBMS:
Microsoft SQL
Oracle Database
MySQL
Microsoft Office Access

179
Q

primary key

A

used to define relationship between one table and another table

180
Q

foreign key

A

column in the secondary table

181
Q

schema

A

definition of tables, columns, and relations

182
Q

Constraints

A

imposed on the values that can be input into each field

183
Q

semi structured databases

A

lacks the structure of formal database architecture but there is associated information called metadata that helps identify the data

184
Q

non structured databases

A

provides no rigid information of the data

Example: images, text files Word Documents, PowerPoint

185
Q

Document Databases

A

example of semi structured databases
rather than define tables and fields the database grows by adding documents to it. The documents can use the same structure or be different types

186
Q

key value/pair databases

A

storing properties of objects without predetermining the fields used to define an object. One key/value format used widely is JavaScript Object Notation (JSON)

187
Q

non relational databases

A

key/value pair database
document database

188
Q

Data Manipulation(SQL relational method)

A

SELECT
INSERT
DELETE
UPDATE

189
Q

Data Definition(SQL relational method)

A

CREATE
ALTER
DROP
Permissions

190
Q

Database Access Methods

A

user can run SQL commands on the database server or update or extract info using a form or app that encapsulates SQL commands as graphical controls or tools.

191
Q

direct/manual access

A

Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS database. Once they have connected, they can run SQL commands to create new databases on the system and interact with stored data. This can be described as direct or manual access.

192
Q

Programmatic Access

A

A software app can interact with the database either using SQL commands or using SQL commands stored as procedures in the database.

193
Q

Query/Report Builder

A

provides GUI for users to select actions to perform on the database and converts those selections to the SQL statements that will be executed.

194
Q

User Interface/Utility Access

A

an application might use a database in the background without the user being aware

195
Q

backups (databases)

A

most RDBMS provide stored procedures that invoke backup and restore commands at a database or table level.

196
Q

database dump

A

copy of database or table schema along with records expressed as SQL statements

197
Q

Ways to export/import databases?

A

database dump
backup

198
Q

CIA

A

confidentiality, integrity, availability

199
Q

confidentiality

A
  • Snooping
  • Eavesdropping
  • Wiretapping
  • Social engineering
  • Dumpster diving
200
Q

Integrity concerns

A
  • Man-in-the-middle
  • Replay attack
  • Impersonation
  • Unauthorized information alteration
201
Q

Availability concerns

A
  • Denial of service
  • Power outage
  • Hardware failure
  • Destruction
  • Service outage
202
Q

Securing devices (mobile/workstation)

A
  • Antivirus/Anti-malware
  • Host firewall
  • Changing default passwords
  • Enabling passwords
  • Safe browsing practices
  • Patching/updates
203
Q

What are the “device use best practices”?

A
  • Software sources
    - Validating legitimate
    sources
    - Researching legitimate
    sources
    - OEM websites vs.
    third-party websites
  • Removal of unwanted software
  • Removal of unnecessary software
  • Removal of malicious software
204
Q

AAA

A

Authentication means proving user is who they say they are

Authorization means creating barriers around resources so that only authenticated users can access

Accounting means recording when and by whom a resource was accessed

205
Q

Written policies and procedures

A

helps staff understand and fulfill their responsibilities and follow best practices

206
Q

Handling of confidential information

A
  • Passwords
  • Personal information
  • Customer information
  • Company confidential information
207
Q

Authentication

A
  • Single factor
  • Multifactor
  • Examples of factors
  • Password
  • PIN
  • One-time password
  • Software token
  • Hardware token
  • Biometrics
  • Specific location
  • Security questions
  • Single sign-on
208
Q

Authorization

A
  • Permissions
  • Least privilege model
  • Role-based access
  • User account types
  • Rule-based access
  • Mandatory access controls
  • Discretionary access controls
209
Q

Accounting

A
  • Logs
  • Tracking
  • Web browser history
210
Q

Non-repudiation

A
  • Video
  • Biometrics
  • Signature
  • Receipt
211
Q

password best practices

A
  • Password length
  • Password complexity
  • Password history
  • Password expiration
  • Password reuse across sites
  • Password managers
  • Password reset process
212
Q

plain text vs cypher text

A

plain text is unencrypted cypher text is encrypted

213
Q

Whatare the 3 places Data at rest is stored?

A
  • File level
  • Disk level
  • Mobile device
214
Q

Data in transit

A
  • Email
  • HTTPS
  • VPN
  • Mobile application
215
Q

fault tolerance

A

help protect against losing access to a computer system when components fail

216
Q

data redundancy

A

combining hard disks into an array of disks to help avoid unavailability

217
Q

RAID

A

Redundant Array of Independent Disks offers variety of fault tolerant solutions

218
Q

RAID 1

A

disk mirroring

219
Q

RAID 5

A

striping with parity

220
Q

Fault tolerance(business continuity concept)

A
  • Replication
  • Redundancy
  • Backup considerations
  • Location
  • Contingency plan
221
Q

Redundancy in fault tolerance(business continuity concept)

A

data, network, power

222
Q

Backup Considerations in fault tolerance(business continuity concept)

A

Data
>file backup
critical data
database
OS backups

223
Q

Location in fault tolerance(business continuity concept)

A
  • Stored locally
  • Cloud storage
  • On-site vs. off-site
224
Q

Contingency plan in fault tolerance(business continuity concept)

A

allows the system to be resilient to failures and unexpected outages

225
Q

disaster recovery(business continuity concept)

A
  • Data restoration
  • Prioritization
  • Restoring access
226
Q

scripting languages

A

types of interpreted language that can eb executed without the need to be compiled
examples: Perl PHP, Python

227
Q

drivers

A

tell computer how to comunicate with OS