What is the term for the PLC component that executes the control logic program?
CPU (Central Processing Unit)
What is the term for the graphical programming language that represents logic using blocks and connections?
Function Block Diagram (FBD)
What do we call languages like Python, Java, and C that are closer to human language than to hardware?
High-level language
What is the term for malicious software designed to damage or infiltrate systems?
malware
What digital replica of a physical asset is used for simulation and monitoring?
digital twin
What do we call the terminal blocks or modules used to receive signals from sensors?
input module
What is the term for the language that uses step/transition structures to represent sequential processes?
Sequential Function Chart (SFC)
What program translates high-level source code into machine code before execution?
compiler
What attack uses multiple compromised devices to overwhelm a target system?
Distributed Denial of Service (DDoS)
What is the term for a PLC’s cyclic process of reading inputs, executing logic, and updating outputs?
scan cycle
What is the name of the PLC language that resembles high-level programming with statements and expressions?
Structured Text (ST)
What term refers to errors caused by breaking the language’s structural rules?
Syntax error
What is the term for malicious software designed to encrypt files and demand payment?
ransomware
What is each horizontal line in a ladder diagram called?
rung
What is the name of the PLC language that uses low-level, assembly-style instructions?
Instruction List (IL)
What do we call a human-friendly, English-like description of an algorithm? (correct pronunciation)
pseudocode
What attack monitors and intercepts data between two communicating parties?
Man-in-the-Middle attack (MITM)
If the PLCs have been adapted to withstand harsh conditions, they have been...?
ruggedized
Name all 5 PLC programming languages discussed during lessons.
Ladder Logic, Function Block Diagram, Structured Text, Instruction List, Sequential Function Chart
What does IDE stand for?
Integrated Development Environment
What umbrella term describes attacks exploiting human behavior?
social engineering