What is the main function of the CPU?
To process instructions and data.
What is a variable?
A named storage location in memory.
What does LAN stand for?
Local Area Network.
What is a binary number system?
A base-2 number system using 0s and 1s.
What is malware?
Malicious software designed to harm computers.
Name two types of secondary storage.
HDD, SSD, Optical Discs, etc.
What does the "IF" statement do in programming?
It makes decisions based on a condition.
What is the role of a router in a network?
To direct data packets between networks.
Convert the binary number 1010 to decimal.
10
What is phishing?
A cyber attack to steal sensitive information.
What is the difference between RAM and ROM?
RAM is volatile; ROM is non-volatile.
What is the purpose of a loop?
To repeat a set of instructions.
What is the difference between HTTP and HTTPS?
HTTPS is secure (encrypted).
What is ASCII?
A character encoding standard.
What is the purpose of a firewall?
To block unauthorized access to a network.
What does GPU stand for, and what is its purpose?
Graphics Processing Unit; it handles graphics rendering.
What is the difference between a compiler and an interpreter?
A compiler translates the entire program at once; an interpreter translates line by line.
What is an IP address?
A unique identifier for devices on a network.
Convert the decimal number 25 to binary.
11001
What is encryption?
The process of converting data into a code to prevent unauthorized access.
Explain the purpose of an operating system.
To manage hardware resources and provide a user interface.
Write pseudocode to find the largest of three numbers.
INPUT num1, num2, num3
IF num1 > num2 AND num1 > num3 THEN
OUTPUT num1
ELSE IF num2 > num3 THEN
OUTPUT num2
ELSE
OUTPUT num3
Explain the purpose of DNS.
Domain Name System; it translates domain names (e.g., google.com) into IP addresses.
What is the purpose of hexadecimal in computing?
To represent binary data in a more compact and readable form.
What is the difference between ethical hacking and illegal hacking?
Ethical hacking is authorized and aims to improve security; illegal hacking is unauthorized and malicious.