CompTIA ITF Review

12345678910111213141516
Across
  1. 3. The symbol system using hexadecimal is called _____.
  2. 5. What wireless standard requires devices to be within 6" of eachother?
  3. 8. What service is used translate URLs and IP addresses?
  4. 9. _____ is used to represent international text data.
  5. 10. What query statement is used to capture a range of values?
  6. 12. The _____ language is closest to machine language.
  7. 16. What programming statement stores a value in memory?
Down
  1. 1. What describes a running application on an operating system?
  2. 2. A(n) _____ is the best storage option for a laptop.
  3. 4. What are you doing when entering login credentials?
  4. 6. How many bytes are in 32 bits? (use spelled out number. Ex. "one")
  5. 7. _____ are the weakest link in an organization's security posture.
  6. 8. What kind of encryption would best protect against the theft of a device?
  7. 11. What operating system does not require file extensions?
  8. 13. What computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
  9. 14. _____ is a base two numbering system.
  10. 15. Which of the following is an example of a compiled programming language? Pearl, Java, HTML, Python.