Batch 2 Flashcards

(478 cards)

1
Q

What is ‘Digital Sobriety’?

A

An environmental movement focused on reducing the environmental impact of digital technology by choosing low-energy devices and limiting unnecessary data consumption (e.g., lower video resolution).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of ‘Protecting the Environment’?

A

To be aware of the environmental impact of digital technologies and their use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the power consumption of a NAS differ from an external hard drive?

A

A NAS usually stays powered on 24/7 to remain accessible on the network, consuming more electricity over time, whereas an external drive only uses power when plugged into a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you find out your automatically assigned IP address in Windows?

A

Open the ‘Command Prompt’ window and enter the ‘ipconfig’ command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you do if you forget the PIN code to your mobile phone’s SIM card?

A

You can use the PUK code to unlock the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DNS issue in networking?

A

When the translation from the URL you type (like www.google.com) to its corresponding IP address fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ‘restarting the router’ usually fix in a home network?

A

It clears the router’s memory (RAM), resets IP assignments, and forces the router to re-establish a fresh handshake with the ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If your computer is on but the monitor remains black, what is the first physical troubleshooting step you should take?

A

Check the physical cable connections (HDMI/DisplayPort) at both ends—the monitor and the computer/graphics card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the ‘PUK’ code for a SIM card?

A

The Personal Unlocking Key (PUK) is used to reset a SIM card after the PIN code has been entered incorrectly too many times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the ‘ipconfig’ command in the Windows Command Prompt reveal?

A

It displays all current TCP/IP network configuration values, including the IP address, subnet mask, and default gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a printer is ‘Ghosting’ (faintly repeating text down a page), what is usually the hardware cause?

A

A failing drum unit or a fuser assembly issue in a laser printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a ‘Cold Boot’ vs. a ‘Warm Boot’ from a hardware perspective?

A

A Cold Boot starts the hardware from a powered-off state (fully clearing RAM); a Warm Boot (Restart) re-initializes the OS without cutting power to the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a laptop charger’s LED is on but the OS says ‘Plugged in, not charging,’ what is a common software cause?

A

Battery management settings or ‘Battery Saver’ modes that stop charging once a certain percentage (e.g., 80%) is reached to preserve battery health.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a common reason a camera might not work in an online meeting despite being plugged in?

A

The browser or program may not have been granted the necessary ‘permission’ to access the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the most frequent sources of problems in IoT and mobile devices?

A

Connectivity/network availability, battery/power issues, and limited processing power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a ‘DNS issue’ in simple terms?

A

A problem where the translation from a URL (e.g., google.com) to an IP address does not work, preventing access to the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the first step when a mobile app is frozen?

A

Force-close the app via the task switcher or ‘App Info’ settings and attempt to restart it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does it mean if a Wi-Fi icon has an ‘Exclamation Mark’ on it?

A

It means the device is connected to the router, but the router has no connection to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the ‘Command Prompt’ command to check network connectivity and IP details?

A

The ‘ipconfig’ command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of a PUK (Personal Unlocking Key)?

A

It is a code used to unlock a mobile phone’s SIM card after the PIN has been entered incorrectly too many times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What exactly is happening technically when you experience a ‘DNS issue’ preventing you from getting online?

A

The system is failing to translate the URL you typed (like google.com) into the numerical IP addresses required to locate the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can you find your computer’s IP address if it was assigned automatically?

A

By opening the ‘Command Prompt’ window and entering the ‘ipconfig’ command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What should you check first if your camera or microphone is not working in an online meeting?

A

Check the privacy slider (physical cover), USB/Bluetooth connections, program permissions, and that the correct camera/microphone is selected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the first thing to do if a program is ‘frozen’ and not responding to clicks?

A

Try to force-close the application (e.g., via Task Manager or Force Quit) and restart the computer if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the definition of 'Solving Technical Problems'?
To identify technical problems when operating devices and using digital environments, and to solve them (from troubleshooting to solving more complex problems).
26
What is 'DAS' (Direct Attached Storage) and what is its main limitation?
Storage directly connected to a single computer (e.g., internal HDD or USB drive). Its main limitation is a lack of native network sharing and remote access.
27
What does 'NAS' stand for and how does it connect to your devices?
It stands for Network Attached Storage. It is a dedicated server that connects to your local router (usually via Ethernet), making files accessible to all authorized devices via the internet.
28
What is RAID in the context of a NAS, and why is it used?
Redundant Array of Independent Disks; it is a technology that mirrors or distributes data across multiple drives so that if one drive fails, your data remains safe and accessible.
29
What is a 'Single Point of Failure' in storage, and which storage type is most vulnerable to it?
A setup where one component failing causes total data loss; an External Hard Drive (DAS) is the most vulnerable because it lacks built-in redundancy like RAID.
30
What is the difference between Block Storage (SAN) and File Storage (NAS)?
NAS provides data as complete files (like a shared folder), whereas SAN (Storage Area Network) provides data as raw blocks that appear to the computer as a local, unformatted drive.
31
What is RAID 0 (Striping) and what is its primary purpose?
It splits data evenly across two or more disks to increase performance (speed). Its main disadvantage is that it provides **no redundancy**; if one drive fails, all data is lost.
32
What is RAID 1 (Mirroring) and when should it be used?
It creates an exact copy (mirror) of data on two or more disks. It is used when data safety is the priority, as it can survive a disk failure, but it 'wastes' 50% of total storage capacity.
33
How does RAID 5 handle data protection using 'Parity'?
It stripes data across three or more disks and includes 'parity' information. If one drive fails, the system uses the parity data to mathematically reconstruct the missing files.
34
What is RAID 10 (1+0) and why is it considered the 'best of both worlds'?
It combines mirroring and striping by mirroring two sets of drives and then striping data across them. It provides both high speed and high redundancy, though it is the most expensive to implement.
35
Why is it said that 'RAID is not a backup'?
RAID protects against hardware (disk) failure, but it does not protect against accidental deletion, malware, or fire. A true backup must be an independent copy stored in a different location.
36
What does the FTP protocol stand for and what is it used for?
File Transfer Protocol; it is a standard network protocol used to transfer files between a client and a server on a computer network.
37
What is the function of the TCP/IP protocol suite?
It is the foundational set of rules that governs how data is packetized, addressed, transmitted, routed, and received across the internet.
38
What is a Firewall and how does it protect a network?
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to block unauthorized access.
39
What is the primary file size limitation of the FAT32 drive format?
Individual files stored on a FAT32 drive cannot exceed 4GB in size, which often prevents saving high-definition video files.
40
Why is the exFAT format often preferred for external USB drives and SD cards?
It combines the high compatibility of FAT32 with the ability to store files larger than 4GB, making it ideal for sharing data between Windows and macOS.
41
Which file system is specifically optimized for Flash storage and SSDs on modern Apple devices?
APFS (Apple File System) is designed for solid-state storage with a focus on strong encryption and improved file management speeds.
42
What happens during the process of 'Formatting' a drive?
The operating system erases all existing data and creates a new internal 'address book' (the file system) so it knows how to store and retrieve data on that physical disk.
43
What does NFC stand for and what is its maximum effective range?
Near Field Communication; it is designed for very short-range communication, typically requiring devices to be within 4 centimeters (about 1.5 inches) of each other.
44
What is an 'NFC Tag' and does it require its own battery?
An NFC tag is a small, unpowered chip that stores information; it is 'passive,' meaning it draws its power from the electromagnetic field of the smartphone that scans it.
45
Can NFC be used to transfer large files like high-definition videos?
No, NFC has a very low data transfer rate; it is intended for small bursts of data like ID numbers, URLs, or payment tokens, not large media files.
46
What is the role of the 'Secure Element' (SE) in a device with NFC?
It is a tamper-resistant chip that securely hosts applications and their confidential data (like payment credentials) to prevent unauthorized access by malware.
47
Why does the DMA require a choice screen for browsers and search engines on mobile devices?
To prevent default bias, ensuring users are presented with a selection of options rather than being forced to use the Gatekeeper's own pre-set browser or search tool.
48
What is a 'Needs Analysis' when choosing a digital tool?
The process of determining the specific requirements of a task (e.g., budget, number of users, security) before selecting software or hardware to ensure the tool is fit for purpose.
49
What is 'Software as a Service' (SaaS) and why might a small business choose it over local installation?
SaaS is software hosted in the cloud; businesses choose it for lower upfront costs, automatic updates, and the ability to access tools from any device.
50
What is 'PaaS' (Platform as a Service) and how does it differ from IaaS?
PaaS provides a framework for developers to build and deploy apps without managing the underlying servers or storage (IaaS); the provider manages the OS and runtime.
51
What is a 'Legacy System'?
An outdated computer system, programming language, or software application that is still in use because it performs a critical function but lacks modern support and security.
52
What is 'Assistive Technology'?
Devices or software (like screen readers or eye-tracking mice) used by people with disabilities to perform tasks that might otherwise be difficult.
53
What is 'AI Alignment'?
The process of ensuring that an Artificial Intelligence's goals and behaviors are consistent with human values and intentions.
54
Why might AI-driven speech-based technology limit accessibility for some users?
Because these systems often do not work as well for 'smaller' languages due to the commercial prioritization of developers.
55
When using machine translation solutions (like Google Translate or DeepL), in what contexts should you still rely on a precise human translation?
When dealing with high-stakes contexts such as healthcare, commerce, and diplomacy.
56
What is an API (Application Programming Interface) in simple terms?
A 'bridge' that allows two different software programs to talk to each other (e.g., allowing a travel site to pull flight data from an airline's database).
57
How is 'Identifying Needs and Technological Responses' defined?
To assess needs and identify, evaluate, select, and use digital tools and possible technological responses to solve them.
58
What is SaaS (Software as a Service) and give an example?
A cloud model where the provider hosts the application and makes it available to users over the internet; examples include Gmail
59
What is IaaS (Infrastructure as a Service)?
A model that provides virtualized computing resources (like virtual servers, storage, and networking) over the internet, allowing businesses to rent hardware instead of buying it.
60
What is PaaS (Platform as a Service)?
A cloud environment where developers can build, test, and run applications without worrying about managing the underlying servers or storage.
61
What is the purpose of a 'Digital Prototype' in problem solving?
A preliminary version of a digital solution (like a basic app layout) used to test a concept or process before full-scale development.
62
In the context of the Internet of Things (IoT) in industry, what is a 'Digital Twin'?
A virtual, digital representation of a physical object or system, often used for preventive maintenance in industrial settings.
63
What are 'Adalo', 'Glide', and 'Bubble' used for?
Developing mobile apps.
64
What is an 'Ideation'?
A challenge or contest aimed at generating, developing and communicating new ideas, grants, joint initiation of projects.
65
What is 'FixMyStreet' an example of?
A public reporting system that engages citizens in resolving social problems through digital solutions.
66
What is a 'MOOC' and how can it be used for collaborative problem solving?
A Massive Open Online Course; users can ask questions in forums to exchange information and perspectives to resolve conceptual problems.
67
What is a 'Time Bank' in the context of digital social solutions?
An online platform where 'money' is replaced by time spent helping others, allowing for a digital exchange of community services.
68
What does 'Creatively Using Digital Technology' mean?
To use digital tools and technologies to create knowledge and to innovate processes and products.
69
What is the main difference between Artificial Narrow Intelligence (ANI) and Artificial General Intelligence (AGI)?
ANI refers to today's AI, which is highly capable but only at specific, narrow tasks. AGI is a theoretical system that equals or surpasses human intelligence across all domains.
70
How can the 'Europass Digital Skills Test' assist in professional development?
It provides an official self-assessment tool to identify specific areas of weakness in digital competence according to the DigiComp framework, allowing for targeted training.
71
How can you get reliable feedback on your digital skills?
Based on DigComp: DigiComp’s MyDigiSkills or the Europass Digital Skills Test
72
What is the 'DigComp Framework' intended to provide for individuals and organizations?
A common reference framework to identify, assess, and develop digital competences across Europe.
73
What is a 'MOOC'?
A Massive Open Online Course, used to improve skills and knowledge through online participation.
74
What are 'Micro-credentials'?
They are certifications that accredit specific learning outcomes acquired from short, targeted online learning opportunities.
75
What are 'Personalised Learning Pathways'?
Digital tools that help individuals identify their learning interests and set personal goals for self-development.
76
What is the definition of 'Identifying Digital Competence Gaps'?
To understand where one's own digital competence needs to be improved or updated, and to be able to support others with their digital competence development.
77
What is an AI 'Large Language Model' (LLM)?
A type of AI trained on vast amounts of text data to understand and generate human-like language, such as GPT or Gemini.
78
What is 'Algorithmic Bias' in AI?
When an AI system produces systematically prejudiced results due to biased training data or flawed assumptions made during the algorithm's development.
79
What is 'Deepfake' technology?
AI-generated images, videos and audio recordings of things that did not happen but are in-distinguishable from real content, often used to spread disinformation.
80
What is 'Machine Learning' (ML)?
A subset of AI that focuses on building systems that learn from data and improve their performance over time without being explicitly programmed for every task.
81
What is 'Prompt Engineering'?
The process of refining and optimizing the input text (the 'prompt') to an AI model to get the most accurate or useful output.
82
What is 'Explainable AI' (XAI)?
A set of processes and methods that allow human users to comprehend and trust the results and output created by machine learning algorithms.
83
What is 'Reinforcement Learning' in AI?
A type of machine learning where an 'agent' learns to make decisions by performing actions in an environment to maximize a reward.
84
What is 'Natural Language Processing' (NLP)?
A field of AI that focuses on the interaction between computers and human language, specifically how to program computers to process and analyze large amounts of natural language data.
85
What is 'Computer Vision'?
A field of AI that enables computers and systems to derive meaningful information from digital images, videos, and other visual inputs.
86
What is 'Machine Learning' (ML)?
A subset of AI where systems 'learn' from large amounts of data to make predictions or decisions without being explicitly programmed for a specific result.
87
What is 'Generative AI'?
AI that can create new content, such as text, images, or music, based on the patterns it learned from existing data.
88
What is a 'Large Language Model' (LLM)?
A type of AI trained on vast amounts of text data that can understand and generate human-like language.
89
What is the difference between bitrate and sample rate in digital audio?
Sample rate is how many times per second the sound is 'measured' (e.g., 44.1kHz), while bitrate is how much data is processed per second (e.g., 320kbps); higher values generally mean better quality.
90
What is a browser cache and why might you need to clear it?
The cache stores temporary internet files (like images and scripts) to load pages faster. You clear it if a website is displaying outdated information or if the stored files become corrupted, causing display errors.
91
What is 'In-browser PDF Viewing' and what is a potential security risk?
It allows you to view PDFs directly in the browser without downloading them. The risk is that a malicious PDF could exploit vulnerabilities in the browser's built-in PDF reader.
92
What are 'Browser Extensions' (or Add-ons)?
Small software modules that customize or add new features to a web browser, such as ad-blockers, password managers, or language translators.
93
Why is it important to keep your browser updated?
To ensure you have the latest security patches against new 'Zero-day' vulnerabilities and to maintain compatibility with modern web standards.
94
What are 'Browser Cookies' and what is their primary use?
Small pieces of data sent from a website and stored on the user's computer while browsing to remember stateful information (like items in a shopping cart).
95
What is 'Hardware Acceleration' in a browser?
A setting that offloads heavy tasks (like video decoding or 3D graphics) from the CPU to the GPU to improve performance and smoothness.
96
What is 'Strict Tracking Protection'?
A browser setting that blocks all known trackers, but might break some website functionality (like embedded videos or logins).
97
What are 'Browser Cookies' used for in online shopping?
They keep track of which items you have added to your virtual shopping cart as you move from page to page.
98
What is 'Incognito' or 'Private' browsing?
A browser mode that does not save your history, cookies, or site data locally, though your activity is still visible to your ISP and websites.
99
What is a 'Browser Extension'?
A small software module that adds specific features or functionality to a web browser (e.g., an ad blocker).
100
What is the difference between 'Public Cloud' and 'Private Cloud'?
Public cloud services (like Dropbox) share infrastructure among many users. A private cloud is dedicated exclusively to one organization, offering higher security and control.
101
What is 'SaaS' (Software as a Service)?
A cloud model where users access software over the internet on a subscription basis (e.g., Microsoft 365, Google Workspace) rather than installing it locally.
102
What is 'Cloud Synchronization'?
The process of automatically updating files across all your devices so that the most recent version of a file is available everywhere.
103
What is 'Edge Computing'?
A distributed computing paradigm that brings data storage and processing closer to the devices where it is gathered (the 'edge') rather than a central cloud.
104
What is 'IaaS' (Infrastructure as a Service)?
A cloud model where a provider supplies virtualized computing resources over the internet, such as virtual machines and storage (e.g., Amazon AWS).
105
What is 'Latency' in cloud gaming?
The time it takes for a button press to travel to the cloud server and for the resulting video frame to travel back to the player's screen.
106
What is 'Multi-tenancy' in cloud computing?
An architecture where a single instance of a software application serves multiple customers (tenants), while keeping each customer's data isolated and secure.
107
What is 'Hybrid Cloud'?
A computing environment that combines a private cloud (on-premises) with a public cloud, allowing data and apps to be shared between them for greater flexibility.
108
What is the difference between 'Cloud Storage' and 'Local Storage'?
Cloud storage stores files on the internet (accessible anywhere); local storage stores them on your physical device.
109
In Google Drive or OneDrive, what does 'View Only' permission mean?
The recipient can see and read the file but cannot make any changes or leave comments.
110
What is 'VLC Media Player' known for?
Being a free, open-source player that can play almost any video or audio format without needing extra codecs.
111
What is 'Adobe Acrobat Reader' used for?
The standard free software for viewing, printing, and signing PDF documents.
112
What is 'WinRAR' or '7-Zip' used for?
To 'extract' files from compressed archives (.zip, .rar, .7z) or create new ones.
113
What is 'Canva' primarily used for?
An easy-to-use online graphic design tool for creating social media posts, presentations, and posters.
114
What is 'Slack' or 'Microsoft Teams' used for?
Professional communication and collaboration platforms for businesses and teams.
115
What is the difference between '.ZIP' and '.7Z'?
Both are compressed archive formats, but .7Z often uses the LZMA algorithm to achieve significantly higher compression ratios than the standard .ZIP.
116
What is 'YAML' and how does it differ from 'JSON'?
YAML is a human-readable data serialization language often used for configuration files; it uses indentation rather than brackets/braces like JSON.
117
What is a 'CSV' file separator and why is it important?
It is the character (usually a comma or semicolon) that divides data into columns; choosing the wrong one can cause a spreadsheet to display all data in a single column.
118
What is 'Unicode' (specifically UTF-8) and why is it the global standard?
It is a character encoding standard that can represent almost all written languages, symbols, and emojis, ensuring text displays correctly across different systems and regions.
119
What is 'JSON' (JavaScript Object Notation)?
A lightweight, text-based data format used to transmit data between a server and a web application, preferred over XML for its simplicity and speed.
120
What is 'SQL' (Structured Query Language)?
The standard programming language used to manage and manipulate relational databases (e.g., searching, adding, or deleting data entries).
121
What is 'Big Data' and what are the '3 Vs' associated with it?
Extremely large data sets that may be analyzed computationally; the 3 Vs are Volume (amount), Velocity (speed of generation), and Variety (types of data).
122
What is 'JSON-LD'?
JSON for Linked Data; a method of encoding linked data using JSON, commonly used to provide 'Structured Data' to search engines to improve SEO.
123
What is 'Big Data' and name one of the '3 Vs'.
Extremely large datasets; one 'V' is 'Velocity' (the speed at which new data is generated).
124
What is 'CSV' (Comma-Separated Values)?
A plain text file format used to store tabular data (like spreadsheets), where each value is separated by a character like a comma.
125
How many proficiency levels are defined in the DigiComp 2.1/2.2 framework?
There are 8 proficiency levels, ranging from Foundation (1-2) and Intermediate (3-4) to Advanced (5-6) and Highly Specialized (7-8).
126
What characterizes 'Foundation Level 1' in the framework?
The user performs simple tasks with guidance and has limited autonomy.
127
What is the key difference between 'Intermediate Level 3' and 'Intermediate Level 4'?
Level 3 involves performing well-defined, routine tasks on one's own, while Level 4 involves independent task completion and managing well-defined, non-routine problems.
128
At which proficiency level is a user expected to start 'guiding others'?
At Level 5 (Advanced), the user is expected to support and guide others in digital tasks.
129
What is the highest proficiency level (Level 8) titled and what does it entail?
'Highly Specialized'; the user contributes to professional practice and creates new knowledge through research and innovation.
130
What is the 2030 EU goal for ICT specialists?
To have 20 million ICT specialists in the population.
131
What cognitive domains are associated with Proficiency Levels 7 and 8?
The cognitive domain of 'Creating' which involves integrating knowledge and proposing new ideas to the field.
132
What is 'Markdown' (.md)?
A lightweight markup language with plain-text formatting syntax that is often used to format readme files or write content for the web.
133
What is an 'Animated GIF'?
A graphic file format that supports both static and animated images, using a limited palette of 256 colors, commonly used for short, looping clips.
134
Why is it dangerous to use the same password across multiple websites?
If one website suffers a data breach, hackers will use credential stuffing (automated tools testing the stolen email/password combination) to break into your accounts on other, more sensitive websites like banking or email.
135
What is a password manager?
A software application that generates, stores, and auto-fills complex, unique passwords for all your online accounts, secured behind one master password.
136
What is the '3-2-1 Backup Rule'?
Keep **3** copies of your data, on **2** different media types (e.g., SSD and Cloud), with **1** copy located off-site (in case of fire or theft).
137
What is 'Salami Slicing' in digital fraud?
A series of many very small, almost unnoticeable financial thefts from many different accounts that add up to a large sum over time.
138
What is 'Baiting' in social engineering?
A tactic where an attacker leaves a malware-infected physical device (like a USB stick) in a public place, hoping a curious victim will plug it into their computer.
139
What is 'Whaling' (or Whale Phishing)?
A highly targeted phishing attack aimed specifically at high-profile individuals like CEOs or senior executives to steal sensitive corporate data.
140
What is 'Credential Stuffing'?
A cyberattack where hackers use lists of compromised user credentials (emails/passwords) from one breach to automatically attempt to break into accounts on other websites.
141
What is 'Salt' in the context of password hashing?
Random data added to a password before it is hashed; it ensures that two users with the same password will have different hashes, making it harder for hackers to use 'Rainbow Tables'.
142
What is the difference between 'spyware' and 'keyloggers'?
Spyware log what you do. Keyloggers are a speciial type of spyware that logs everything you type.
143
What is a 'Keylogger'?
A type of surveillance software (malware) that has the capability to record every keystroke you make to a log file, usually to steal passwords.
144
What is 'Pharming'?
A cyberattack intended to redirect a website's traffic to another, fake site by poisoning the DNS cache, even if the user types the correct URL.
145
What is a 'Zero-Day Vulnerability'?
A software security flaw that is known to the software vendor but has no patch available, leaving it open to immediate exploitation by hackers.
146
What is 'Encryption at Rest' vs. 'Encryption in Transit'?
At Rest protects data stored on a disk/server; In Transit protects data as it moves across a network (like the internet).
147
What is 'Salting' a password?
Adding a unique, random string of characters to a password before hashing it, ensuring that even if two users have the same password, their hashes will look different in the database.
148
What is a 'Man-in-the-Middle' (MitM) attack?
A cyberattack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
149
What is 'Brute Force' vs. 'Dictionary' attack?
Brute Force tries every possible combination of characters; a Dictionary attack tries words from a pre-compiled list of common passwords.
150
What is 'Honey Pot' in cybersecurity?
A decoy system set up to attract and gather information on hackers, diverting them from the actual production network.
151
What are the 5 dimensions of digital competence defined in the DigiComp framework?
1. Competence Areas, 2. Competences, 3. Proficiency Levels, 4. Knowledge/Skills/Attitudes (KSA), and 5. Use Cases.
152
What is the primary advantage of the '.DOCX' format over the older '.DOC'?
DOCX is an open-standard XML-based format, making it more compatible with non-Microsoft programs and less likely to suffer from file corruption.
153
What is the primary new feature introduced in eIDAS 2.0 compared to 1.0?
Every member state must create a digital e-wallet that stores IDs, diplomas, and bank details, allowing for selective information passing.
154
What is the legal standing of an 'Electronic Signature' under eIDAS 1.0?
Qualified electronic signatures are legally recognized as equivalent to handwritten signatures across all EU Member States.
155
What is the difference between CC and BCC?
CC (Carbon Copy) shows all recipients' emails to everyone; BCC (Blind Carbon Copy) hides the recipient list from others.
156
What does it mean to 'Archive' an email instead of deleting it?
It removes the email from your Inbox but keeps it searchable in your 'All Mail' or archive folder for future reference.
157
What is an 'Email Signature' and why is it used?
A pre-defined block of text (contact info, logo) automatically added to the end of outgoing emails.
158
What is 'POP3' and why is it becoming less common than IMAP?
Post Office Protocol 3 downloads emails to a single device and usually deletes them from the server, making it difficult to sync mail across multiple devices.
159
What is 'DKIM' (DomainKeys Identified Mail)?
An email authentication method designed to detect email spoofing by allowing the receiver to check that an email was indeed authorized by the owner of that domain.
160
What is 'SPF' (Sender Policy Framework)?
A DNS-based email authentication mechanism that lists which mail servers are authorized to send email on behalf of a specific domain to prevent spoofing.
161
What is 'RSA' encryption?
An asymmetric algorithm that uses a pair of keys (public and private) to encrypt data; it is the foundation for secure data transmission over the internet.
162
What is 'PGP' (Pretty Good Privacy) used for?
An encryption program that provides cryptographic privacy and authentication for data communication, most commonly used for signing and encrypting emails.
163
What is a 'Hash Function' (e.g., SHA-256)?
A mathematical algorithm that maps data of any size to a fixed-size string of characters; it is a 'one-way' function (unique and irreversible) used to verify data integrity and store passwords safely as Hashes.
164
What is a JSON file commonly used for?
JavaScript Object Notation (JSON) is a lightweight data-interchange format that is easy for humans to read and write and easy for machines to parse, heavily used in APIs.
165
What does the .FLAC audio format offer compared to .MP3?
FLAC (Free Lossless Audio Codec) compresses audio without losing any quality (lossless), whereas MP3 uses lossy compression, permanently removing some audio data to reduce file size.
166
What is the difference between a 'Lossy' and 'Lossless' file format?
Lossy formats (like JPG or MP3) discard some data to achieve smaller file sizes, while Lossless formats (like PNG or FLAC) preserve all original data but result in larger files.
167
What is the 'PDF/A' format specifically used for?
It is an ISO-standardized version of the PDF specialized for the long-term archiving of electronic documents, ensuring they look exactly the same regardless of the software used.
168
What is a 'Vector' file format (like .SVG) and why is it used for logos?
It uses mathematical paths (lines and curves) rather than pixels, allowing the image to be scaled to any size without losing sharpness or becoming 'pixelated'.
169
What is a '.EXE' file and why should it be handled with caution?
An executable file on Windows that contains a program; it should be scanned for viruses because it can execute code that modifies system files.
170
What is the purpose of the '.TIFF' image format?
A high-quality, lossless image format used primarily in professional photography and printing because it preserves all image detail and supports layers.
171
What is a '.CSS' file?
A Cascading Style Sheet file, used to define the layout, colors, and fonts for a website, separating the design from the HTML content.
172
What is the '.ISO' file format?
An archive file that contains an identical copy (image) of data found on an optical disc, like a CD or DVD, used for distributing large software packages.
173
What is '.RAW' in digital photography?
A file format that contains minimally processed data from the image sensor, allowing for maximum control during post-processing compared to a compressed JPG.
174
What is the difference between '.AAC' and '.MP3'?
AAC (Advanced Audio Coding) generally achieves better sound quality than MP3 at the same bitrate and is the standard for YouTube and Apple devices.
175
What is a '.TAR' file (Tape Archive)?
A file format used to bundle multiple files into one single file, often used in Linux environments before being compressed with Gzip or Bzip2.
176
What is a '.PNG' file most commonly used for in web design?
Images that require a transparent background (alpha channel), which JPG cannot provide.
177
What is the difference between '.MP4' and '.MOV'?
MP4 is a universal standard used across almost all devices; MOV is a proprietary Apple format designed for QuickTime.
178
What is a '.ZIP' file?
A compressed archive format used to reduce the size of files and group multiple files together for easier sharing.
179
What is the difference between '.JPEG' and '.PNG'?
JPEG is better for photographs (smaller file size), while PNG supports transparency and is better for graphics and logos.
180
What is a '.zip' file and why is it useful for email?
It is a compressed folder that reduces file size and allows you to send multiple files as a single attachment.
181
What is the difference between 'Copy' and 'Cut'?
Copy creates a duplicate; Cut moves the original file or text to a new location, removing it from the old one.
182
What does 'File Extension' (e.g., .pdf, .jpg, .docx) tell the computer?
It tells the operating system which program should be used to open that specific type of file.
183
What happens when you 'Zip' a folder?
You compress the files within the folder, reducing their total file size so they take up less storage space and can be sent more easily via email or over the internet.
184
What is the difference between '.RAR' and '.ZIP'?
RAR is a proprietary format that often offers better compression and 'Recovery Volumes' (to fix damaged archives), while ZIP is an open standard compatible with almost all OSs without extra software.
185
What is a '.MKV' file and why is it called a 'Matroska' container?
It is a multimedia container format that can hold an unlimited number of video, audio, picture, or subtitle tracks in one file; it is named after Russian nesting dolls.
186
What is the 'Right to Erasure' (Right to be Forgotten)?
The right to demand the deletion of your personal data when it is no longer necessary for the purpose it was collected.
187
What are the eight competences for lifelong learning?
STEM, Languages, Literacy, Cultural Awareness and Expression, Entrepreneurship, Civic Competence, Personal Social and Learning to Learn, Digital Competence
188
What is digital competence?
The confident, critical use of and engagement with digital technologies for learning at work and participation in society
189
What is media literacy?
Skills, knowledge and understanding that allow citizens to use media effectively and safely. Is not limited to technical know-how but includes the critical assessment of media content. Thus, it refers to the ability to access, have a critical understanding of, and interact with both traditional and new forms of media and understand the role and functions of media in democratic societies, including, for example, distinguishing facts and opinions.
190
What are the EU's goals for the digital competence of its population?
80 % of population with basic digital skills and 20 Mio. ICT specialists by 2030
191
What are the 5 dimensions of digital competence?
Competence Areas, Competences, Proficiency Levels, Knowledge & Skills & Attitudes, Use Cases
192
What are the 5 competence areas?
Information and data Literacy, Communication and Collaboration, Digital Content Creation, Safety (transversal), Prolem solving (transversal)
193
What are the competences for 'Information and Data Literacy'?
Browsing, Searching and Filtering Data, Information and Digital Content; Evaluating D, I, DC and Managing D, I, DC
194
What are the competences for 'Communication and Collaboration'?
Interacting through Digital Technologies; Sharing through Digital Technologies; Engaging Citizenship through digital technologies; collaborating through digital technologies; Netiquette; managing digital identity
195
What are the competences for 'Digital Content Creation'?
Developing digital content; Integrating and re-elaborating digital content, Copyright and licenses, Programming
196
What are the competences for 'Safefty'?
Protecting devices; Protecting Personal Data and Privacy; Protecting Health and Wellbeing; Protecting the environment
197
What are the competences for 'Problem Solving'?
Solving technical problems; identifying needs and technological responses; Creatively using digital technologies; Identifying digital competence gaps
198
What is digital content?
Data which is produced and supplied in digital form (video, audio, apps, software, streams, computer files…).
199
What is AI?
Machine-based systems that can make predictions, recommendations or decisions based on a set of human-defined objectives. Appear to operate autonomously, can adapt behaviour by learning about context.
200
What is 'Digital Accessibility?'
Extent to which people from a population with the widest range of characteristics and capabilities can use digital products, systems, services and environments, which facilitates their achievement of a goal. Really is very wide: old and disable people but also small screens, lost glassed, in bright sun…
201
Explain the 8 Proficiency Levels
See sheet.
202
Under GDPR, what does the 'Right of rectification' mean?
The right to fix or correct errors in the personal data a company has on you.
203
What is the GDPR principle of 'Data minimisation'?
Only the absolute minimum data needed for a specific task should be collected.
204
What does 'GUI' stand for?
Graphical User Interface; the visual way a user interacts with a computer (using icons/menus instead of text commands).
205
What is 'URL' short for?
Uniform Resource Locator; it is the global address used to locate resources on the internet.
206
What is 'Megabit' (Mbps) vs 'Megabyte' (MB)?
Internet speed is usually measured in Megabits (small 'b'); file sizes are measured in Megabytes (big 'B'). 1 Megabyte = 8 Megabits.
207
What is 'Dark Mode' and why is it used?
A color scheme that uses light-colored text on a dark background; it reduces eye strain and saves battery on OLED screens.
208
What is 'Latency' in the context of a network connection?
The time it takes for a data packet to travel from its source to its destination and back; lower latency is essential for activities like video calls and online gaming.
209
What is the 'Ribbon' in Microsoft Office programs?
The wide band of command buttons and tabs located at the top of the window (Home, Insert, Layout, etc.) that houses all the tools needed to format and manage the document.
210
What are the two most common use cases for NFC in modern smartphones?
Contactless payments (like Apple Pay or Google Pay) and quickly pairing or connecting to other hardware like headphones or smart tags.
211
How is NFC used in public transportation systems?
It allows commuters to use their smartphones or smart cards as digital tickets by tapping them against a reader at turnstiles or on buses.
212
What is the 'Peer-to-Peer' mode in NFC?
A mode that allows two active devices (like two smartphones) to exchange information back and forth, such as sharing contact business cards or web links.
213
What is the 'HDMI' port used for?
To transmit high-definition video and audio from a computer/console to a monitor or TV.
214
What is the main difference between an HDD and an SSD?
HDDs use spinning magnetic disks (slower, cheaper); SSDs use flash memory (much faster, more durable).
215
Why should you 'Eject' a USB drive before physically removing it?
To ensure the computer has finished writing data to the drive, preventing file corruption.
216
What does 'VGA' stand for and is it digital or analog?
Video Graphics Array; it is an older analog connection for monitors.
217
What is the benefit of **Satellite Internet (e.g., Starlink)** compared to traditional Fiber?
It provides high-speed internet to remote or rural areas where physical cables cannot reach, though it often has higher latency than fiber.
218
What are the two biggest disadvantages of setting up a NAS compared to using an external USB drive?
1) High upfront cost (buying the enclosure and drives); 2) Higher complexity (requires network configuration and software setup).
219
In terms of performance, why might a professional video editor prefer a NAS or DAS over Cloud storage?
Local storage (NAS/DAS) offers much higher transfer speeds (up to 10Gbps) than standard internet connections, which is essential for editing large 4K or 8K video files.
220
What is 'Hybrid Storage' and why do many businesses use it?
A strategy using a NAS for fast local access and a Cloud service for off-site backup, combining local speed with disaster recovery protection.
221
What is a 'Hot Spare' in a RAID configuration?
An extra 'idle' drive already installed in the system that automatically takes over and starts rebuilding data the moment another drive in the RAID array fails.
222
What does the CPU do in a computer?
The Central Processing Unit is the 'brain' of the computer; it performs the basic arithmetic, logical, control, and input/output operations specified by the instructions in the programs.
223
What is the purpose of a GPU?
A Graphics Processing Unit is a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images, crucial for gaming, video editing, and rendering.
224
What is a 'Peripheral' device?
Any external device that provides input or output for the computer, such as a keyboard, mouse, monitor, or printer.
225
What is 'MAC Address Filtering' in router settings?
A security feature that allows only specific, pre-approved hardware addresses (MAC addresses) to connect to the network.
226
Can a MAC address be changed (spoofed)?
Yes, while the physical address is 'burned' into the hardware, software can 'mask' or 'spoof' it to appear as a different address to the network.
227
What is the physical difference between a 'Dynamic' and 'Condenser' microphone?
Dynamic mics are rugged and good for loud sounds (no power needed); Condenser mics are more sensitive for studio work and usually require 'Phantom Power'.
228
What is a 'Motherboard' (or Mainboard)?
The central printed circuit board in a computer that allows communication between the CPU, RAM, and all other hardware components.
229
What is the role of 'RAM' (Random Access Memory)?
It acts as the computer's short-term memory, storing the data and programs that are currently in use for fast access by the CPU.
230
What is the difference between an 'Input Device' and an 'Output Device'?
An input device (keyboard, mouse) sends data to the computer; an output device (monitor, printer) receives data from the computer to display or perform an action.
231
What is 'Throttling' in a CPU or GPU?
A safety mechanism where the processor slows down its clock speed to reduce heat when it reaches a high temperature, preventing hardware damage but reducing performance.
232
What is 'Overclocking'?
The process of forcing a computer component (like a CPU) to run at a higher clock speed than it was designed for to increase performance, at the risk of overheating and instability.
233
What is a 'Solid State Drive' (SSD) 'Wear Leveling'?
A technique used by SSD controllers to distribute write operations evenly across all memory cells to prevent any single cell from failing prematurely due to excessive use.
234
What is 'Thermal Paste' and why is it used?
A substance applied between the CPU and its heatsink to fill microscopic air gaps, ensuring efficient heat transfer to prevent the processor from overheating.
235
What is the 'PSU' (Power Supply Unit)?
The component that converts high-voltage AC power from the wall outlet into low-voltage DC power for all the internal components of the computer.
236
What is 'VRAM' (Video RAM)?
Specialized memory located on a graphics card that stores the image data and textures being displayed on the screen.
237
What is 'BIOS' (Basic Input/Output System) and where is it stored?
The first software that runs when a computer starts; it is stored on a small memory chip (CMOS) on the motherboard.
238
What is 'Thermal Throttling' and why does it happen?
The reduction of a component's clock speed when it gets too hot to prevent physical damage to the hardware.
239
What is the difference between 'Integrated Graphics' and a 'Dedicated Graphics Card'?
Integrated graphics are built into the CPU and share system RAM; a dedicated card has its own processor (GPU) and high-speed memory (VRAM) for better performance.
240
What is the 'Northbridge' and 'Southbridge' on older motherboards?
The Northbridge handled high-speed tasks (CPU/RAM communication), while the Southbridge handled slower tasks (USB, storage, BIOS). In modern CPUs, these functions are largely integrated.
241
What is a 'SoC' (System on a Chip)?
An integrated circuit that integrates all components of a computer or other electronic system into a single chip (common in smartphones and Apple M-series chips).
242
What is the 'CMOS Battery' on a motherboard?
A small coin-cell battery that powers the CMOS chip, allowing it to keep the system time and BIOS settings even when the computer is unplugged.
243
What is 'VRAM' and why is it important for 4K gaming?
Video RAM; it stores the textures and frame buffer for the display. 4K resolutions require much more VRAM because the image files (textures) are significantly larger.
244
What is the difference between USB Type-A and USB Type-C?
USB-A is the traditional, rectangular, one-way connector. USB-C is smaller, reversible (can be plugged in either way), and supports much higher data transfer and power delivery rates.
245
What does IEEE 802.11 refer to?
It is the set of technical standards that define communication for wireless local area networks (WLANs), commonly known to consumers as Wi-Fi.
246
What is 'HDMI' and what signals does it carry?
High-Definition Multimedia Interface; it is a single cable that carries both uncompressed digital video and multi-channel digital audio signals.
247
What is 'Bluetooth Low Energy' (BLE)?
A wireless technology designed for short-range communication that consumes very little power, ideal for wearable devices like smartwatches and fitness trackers.
248
What is 'DisplayPort' and how does it compare to HDMI?
Both carry high-def video/audio, but DisplayPort is more common in PC environments as it supports higher refresh rates and 'daisy-chaining' multiple monitors (i.e., connecting them to each other instead of all to the device).
249
What does 'USB-C Power Delivery' (USB-PD) allow?
It is a specification that allows for high-speed charging (up to 240W) over a USB-C cable, allowing it to power laptops, not just small phones.
250
What is 'NVMe' and how does it differ from 'SATA' for SSDs?
NVMe is a communication protocol designed specifically for flash memory to use the high-speed PCIe bus, offering much higher speeds than the older SATA protocol used for mechanical disks.
251
What is 'ECC RAM'?
Error Correction Code RAM; a type of memory that can detect and fix common kinds of internal data corruption, used primarily in servers and workstations for stability.
252
What is 'Thunderbolt 4' and how does it relate to USB-C?
A high-speed hardware interface that uses the USB-C connector but offers guaranteed minimum data transfer speeds (40Gbps) and supports dual 4K monitors.
253
What is the 'Form Factor' of a computer component (e.g., ATX, ITX)?
The physical size and shape of a piece of hardware, such as a motherboard or power supply, which determines if it will fit into a specific computer case.
254
What is 'VGA' and why is it considered obsolete?
Video Graphics Array; it is an older analog connection that cannot carry audio and lacks the clarity/resolution of digital standards like HDMI.
255
What is 'USB-C'?
A versatile, reversible connector standard used for data transfer, charging, and video output across many modern devices.
256
What is the 'HEIC' format and why did Apple adopt it over JPG?
High Efficiency Image Container; it uses advanced compression to provide the same image quality as a JPG but at roughly half the file size.
257
When should you use a '.PNG' file instead of a '.JPG'?
Use PNG when you need transparency (no background) or when you have images with text/sharp lines that would become blurry with JPG compression.
258
What is the universal keyboard shortcut to 'Undo' the last action?
Ctrl + Z (Windows/Linux) or Command + Z (Mac).
259
Which shortcut allows you to quickly search for a specific word on a webpage or in a document?
Ctrl + F (Windows/Linux) or Command + F (Mac).
260
What is the shortcut to 'Select All' text or files in a folder?
Ctrl + A (Windows/Linux) or Command + A (Mac).
261
How do you quickly reopen the last closed tab in a web browser?
Ctrl + Shift + T (Windows/Linux) or Command + Shift + T (Mac).
262
Which key combination allows you to switch between open applications?
Alt + Tab (Windows/Linux) or Command + Tab (Mac).
263
What is the shortcut to permanently delete a file (bypassing the Recycle Bin) in Windows?
Shift + Delete.
264
What is the shortcut to 'Lock' your computer screen instantly?
Windows Key + L (Windows) or Control + Command + Q (Mac).
265
Which shortcut opens the Task Manager (Windows) to force-quit unresponsive apps?
Ctrl + Shift + Esc.
266
What is the shortcut to create a new folder in Windows File Explorer?
Ctrl + Shift + N.
267
How do you take a partial screenshot (selective area) on a Mac?
Command + Shift + 4.
268
In MS Word what is the keyboard shortcut to insert a 'Page Break'?
Ctrl + Enter
269
What does the shortcut 'Ctrl + K' do in both Word and Outlook?
It opens the dialog box to insert a hyperlink.
270
If you undo an action by mistake, what is the shortcut to 'Redo' it?
Ctrl + Y
271
What are the shortcuts for Bold, Italic, and Underline formatting?
Ctrl + B (Bold), Ctrl + I (Italic), and Ctrl + U (Underline)
272
What does 'Ctrl + F' open in MS Word?
The Navigation pane to Find text within the document.
273
Which shortcut opens the 'Find and Replace' dialog box in Word?
Ctrl + H
274
What is the function of the 'Shift + F3' shortcut in MS Word?
It cycles through text capitalization (lowercase, UPPERCASE, and Capitalize Each Word).
275
Which shortcut aligns text to the Left, Center, Right, and Justified in Word?
Ctrl + L (Left), Ctrl + E (Center), Ctrl + R (Right), and Ctrl + J (Justified).
276
What is the shortcut to initiate a 'Spell and Grammar Check' in Word or Outlook?
F7
277
What is the keyboard shortcut to create a New Email in Outlook?
Ctrl + N
278
What is the shortcut to 'Reply' to an email in Outlook?
Ctrl + R
279
Which shortcut allows you to 'Reply All' to an email?
Ctrl + Shift + R
280
What is the shortcut to 'Forward' an email in Outlook?
Ctrl + F
281
Once an email is written what is the shortcut to 'Send' it?
Ctrl + Enter
282
Which key forces Outlook to perform a 'Send/Receive' to manually check for new emails?
F9
283
How can you quickly switch between the Mail view and the Calendar view in Outlook using shortcuts?
Ctrl + 1 (Mail) and Ctrl + 2 (Calendar).
284
What is the shortcut to create a 'New Appointment' when you are in the Outlook Calendar?
Ctrl + Shift + A
285
What is 'Airplane Mode' and what does it turn off?
It is a setting that disables all wireless transmission functions of the device, including cellular, Wi-Fi, and Bluetooth.
286
What is 'Tethering' or a 'Personal Hotspot'?
Using a smartphone's cellular data connection to provide internet access to other devices (like a laptop) via Wi-Fi or USB.
287
What is 'Roaming'?
Using your mobile device on a network other than your 'home' network, often occurring when traveling abroad.
288
What is a 'VPN' (Virtual Private Network) and how does it protect a user on public Wi-Fi?
A VPN creates an encrypted 'tunnel' for your data, hiding your IP address and protecting your traffic from being intercepted by others on the same network.
289
What is the difference between 'Symmetric' and 'Asymmetric' encryption?
Symmetric uses one key for both encryption and decryption; Asymmetric uses a public key to encrypt and a private key to decrypt.
290
What is a 'Proxy Server'?
An intermediate server that sits between a user's device and the internet, often used to bypass regional blocks or provide an extra layer of anonymity.
291
What is 'Latency' (or Ping) and why is it critical for gaming but less so for email?
Latency is the delay in data transmission. In gaming, high latency causes 'lag' in actions; in email, a 1-second delay is not noticeable to the user.
292
What is the difference between a 'Modem' and a 'Router'?
A modem connects your home to the ISP's network; a router distributes that connection to all the different devices in your home.
293
What is 'Port Forwarding'?
A router setting that directs external internet traffic to a specific device on your local network (e.g., to host a web server or a game).
294
What is 'Bandwidth'?
The maximum rate of data transfer across a given path, usually measured in bits per second (e.g., Mbps or Gbps).
295
What is a 'Default Gateway'?
The IP address of the router that a device uses to send information to other networks or the internet.
296
What is a 'Static IP Address'?
An IP address that is manually assigned to a device and does not change, typically used for servers or printers.
297
What is a 'LAN' (Local Area Network)?
A network that connects computers and devices in a limited geographical area, such as a home, school, or office building.
298
What is a 'SSID'?
Service Set Identifier; it is the technical name for a Wi-Fi network that you see when searching for available connections.
299
What is a 'Subnet Mask'?
A 32-bit number used to distinguish between the network portion (which network) and the host portion (which device) of an IP address.
300
What is 'QoS' (Quality of Service) in a router?
A feature that allows you to prioritize certain types of traffic (like video calls or gaming) over others (like background downloads) to ensure a smooth experience.
301
What is 'Power over Ethernet' (PoE)?
A technology that lets network cables carry electrical power to devices (like IP cameras or Wi-Fi access points), eliminating the need for a separate power brick.
302
What is a 'Mesh Network' in a home Wi-Fi setup?
A system where multiple routers (nodes) work together to create a single, seamless Wi-Fi network that covers a large area without signal 'dead zones.'
303
What is the purpose of the DHCP protocol?
Dynamic Host Configuration Protocol automatically assigns IP addresses and other network configuration parameters to devices on a network.
304
What is the primary difference between IPv4 and IPv6?
IPv4 uses 32-bit addresses (allowing for about 4.3 billion addresses), while IPv6 uses 128-bit addresses, providing a virtually unlimited number of unique IP addresses to accommodate the growing Internet of Things.
305
What is the difference between HTTP and HTTPS status codes 404 and 500?
A 404 error means the requested page could not be found (Client error), while a 500 error indicates a generic problem on the website's server (Server error).
306
What is the role of the 'TLS' (Transport Layer Security) protocol in web browsing?
It provides the encryption, data integrity, and authentication for HTTPS connections, ensuring that data sent between the browser and server cannot be intercepted or tampered with.
307
What is 'Latency' and how is it measured?
Latency is the time delay between a user's action and the response from the system (the 'lag'). It is typically measured in milliseconds (ms) using the 'ping' command.
308
What is the function of the SMTP protocol?
Simple Mail Transfer Protocol (SMTP) is the standard protocol used specifically for *sending* emails from a client to a server.
309
What is 'FTP' and what has largely replaced it for secure file transfers?
File Transfer Protocol (FTP) is used to move files between computers; it has largely been replaced by SFTP (Secure FTP) which encrypts the connection.
310
What is a 'MAC Address' and how does it differ from an IP address?
A MAC address is a permanent, unique physical identifier assigned to a network interface card by the manufacturer; an IP address is a logical address assigned by the network.
311
What is 'ICMP' (Internet Control Message Protocol)?
A protocol used by network devices (like routers) to send error messages and operational information (e.g., used by the 'ping' command).
312
What is 'DNS' (Domain Name System) often compared to in the physical world?
A phonebook; it translates human-friendly URLs (like www.example.com) into the numerical IP addresses that computers use to find each other.
313
What is 'SSH' (Secure Shell) used for?
A cryptographic network protocol for operating network services securely over an unsecured network, typically used for remote login to servers or remote maintenance.
314
What is 'NTP' (Network Time Protocol)?
A protocol used to synchronize the clocks of computers over a network to ensure all systems have the exact same time for logging and security purposes.
315
What is 'BGP' (Border Gateway Protocol)?
The protocol responsible for making the internet work by exchanging routing information between different networks (Autonomous Systems) across the globe.
316
What is the difference between 'Unicast' and 'Multicast' transmission?
Unicast sends data to one specific recipient; Multicast sends data to a group of interested recipients simultaneously (efficient for video streaming).
317
What is 'UDP' (User Datagram Protocol) and how does it differ from 'TCP'?
UDP is a 'connectionless' protocol that is faster because it doesn't check if data arrived (no handshake); it is used for live streaming and gaming where speed is more important than perfect accuracy.
318
What is the purpose of an 'MX Record' in DNS settings?
A Mail Exchanger (MX) record specifies the mail server responsible for accepting email messages on behalf of a domain name.
319
What is a 'Subnet' and why is it used?
A logical subdivision of an IP network; it is used to improve network performance and security by keeping local traffic within a specific department or area.
320
What is 'FTP' used for?
File Transfer Protocol; a standard way to move files between a local computer and a remote server.
321
What is the best way to check if a link in an email is safe before clicking?
Hover your mouse over the link (without clicking) to see the actual destination URL in the bottom corner of your screen.
322
What is the difference between RAM and a Hard Drive/SSD?
RAM (Random Access Memory) is short-term, volatile memory used by the computer to hold data actively being processed. A Hard Drive/SSD is long-term, non-volatile storage that retains data even when power is off.
323
What does the Task Manager (Windows) or Activity Monitor (Mac) do?
It provides information about the computer's performance and running software, allowing users to force-quit frozen applications and see which programs are consuming the most CPU or RAM.
324
What is the 'Kernel' of an operating system?
The core part of the OS that manages the system's resources and the communication between hardware and software; it is the first program loaded on startup.
325
What is a 'System Driver'?
A specialized piece of software that tells the operating system how to communicate with a specific piece of hardware (e.g., a printer, graphics card, or network adapter).
326
What is 'Virtual Memory' (or a Page File)?
A feature of an OS that uses a portion of the hard drive/SSD as 'extra' RAM when the physical RAM is full, though it is much slower than physical RAM.
327
What is the difference between 'Sleep' and 'Hibernate' modes?
Sleep keeps the computer in a low-power state and keeps data in RAM for a fast wake-up; Hibernate saves open documents and programs to the hard drive and turns the power off.
328
What is 'NTFS' vs. 'FAT32' file systems?
NTFS is the modern Windows file system supporting large files and security permissions; FAT32 is an older system with a 4GB file size limit but high compatibility with other devices (like car stereos).
329
What is the 'BIOS' or 'UEFI'?
The firmware that initializes your computer's hardware during the booting process and provides runtime services for operating systems and programs.
330
What is a 'Registry' in Windows?
A hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry.
331
What is a 'File System' (e.g., NTFS, APFS, EXT4)?
The method and data structure that an operating system uses to control how data is stored and retrieved on a disk.
332
What is 'Virtualization' (e.g., VirtualBox, VMware)?
The act of creating a virtual version of something, such as an operating system, allowing multiple OSs to run on a single physical machine at the same time.
333
What is the 'Command Line Interface' (CLI) vs. 'Graphical User Interface' (GUI)?
CLI involves typing text commands to interact with the OS; GUI uses visual elements like icons, windows, and a mouse pointer.
334
What is a 'Kernel Panic' (Linux/Mac) equivalent to in Windows?
The Blue Screen of Death (BSOD); it is a safety measure taken by the OS kernel upon detecting a fatal error from which it cannot safely recover.
335
What is the 'PATH' environment variable?
A list of directories that the OS searches through to find executable programs when you type a command in the CLI.
336
What is 'Disk Defragmentation' and is it necessary for SSDs?
The process of reorganizing files so they occupy contiguous sectors on a drive. It is necessary for HDDs but **not** for SSDs (and can actually shorten an SSD's life).
337
What is the 'Root' user in Linux/MacOS?
The superuser account that has full administrative access to all files and commands in the operating system.
338
What is 'Swap Space'?
A portion of the hard drive/SSD used as 'overflow' for the RAM; if the RAM is full, the OS moves inactive data to the swap space to prevent a crash.
339
What is 'Incognito Mode' (or Private Browsing) and what is its biggest limitation?
It prevents the browser from saving history, cookies, and form data locally; however, it does *not* hide your activity from your ISP, employer, or the websites you visit.
340
What is 'Tracking Protection' in a browser?
A feature that blocks known tracking scripts from loading, preventing advertisers from following you as you move between different websites.
341
What is 'Data Scrubbing'?
The process of removing personal or sensitive information from a dataset so that the individuals cannot be identified, often used before sharing data for research.
342
What is 'Telemetry' in software?
The automatic collection and transmission of data from remote sources (like your OS or apps) back to the developer to track usage and bugs.
343
What is 'Data Sovereignty'?
The concept that data is subject to the laws and governance structures within the nation it is collected or stored.
344
What is 'Anonymization' of data?
The process of removing personally identifiable information from data sets so that the people whom the data describe remain anonymous.
345
What is the 'Principle of Least Privilege'?
A security concept where a user is given the minimum levels of access—or permissions—needed to perform their job functions and nothing more.
346
What is 'PII' (Personally Identifiable Information)?
Any data that could potentially identify a specific individual (e.g., Social Security Number, Email address, Fingerprints).
347
What is the GDPR 'Right to Portability'?
The right to move your personal data (e.g., your music playlists or banking history) from one service provider to another in a machine-readable format.
348
What is 'Data Minimization'?
The principle that organizations should only collect the personal data they absolutely need to complete a specific task and nothing more.
349
What is a 'Dark Pattern' in web design?
A user interface designed to trick users into doing things they didn't intend to, like signing up for a recurring subscription.
350
What is 'Data Portability'?
The ability to move your data (like your music history) from one service provider to another in a machine-readable format.
351
What is a 'First-party Cookie' vs. a 'Third-party Cookie'?
First-party cookies are set by the website you are visiting (e.g., to remember your cart). Third-party cookies are set by other sites (e.g., advertisers) to track you across different websites.
352
What does 'Do Not Track' (DNT) in a browser actually do?
It is a browser setting that sends a request to websites to stop tracking the user, but it is not legally binding and many websites choose to ignore the request.
353
What is 'Optical Character Recognition' (OCR)?
Technology that converts different types of documents, such as scanned paper documents or PDF files, into editable and searchable data.
354
What is the difference between 'Absolute' and 'Relative' cell references in Excel (e.g., $A$1 vs A1)?
A relative reference changes when you copy a formula to a new cell; an absolute reference (with dollar signs) stays fixed on the specific cell.
355
What is a 'Template' in office software?
A pre-formatted document that provides a structure for frequently used items like invoices, resumes, or presentations, saving time on layout and design.
356
What is 'VLOOKUP' in Excel used for?
To look up a value in one column and return a corresponding value from another column in the same row.
357
What is the correct way to find your IP address in Windows via the command prompt?
Open the 'Command Prompt' and enter the 'ipconfig' command.
358
Does blocking a SIM card prevent access to the local content (photos/apps) of a mobile phone?
No, content can still be accessed even if the SIM card is blocked.
359
What is the difference between IMAP and POP email protocols?
IMAP leaves messages on the server so they can be synced across devices; POP typically downloads and removes them from the server.
360
What is a CSV file primarily known for?
It is a text-based file that uses 'separators' (like commas) to organize data.
361
What is a 'Brute Force' attack?
A trial-and-error method used to guess passwords or encryption keys by trying every possible combination of characters.
362
Are phone calls and texts end-to-end encrypted?
No; mobile network operators can read messages.
363
What is 'End-to-End Encryption' (E2EE)?
A system of communication where only the communicating users can read the messages; service providers (like WhatsApp) cannot see the content.
364
What is 'Social Engineering'?
The psychological manipulation of people into performing actions or divulging confidential information.
365
What is 'Encryption'?
The process of converting information into a secret code that hides the information's true meaning, accessible only with a key.
366
What is the difference between WPA2 and WEP?
Both are Wi-Fi security protocols, but WEP (Wired Equivalent Privacy) is outdated and highly vulnerable to hacking, while WPA2 (WiFi Protected Access, and the newer WPA3) uses strong AES encryption and is the modern standard for securing wireless networks.
367
What is the purpose of a 'Digital Signature'?
It uses cryptography to provide 'non-repudiation,' proving that a document was created by a specific sender and has not been altered since it was signed.
368
What is 'AES' (Advanced Encryption Standard)?
A symmetric block cipher chosen by the U.S. government to protect classified information; it is the worldwide standard for encrypting data on hard drives and over Wi-Fi (WPA2).
369
What is a 'TLS Handshake'?
The process by which a client and server establish a secure connection using TLS, where they agree on encryption algorithms and exchange keys.
370
What is 'OWASP' and why is their 'Top 10' list important?
The Open Web Application Security Project; their Top 10 list identifies the most critical security risks to web applications, helping developers secure their software.
371
What is 'WPA3' and how is it an improvement over WPA2?
The latest Wi-Fi security standard; it provides better protection against 'Brute Force' password guessing and improved encryption for public networks.
372
What is 'TLS' and how does it relate to SSL?
Transport Layer Security; it is the modern, more secure successor to SSL (Secure Sockets Layer) for encrypting internet traffic.
373
What is 'WPA2' or 'WPA3'?
WiFi Protected Area, Security protocols used to encrypt and protect Wi-Fi networks from unauthorized access.
374
What is 'Open Source' software (OSS) and why is it considered secure?
Software with publicly available code; it is considered secure because many developers worldwide can inspect it for bugs and backdoors.
375
What is a 'Driver' and what happens if it is outdated?
A small piece of software that tells the OS how to talk to a hardware device; if outdated, the hardware may crash or perform poorly.
376
What is 'Open Source' software?
Software whose source code is available for anyone to inspect, modify, and distribute (e.g., Linux, LibreOffice).
377
What is a 'Software Patch'?
A small piece of code released by developers to fix a specific bug or security vulnerability in an existing program.
378
What is 'Agile' methodology?
An iterative approach to software development that focuses on continuous delivery, feedback, and flexibility rather than a rigid, linear plan.
379
What is 'Open Source' software and name two common licenses.
Software whose source code is made available for anyone to see and modify; common licenses include MIT and GPL (General Public License).
380
What is 'Firmware'?
A specific class of computer software that provides the low-level control for a device's specific hardware (e.g., the software inside a digital camera or a microwave).
381
What is the difference between 'Undo' (Ctrl+Z) and 'Redo' (Ctrl+Y)?
Undo reverses the last action taken; Redo restores the action that was just undone.
382
What is 'Portability' in software development?
The ability of a piece of software to run on different operating systems or hardware architectures with minimal or no changes.
383
What is an 'API Key' and why must it be kept secret?
A unique identifier used to authenticate a user or program to an API; if stolen, an attacker can use your account's resources or access your private data.
384
What is an 'End-User License Agreement' (EULA)?
A legal contract between a software developer and the user, specifying the rules for using the software and the developer's lack of liability.
385
What is the difference between 'Freeware' and 'Shareware'?
Freeware is free to use forever; Shareware is free for a trial period, after which the user is expected to pay to keep using it or unlock features.
386
What is the difference between a relative cell reference (A1) and an absolute cell reference ($A$1)?
Relative references change when copied to other cells; absolute references stay fixed on the specific cell.
387
What is 'Display Resolution' (e.g., 1920x1080)?
The number of distinct pixels in each dimension that can be displayed on a screen; higher numbers mean more detail.
388
What is 'Airplane Mode' and when should you use it?
It disables all wireless signals (Wi-Fi, Bluetooth, Cellular); used to save battery or follow airline safety rules.
389
If your Wi-Fi is connected but you have no internet, what is the 'classic' first fix?
Unplug your router/modem, wait 30 seconds, and plug it back in (Power Cycle).
390
What should you do if your laptop keyboard becomes unresponsive?
Check for a physical 'Fn' lock key, restart the system, or check the 'Device Manager' for driver issues.
391
What is a 'hard reset' on a mobile device?
A hardware-level reboot that forces the device to restart by cutting the power flow from the battery, used when the screen or software is completely frozen and unresponsive to standard touch commands.
392
If an application crashes immediately upon opening on a smartphone, what is the first software-level troubleshooting step?
Force stop the app, clear the app's cache in the settings menu, and check for updates in the app store.
393
What does the 'tracert' (Trace Route) command show you?
It displays the path (the 'hops') that a packet of data takes to reach its destination across the internet, helping identify where a connection is slowing down or failing.
394
If a Wi-Fi signal is strong but there is 'No Internet,' what is the most likely cause?
The local connection between the device and the router is working, but the router itself has lost its connection to the Internet Service Provider (ISP).
395
What does it mean when a computer 'BSODs' (Blue Screen of Death)?
A critical system error in Windows where the OS can no longer operate safely and must restart, usually caused by hardware failure or a faulty driver.
396
If a website is 'down,' how can you tell if the problem is your internet or the website itself?
By using a service like 'DownDetector' or trying to access a different, major website (like Google or BBC) to see if it loads.
397
What is a 'Memory Leak' in software?
A failure in a program to release discarded memory, causing the program to consume more and more RAM over time until the system slows down or crashes.
398
If a laptop is plugged in but the battery is not charging, what are three potential points of failure?
The power adapter/brick, the charging cable, or the internal battery itself.
399
What is 'Ping' and what does 'Request Timed Out' mean?
Ping tests the connection between two devices. A 'Timed Out' error means the destination device did not respond within the expected time frame (either it's down or a firewall is blocking the request).
400
What is a 'Cold Swap' vs. a 'Hot Swap'?
Cold swapping requires turning off the computer to replace a component (like RAM). Hot swapping allows replacing a component while the system is running (like a USB drive or some server hard drives).
401
If a laptop's fan is running constantly and loudly, what are two likely causes?
1. High CPU usage from a background program. 2. Dust buildup in the vents or on the heatsink causing poor cooling.
402
If a computer 'POSTs' but then shows 'No Boot Device Found,' what are the two most likely hardware issues?
1. The hard drive/SSD is disconnected or has failed. 2. The boot order in the BIOS/UEFI is set incorrectly.
403
What is a 'Packet Sniffer' (e.g., Wireshark)?
A tool that captures and analyzes data traffic on a network, used by IT professionals to troubleshoot connection issues or security breaches.
404
What is 'DLL Hell' in Windows?
A situation where multiple applications conflict because they require different versions of the same Dynamic Link Library (.dll) file to run.
405
If you cannot open a file with a '.7z' extension, what is likely the problem?
You lack the specific compression software (like 7-Zip) needed to extract that specific archive format.
406
What is a 'System Restore Point' in Windows?
A saved 'snapshot' of your computer's system files and registry that you can return to if a software installation or update causes issues.
407
Why should you avoid using public charging stations (USB ports) in airports?
Because of 'Juice Jacking,' where attackers modify the USB port to install malware or steal data from your device while it charges.
408
If a computer is running very slowly, what is the first thing to check in 'Task Manager'?
Check which programs are consuming the highest percentage of CPU and RAM resources.
409
What does 'Power Cycling' a device mean?
Turning a device completely off (and often unplugging it) for a short period before turning it back on to clear its memory.
410
What is a 'Codec' (e.g., H.264 or AV1)?
A device or program that compresses (encodes) a large video file for storage/streaming and decompresses (decodes) it for playback.
411
What does 'Ctrl + R' (or F5) do in a web browser?
It refreshes or reloads the current page.
412
What is the benefit of using 'Incognito' or 'Private' mode?
It prevents the browser from saving your history, cookies, and form data for that specific session.
413
What is 'Websocket' and how does it differ from standard HTTP?
Standard HTTP is a 'request-response' system, while Websockets allow for a persistent, two-way connection, enabling real-time features like live chat and stock tickers.
414
What is 'VoIP' (Voice over IP)?
A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (analog) phone line (e.g., WhatsApp calls, Zoom).
415
What is the purpose of the 'robots.txt' file on a website?
It is a text file that tells search engine crawlers which pages or sections of a site they should or should not index or visit.
416
What is a 'Favicon'?
A small icon associated with a particular website, typically displayed in the browser tab or bookmark list.
417
What is the role of 'HTML5' in modern web browsing?
It is the latest version of HTML that allows for the embedding of video, audio, and interactive graphics directly into a webpage without needing external plugins like Flash.
418
What is 'XML' (Extensible Markup Language)?
A markup language designed to store and transport data in a format that is both human-readable and machine-readable, focusing on what the data *is* rather than how it looks.
419
What is 'ARIA' (Accessible Rich Internet Applications) in web development?
A set of attributes added to HTML to make web content and applications more accessible to people with disabilities, specifically those using screen readers.
420
What is the purpose of the 'ALT' attribute in an image tag?
It provides a text description of an image, which is read by screen readers for visually impaired users or displayed if the image fails to load.
421
What is 'WebAssembly' (Wasm)?
A binary instruction format that allows high-performance code (like C++ or Rust) to run in web browsers at near-native speed, complementing JavaScript.
422
What is the 'DOM' (Document Object Model)?
A programming interface for web documents; it represents the page so that programs (like JavaScript) can change the document structure, style, and content.
423
What is 'SVG' and why is it considered accessible?
Scalable Vector Graphics; because it is XML-based text, the content inside an SVG (like text labels) can be read by screen readers and indexed by search engines.
424
What is the difference between a '301 Redirect' and a '302 Redirect'?
A 301 is a 'Permanent' move (telling search engines the URL has changed forever); a 302 is 'Found' or 'Temporary' (telling search engines the page will return to the original URL).
425
What is 'CMS' (Content Management System)?
A software application used to create and manage digital content (e.g., WordPress, Joomla, Drupal), allowing users to build websites without writing code from scratch.
426
What is the 'Head' section of an HTML document used for?
It contains meta-information about the document (like the title, character set, and links to CSS) that is not displayed directly on the webpage.
427
What is 'RSS' (Really Simple Syndication)?
A web feed that allows users and applications to access updates to websites in a standardized, computer-readable format.
428
What is 'HTTPS'?
Hypertext Transfer Protocol Secure; it ensures that the communication between your browser and the website is encrypted.
429
What is 'HTML'?
HyperText Markup Language; the standard language used to create the structure and content of webpages.
430
What is 'NFC' (Near Field Communication) and what is its typical range?
A short-range wireless technology (usually less than 4cm) used for contactless payments and quick pairing of devices.
431
What is the range and primary use of 'Zigbee'?
A low-power, low-data rate wireless network standard used primarily for home automation (IoT) devices like smart lightbulbs and sensors.
432
What is the difference between Wi-Fi 2.4GHz and 5GHz bands?
2.4GHz has a longer range and better wall penetration but lower speeds; 5GHz offers much higher speeds but has a shorter range and is easily blocked by walls.
433
What is 'Li-Fi'?
A wireless communication technology that uses light (LEDs) to transmit data at high speeds, rather than radio waves like Wi-Fi.
434
What is the difference between a 'Page Break' and just hitting Enter many times?
A Page Break starts a new page regardless of text changes, keeping your document layout stable.
435
What is 'Track Changes' used for in professional documents?
It records every edit made to a document, allowing others to see, accept, or reject specific changes.
436
Which free and open-source office suite is a popular alternative to Microsoft Office for desktop use?
LibreOffice (which includes Writer, Calc, and Impress).
437
What is a widely used free, open-source alternative to Adobe Photoshop for advanced image editing?
GIMP (GNU Image Manipulation Program).
438
If a user needs to create vector graphics similar to Adobe Illustrator without a subscription, which free tool is a standard choice?
Inkscape.
439
Which professional-grade video editing software offers a robust free version as an alternative to Adobe Premiere Pro?
DaVinci Resolve.
440
What is a common open-source alternative to the Microsoft Outlook email client?
Mozilla Thunderbird.
441
Instead of the Windows operating system, what is the most prominent free and open-source alternative used globally?
Linux (with popular distributions like Ubuntu or Linux Mint).
442
Which free, open-source desktop publishing software serves as an alternative to Adobe InDesign for page layout?
Scribus.
443
What is a free, open-source alternative to file compression tools like WinRAR or WinZip?
7-Zip.
444
For 3D modeling and computer-aided design, which free software is a common alternative to AutoCAD?
FreeCAD.
445
Which free web-based tool is often used as an alternative to Microsoft Excel for collaborative data management?
Google Sheets.
446
What is an open-source, privacy-respecting alternative to video conferencing tools like Zoom or Microsoft Teams?
Jitsi Meet.
447
Which free software is used for statistical analysis as an alternative to the expensive IBM SPSS?
PSPP, R.
448
Which free tool can be used to edit PDF text and layout, serving as an alternative to Adobe Acrobat Pro?
LibreOffice Draw (or online tools like PDF24).
449
What is a free, open-source alternative to MATLAB for numerical computation and programming?
GNU Octave.
450
Which privacy-focused browser is a popular alternative to Google Chrome or Microsoft Edge?
Firefox (or Brave).
451
What is the primary function of Digital Rights Management (DRM) in digital media?
DRM is a set of technologies used to control how digital content is accessed, used, and distributed after purchase, often by enforcing specific usage policies.
452
How does DRM typically limit the use of a movie or e-book across multiple devices?
It uses licensing mechanisms to "lock" the content to a specific user account or a set number of authorized devices, preventing it from being played or read elsewhere.
453
What is a Technical Protection Measure (TPM) in the context of digital documents?
A TPM, often called a "digital lock," is a technical method (like encryption or password protection) designed to prevent unauthorized access or copying of copyrighted material.
454
What is Geo-blocking and how does it determine a user's eligibility to access content?
Geo-blocking is a technology that restricts access to internet content based on a user's physical location, usually by identifying their IP address.
455
Give an example of a TPM that controls access versus one that controls copying.
A password is an access control TPM (preventing someone from opening a file), while a "print-disabled" setting on a PDF is a copy control TPM.
456
Why do streaming platforms like Netflix or YouTube use geo-blocking?
To comply with regional licensing agreements where the right to broadcast a specific show or movie is only granted for certain countries.
457
What specific actions can a DRM system prevent when a user opens a protected PDF document?
It can prevent the user from copying text, taking screenshots, or printing the document to a physical or digital printer.
458
What is "Regional Lockout" in the context of physical media like DVDs or gaming consoles?
A form of TPM where a disc or game is programmed to only work on hardware sold in the same geographical region (e.g., a Region 1 DVD will not play in a Region 2 player).
459
How do passwords serve as a basic form of Technical Protection Measure (TPM)?
They act as a primary authentication gate that ensures only users with the correct credentials can decrypt or view the protected information.
460
What is the "Right to Private Copying" and how can DRM affect it?
It is the legal right in some regions to make a backup copy of media for personal use; however, DRM often technologically prevents this, even if it is legally permitted.
461
From which public domain databases can you download literature/images/art with 'no strings attached'?
Project Gutenberg (literature), Pixabay/Unsplash (images), Metropolitan Museum of Art's open access collection (art).
462
For what purposes are there copyright exceptions?
Use for illustration in teaching, caricature, parody, pastiche, quotation, review and personal copying private use
463
What is the purpose of copyright depositories?
Registering' copyright to create a paper trail.
464
What is the primary purpose of HTML in web development?
To provide the structure and meaning of a webpage by defining elements like headings, paragraphs, links, and images.
465
Why is CSS kept separate from HTML?
To follow the principle of "separation of concerns," allowing developers to change the entire look of a site (presentation) without touching the actual content (structure).
466
Why would a developer choose TypeScript over standard JavaScript?
TypeScript adds "static typing," which helps catch errors during development before the code is even run, making it much safer for large, complex projects.
467
What is the purpose of SQL (Structured Query Language)?
It is a specialized language used to communicate with and manage relational databases, allowing users to create, retrieve, update, and delete structured data.
468
Why is Python frequently used for the "backend" of web applications?
Because of its clean, readable syntax and a massive library of pre-built tools that speed up the development of data-heavy or AI-integrated websites.
469
What is the purpose of a CSS Preprocessor like SASS or SCSS?
It adds advanced features to CSS, such as variables and nesting, making it easier to manage and organize styles for very large websites.
470
Why do modern web apps use "Single Page Application" (SPA) frameworks like React or Vue?
To improve user experience by only updating small parts of the page when a user clicks something, rather than reloading the entire page from the server.
471
What is the difference between a "Markup Language" and a "Programming Language"?
A markup language (like HTML) annotates text to tell a browser how to display it; a programming language (like JavaScript) uses logic, loops, and math to make decisions.
472
Why would a developer use "WebAssembly" (Wasm) instead of JavaScript?
For performance-intensive tasks like video editing, 3D games, or complex simulations that need to run at near-native speeds inside the browser.
473
What is the purpose of Markdown?
It is a lightweight markup language with plain-text formatting syntax that is designed to be easily converted into HTML while remaining readable to humans.
474
Why is Java (not JavaScript) often used for enterprise-level web backends?
Because it is highly stable, scalable, and offers strong security features required by large organizations like banks and insurance companies.
475
What is the role of "Ruby on Rails" in web development?
It is a framework that emphasizes "convention over configuration," allowing developers to build functional websites very quickly by following standard patterns.
476
Why is the "Go" (Golang) language popular for building modern cloud-based web services?
It is designed for high efficiency and "concurrency," meaning it can handle thousands of simultaneous connections with very low memory usage.
477
What is the purpose of "Bootstrap" or "Tailwind CSS"?
These are CSS frameworks that provide pre-designed components and utility classes, allowing developers to build responsive, modern layouts without writing all the CSS from scratch.
478
What is the clock Speed of a CPU/GPU?
The the frequency at which the clock generator of a processor can generate pulses used to synchronize the operations of its components, i.e., turn transistors on and off to do computations.