click below
click below
Normal Size Small Size show me how
8.8 CheckpointReview
8.8 Checkpoint Review
| Question | Answer |
|---|---|
| How many sets of two hexadecimal numbers are in a MAC address? | 6 |
| What hardware component processes data? | Central Processing Unit |
| Which file extension is used for web pages? | html |
| What is a Kensington lock used for? | Locking a laptop to prevent theft |
| Why might someone use high contrast settings in a browser? | To make text easier to see |
| What is a zero-day attack? | An attack that exploits an unknown vulnerability |
| What is the purpose of two-factor authentication (2FA)? | To add an extra step to logging in for increased security |
| Who usually owns the data you share on social media platforms? | The social media platform |
| What is the term for the address used to access websites on the Internet? | URL |
| Which operating system uses .app files for applications? | Apple macOS |
| What is a data center? | A dedicated location that holds thousands of servers |
| What is the primary purpose of diagramming software? | To create visual representations of projects |
| What is a potential risk of downloading software from the Internet? | The software might contain a virus. |
| What is a square wave in the context of a computer's clock signal? | A wave that represents binary digits |