more for this test Flashcards

1
Q

1 Gigabit equals how much of a Gigabyte

A

1/8th

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the BEST course of action for Sarah if she suspects her mobile device, containing sensitive information, has been stolen?

A

Inform her colleagues and the IT department about the missing device
So they can remotely wipe the device and store stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following features in a file system prevents loss of data during power failure?

A

Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What device converts data from a digital format, suitable for a computer, to a format suitable for transmission over a standard phone line?

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When working with databases, which definition BEST describes a table?

A

The structure consisting of rows and columns that holds data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What application architecture best utilizes multiple layers and allows for better flexibility and maintainability in a system

A

n-tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of fields (or columns) in a Database Management System (DBMS)?

A

They represent specific categories of data in a table
(remember columns are attributes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of NIC provides network connectivity through physical cables?

A

Wired NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary difference between the Unicode and ASCII?

A

Unicode can represent a larger number of characters

while ASCII is limited to a set of 128 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the task scheduler utility do

A

Automating tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an example of an IP-based peripheral device?

A

Network Printer
(own IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is an independent units of software that are responsible for one well-defined task within an operating system and run in the background, often without direct user interaction?

A

Services
( run in the background)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following storage type offers web-based access, and can be easily scaled based on requirements?

A

Cloud storage service
(google drive etccc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which control models follow the principle of least privilege which only gives users permissions required for their tasks?

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the difference between a LAN and a WAN?

A

A LAN connects devices in a single location
WAN connects devices from multiple locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the main purpose of a method within an object in Object-Oriented Programming (OOP)?

A

To provide a means to interact with and manipulate an object’s data

17
Q

Which of the following types of malware is designed to conceal itself within seemingly legitimate software

18
Q

Which among the following units is commonly used to measure the processing speed of a computer?

A

Hertz (Hz)
3.80 GHz cpu

19
Q

Which factor is important in both subscription and one-time purchase software licenses?

A

Need for product keys and serial numbers
Continuous updates

20
Q

Which installation practice helps mitigates compatibility concerns?

A

Reading instructions

21
Q

what allows customization of installation

A

advanced options

22
Q

What is the difference between a procedure and a function in programming?

A

A function returns a value

procedure performs actions but does not return a value

23
Q

What feature of an antivirus software allows users to configure regular system scans at specific times or intervals?

A

Scheduled scans

24
Q

Which of the following BEST describes semi-structured data?

A

Semi-structured data has some organized elements but doesn’t strictly adhere to a tabular format
(Shemedium)

25
Q

Unauthorized information alteration does what

A

prevents unauthorized modification or tampering of data within the organization’s systems

26
Q

What is the primary goal of restoring access during disaster recovery?

A

To ensure business continuity