Basics Flashcards

(43 cards)

1
Q

What does IT stand for?

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A computer’s CPU is responsible for processing instructions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The __________ is the main circuit board in a computer.

A

motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary function of an operating system?

A

To manage computer hardware and software resources.

In a computer, resources are things like the CPU, RAM, storage, and input/output devices (keyboard, screen, etc.). The operating system manages these so programs don’t fight over them, makes sure each program gets what it needs, and keeps everything running smoothly and securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an example of an operating system? A) Microsoft Word B) Windows C) Google Chrome

A

B) Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: RAM stands for Random Access Memory.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a web browser do?

A

It allows users to access and navigate the internet.

Examples: Google Chrome, Firefox, Internet Explorer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: __________ is the process of protecting computer systems and networks from information disclosure.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of a firewall?

A

To monitor and control incoming and outgoing network traffic.

It’s a device placed at “the entrance” of a local area network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT a type of software? A) Application B) Operating System C) Hardware

A

C) Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: A database is used to store and manage data.

A

True

Example: a database is where Facebook users’ information such as name and birthday is stored..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a URL?

A

To specify the address of a resource on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: __________ is an example of a cloud storage service.

A

Google Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does VPN stand for?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol is mainly used for sending emails?

A

SMTP (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: HTML stands for Hypertext Markup Language.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary purpose of an antivirus software?

A

To detect and remove malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fill in the blank: The __________ is the part of a computer that performs calculations and processing.

A

CPU (Central Processing Unit)

19
Q

What is the difference between hardware and software?

A

Hardware refers to the physical components of a computer, while software refers to the programs and applications that run on the hardware.

20
Q

Which of the following is a common file extension for a text document? A) .exe B) .txt C) .jpg

21
Q

True or False: Phishing is a technique used to gain sensitive information by masquerading as a trustworthy entity.

A

True

Phishing is when someone pretends to be a trustworthy person or company (like a bank or a popular website) to trick you into giving away personal information—like passwords, credit card numbers, or login details.

It often comes through fake emails, texts, or websites that look real but are designed to steal your info.

22
Q

What is the function of an IP address?

A

To identify a device on a network.

23
Q

Fill in the blank: __________ is a popular programming language known for its readability.

24
Q

What does GUI stand for?

A

Graphical User Interface

25
Which of the following is a type of malware? A) Firewall B) Trojan C) Router
B) Trojan
26
True or False: Backup is the process of creating copies of data to prevent loss.
True
27
What is the main purpose of a search engine?
To help users find information on the internet. Google and Bing are examples.
28
Fill in the blank: __________ is the term for unauthorized access to computer systems.
Hacking
29
Tweezers
Used to handle small parts, like tiny screws or wires.
30
Nut Driver
A tool for tightening or loosening nuts, useful in hardware assembly.
31
Spudger
A plastic or nylon tool for prying open devices without damage.
32
Hemostat
A clamp-like tool, often used for gripping wires or holding small components in place.
33
Spudger
A plastic or nylon tool for prying open devices without damage.
34
Difference between BIOS and Kernel
BIOS and Kernel serve different roles in a computer system: BIOS (Basic Input/Output System): • Firmware stored on a motherboard chip. • Initializes hardware during boot. • Runs before the OS starts. Kernel: • Core part of the operating system. • Manages CPU, memory, processes, devices. • Starts after BIOS finishes. • Stays active while the computer runs. Summary: • BIOS = starts the system. • Kernel = runs the system.
35
How a motherboard looks
36
Basic Input Output Settings image
37
Identify RFI Meter ESD Meter Voltmeter Tweezers
A) RFI Meter B) ESD Meter C) Voltmeter D) Tweezers
38
What is a protocol?
A protocol is a set of rules that computers follow to communicate with each other. These rules tell computers how to send, receive, and understand messages correctly. It’s similar to how people need to speak the same language and take turns when texting—protocols make sure computers stay in sync and avoid confusion. Examples include: • HTTP – used for loading websites • Wi-Fi protocols – for connecting wirelessly • Bluetooth – for short-range device communication Without protocols, computers wouldn’t know how to share information or work together.
39
What kind of rules a protocol sets?
1. How to start and end communication (e.g., handshakes, connection setup) 2. How data is formatted (e.g., headers, message structure) 3. How data is sent (e.g., in chunks, with timing or order) 4. How to handle errors (e.g., retries, checksums) 5. How to confirm receipt (e.g., acknowledgments or status codes) 6. Who speaks when (e.g., turn-taking or flow control) These rules ensure reliable, clear, and coordinated communication between devices.
40
What is HTML (HyperText Markup Language)?
HTML (HyperText Markup Language) is the standard language used to create and structure content on the web. It tells a browser what to display and how to organize it, like headings, paragraphs, links, images, and lists. *The language to structure the look of websites*
41
What is a file extension?
A file extension is the group of letters after the dot in a file name, like .jpg, .docx, or .mp3. It tells the computer what kind of file it is and which program should open it. For example: • .jpg = image file • .docx = Word document • .mp3 = music file It’s like a label that helps the computer know what to do with the file.
42
What is a programming language?
We use programming languages to give computers clear, step-by-step instructions they can follow. Each language has its own syntax (rules for writing code), just like grammar in English or Spanish. When you write a program, you’re basically creating a recipe the computer will follow to complete a task—like doing math, displaying a website, or playing a video. In short, programming languages are tools we use to create software and control what computers do.
43
What is task manager?
Windows System Utility View and manage running applications and background processes Can end applications that don’t respond