This common form of cyber-attack uses deceptive emails to trick individuals into revealing personal information.
what is Phishing?
The two most common operating systems for personal computers are Windows and this Apple-made software.
what is macOS?
This 3-letter acronym stands for the "brain" of the computer, the Central Processing Unit.
what is the CPU?
Unlike CPUs, GPUs are designed for this type of processing, handling thousands of small tasks simultaneously.
what is parelell processing?
The name of the highest uninterrupted waterfall in the world
what is angel falls?
This type of targeted phishing attack focuses on high-level executives or specific individuals.
what is spear phishing?
A program that allows you to navigate and view websites on the internet.
what is a web browser?
The primary function of a CPU is to perform these two types of operations: Arithmetical and this, which compares values.
what is logical?
Introduced in 2006, this is NVIDIA's parallel computing platform and programming model that allows GPUs to be used for general-purpose computing.
what is CUDA?
The only continent without an active volcano
what is australia?
This term describes manipulating people into breaking normal security procedures to gain access to systems.
what is social engineering?
This main circuit board holds the CPU, memory, and connectors.
what is the motherboard?
CPUs are mostly made of this semiconducting element, often sourced from sand.
what is silicon?
This competitor to NVIDIA, known for its Radeon line, was acquired by AMD in 2006.
what is ATI?
The world's longest river
what is the amazon river?
This type of scam, which involves impersonating a company executive to trick employees into transferring funds, resulted in billions in losses in 2023.
what is business email compromise?
This type of storage uses flash memory rather than spinning magnetic disks.
what is an SSD?
This unit, abbreviated as MHz or GHz, is used to measure the speed of a CPU.
what is clock speed?
The "RT" in NVIDIA's RTX series stands for this lighting technique that simulates the physical behavior of light.
what is ray tracing
Nearly all fossils are preserved in this type of rock.
what is sedimentary rock?
These are often called the "weakest link" in the cybersecurity chain if proper procedures are not followed.
What are Users/Humans?
This piece of hardware is a "repeater" that sends network signals to all attached devices, regardless of need.
what is a hub?
These are the three main steps in the CPU machine cycle: Fetch, Decode, and this.
what is execute
In 2024, the demand for GPUs to train large language models led to a massive supply shortage of this specific high-end NVIDIA chip architecture.
what is Hopper?
Extending for more than 1,200 miles off the northeast coast of Australia is this natural wonder.
what is the great barrier reef?