0% found this document useful (0 votes)
20 views

ACIT 1420 Comprehensive Study Guideline

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

ACIT 1420 Comprehensive Study Guideline

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

ACIT 1420 Comprehensive Study Guideline

Midterm Topics

1. Basic computer components and their functions

o Components: CPU, RAM, storage devices (HDD, SSD),


motherboard, GPU.

o Functions: CPU processes instructions, RAM provides


temporary data storage, HDD/SSD store data, motherboard
connects components, GPU processes graphics.

2. Tools for identifying issues of the components above

o Diagnostic tools include CPU-Z, GPU-Z, MemTest86, and


built-in OS utilities like Task Manager and Disk Utility.

3. Lossy compression and lossless compression, examples

o Lossy: JPEG, MP3 (reduces file size, loses some data).

o Lossless: PNG, FLAC (reduces size without losing data).

4. Bit -> Byte -> Kilobyte -> Megabit -> Gigabit

o Conversion: 1 Byte = 8 bits; 1 Kilobyte = 1024 Bytes; 1


Megabit = 1,000,000 bits; 1 Gigabit = 1,000 Megabits.

5. Instruction cycle (Fetch -> Decode -> Execute)

o CPU retrieves instruction from memory (Fetch), interprets it


(Decode), and performs the operation (Execute).

6. How to write instructions

o Utilize assembly language syntax or high-level languages


compiled into machine code.

7. How data is stored on HDD, SSD, CD, and DVD

o HDD: Magnetic storage on spinning disks.

o SSD: Flash memory.

o CD/DVD: Optical storage using laser-etched data pits.

8. Sector vs. Cluster

o Sector: Smallest storage unit on a disk.


o Cluster: Group of sectors treated as a single unit by file
systems.

9. Binary -> Decimal, Decimal -> Binary, Decimal -> 2’s


complement

o Conversion involves base changes; 2’s complement


represents negative binary values.

10. CPU (L1, L2, L3 Cache) and Chipset (Northbridge &


Southbridge)

o Caches: Store frequently used data for quick access.

o Northbridge: Manages high-speed components.

o Southbridge: Manages slower peripherals.

11. CPU-Z (How to read CPU-Z)

o Tool for viewing CPU, memory, and system information like


clock speed, cores, and RAM details.

12. RAM vs. ROM; Memory mix modules

o RAM: Volatile, temporary storage.

o ROM: Non-volatile, permanent storage.

13. BIOS vs. CMOS

o BIOS: Firmware interface for hardware initialization.

o CMOS: Stores BIOS settings.

14. Upgrade vs Update vs Service Pack

o Upgrade: New version.

o Update: Bug fixes or improvements.

o Service Pack: Cumulative updates.

15. What is Cloud Storage? Public cloud and private


cloud? Benefits and drawbacks.

o Public: Accessible via the internet.

o Private: Internal network.


o Benefits: Scalability, accessibility. Drawbacks: Security
concerns, ongoing costs.

16. Operating system (Definition, History, Key goals,


Services)

o OS: Software managing hardware and applications.

o Goals: Resource management, user interface, process


coordination.

17. Software (Definition, Categories)

o Software: Set of instructions.

o Categories: System software, application software.

18. Process vs. Thread

o Process: Independent execution unit.

o Thread: Subset of process, shares resources.

19. Uniprogramming vs Multiprogramming (OS PPT)

o Uniprogramming: Single task at a time.

o Multiprogramming: Multiple tasks managed concurrently.

20. Multiprocessing vs. Multitasking vs. Multithreading

o Multiprocessing: Multiple CPUs.

o Multitasking: Switching between tasks.

o Multithreading: Multiple threads within a process.

21. What is hypervisor? (Type 1 and Type 2)

o Hypervisor: Manages virtual machines.

o Type 1: Bare-metal.

o Type 2: Hosted.

22. What is virtual machine?

o Software emulation of a computer system.

23. What is Kernel? What is user mode?

o Kernel: Core OS managing hardware.


o User mode: Restricted execution mode for apps.

24. Web App - Advantages and disadvantages

o Advantages: Accessibility, cross-platform.

o Disadvantages: Dependent on internet.

25. What is UEFI?

o Modern firmware interface replacing BIOS.

26. Why UEFI replaced BIOS

o Faster boot times, larger drive support, improved security.


Final Exam Topics

1. What is file system?

o A method for storing and organizing data on a storage


device.

2. Filename extensions?

o Suffixes added to file names indicating the file type


(e.g., .txt, .jpg).

3. What is partition? What is volume?

o Partition: A division of a storage device.

o Volume: A formatted partition ready for use.

4. File Management Metaphors (Tree Structure)

o File systems often use a hierarchical tree structure to


represent folders and files.

5. FAT32 vs NTFS; the main advantages of NTFS?

o FAT32: Older system with file size limits.

o NTFS: Supports larger files, better security, and journaling.

6. Windows OS File system conversion commands.

o Use convert command to change FAT32 to NTFS.

7. Basic disks vs Dynamic disks; what is basic disk primary


partitions?

o Basic disk: Fixed partitions.

o Dynamic disk: Flexible volumes spanning multiple disks.

8. Dynamic disk volumes: what is simple volume? spanned


volume? mirrored volume? striped volume?

o Simple: Single disk volume.

o Spanned: Combines space across disks.

o Mirrored: Redundant copy.


o Striped: Data spread across disks for speed.

9. What is RAID? RAID 0 vs RAID 1 vs RAID 5

o RAID 0: Striped, no redundancy.

o RAID 1: Mirrored, redundancy.

o RAID 5: Striped with parity for redundancy.

10. What is encryption?

o Encoding data to protect it.

11. What is authentication and authorization?

o Authentication: Verifying identity.

o Authorization: Granting access to resources.

12. Bitlocker? Bitlocker Requirements?

o Encryption tool for Windows.

o Requirements: TPM chip, compatible OS.

13. What is offline attack? brute force attack? dictionary


attack?

o Offline: Targets stored data.

o Brute force: Tries all combinations.

o Dictionary: Uses known words.

14. What is strong password? How to make a strong


password?

o Mix uppercase, lowercase, numbers, symbols.

15. Computer Worms vs. Computer viruses vs. Trojans

o Worms: Spread autonomously.

o Viruses: Require host.

o Trojans: Disguised malware.

16. Antivirus software (Repair, Quarantine, Delete)

o Detects and handles malware.


17. What are the different types of accounts in Windows
OS?

o Built-in accounts (user, admin).

18. Standard account vs administrator account

o Standard: Limited rights.

o Admin: Full access.

19. What is UAC?

o User Account Control, prevents unauthorized changes.

20. What is Linux? Linux file system; What is shell?

o Linux: Open-source OS.

o Shell: Command interface.

21. Linux directory structure, Linux File System (ext4


vs. xfs)

o Hierarchical directories.

22. Linux basic commands

o ls, cd, mkdir, rm, chmod.

23. What is IP? Network subnet mask?

o IP: Identifies devices.

o Subnet Mask: Divides network segments.

24. Node (switch, router, bridge, repeater or extender)

o Components connecting networks.

 Switch: Connects devices within a network.

 Router: Directs data between networks.

 Bridge: Connects two LANs.

 Repeater/Extender: Amplifies network signals.

25. Network topology

o Point-to-Point: Direct connection between two devices.


o Star: All devices connected to a central hub.

o Ring: Devices connected in a circular format.

o Mesh: Devices interconnected for redundancy.

o Full Mesh vs Partial Mesh: Full mesh connects all nodes,


while partial mesh connects some.

26. Wireless vs. wired

o Wireless: Flexible.

o Wired: Reliable.

27. Command line options for ipconfig/DNS

o ipconfig /flushdns, ipconfig /all.

28. What is dynamic DNS?

o Updates DNS records automatically.

29. DNS record types

o A, MX, CNAME, TXT.

30. TCP vs. UDP?

o TCP: Reliable.

o UDP: Fast.

31. What is DHCP?

o Assigns IP addresses.

32. What is firewall? DMZ?

o Protects network, DMZ isolates services.

33. What is NAT? Why do we need NAT?

o Network Address Translation, shares a public IP across


devices.

34. What is VPN and why is it used?

o VPN: Virtual Private Network.

o Purpose: Encrypts internet traffic and masks the user’s IP


address, enhancing privacy and security.

You might also like