What is the term for the PLC component that executes the control logic program?
CPU (Central Processing Unit)
What is the term for the graphical programming language that represents logic using blocks and connections?
Function Block Diagram (FBD)
What do we call languages like Python, Java, and C that are closer to human language than to hardware?
High-level language
What is the term for malicious software designed to damage or infiltrate systems?
malware
What digital replica of a physical asset is used for simulation and monitoring?
digital twin
What do we call the terminal blocks used to receive signals from sensors?
input module
What is the term for the language that uses step/transition structures to represent sequential processes?
Sequential Function Chart (SFC)
What program translates high-level source code into machine code before execution?
compiler
What attack uses multiple compromised devices to overwhelm a target system?
Distributed Denial of Service (DDoS)
What term refers to a network of physical devices, vehicles or appliances that are embedded with sensors, software, and network connectivity, allowing them to collect and share data?
Internet of Things (IoT)
What is the term for a PLC’s cyclic process of reading inputs, executing logic, and updating outputs?
scan cycle
What is the name of the PLC language that resembles high-level programming with statements and expressions?
Structured Text (ST)
What term refers to errors caused by breaking the language’s structural rules?
Syntax error
What is the term for malicious software designed to encrypt files and demand payment?
ransomware
What term describes the real-time exchange of data between machines without human involvement?
Machine-to-Machine communication (M2M)
What is each horizontal line in a ladder diagram called?
rung
What is the name of the PLC language that uses low-level, assembly-style instructions?
Instruction List (IL)
What do we call a human-friendly, English-like description of an algorithm? (correct pronunciation)
pseudocode
What attack monitors and intercepts data between two communicating parties?
Man-in-the-Middle attack (MITM)
What is an appropriate name to describe the technologies that build 3D objects by adding layer-upon-layer of material?
additive manufacturing
If the PLCs have been adapted to withstand harsh conditions, they have been...?
ruggedized
Name all 5 PLC programming languages discussed during lessons.
Ladder Logic, Function Block Diagram, Structured Text, Instruction List, Sequential Function Chart
What does IDE stand for?
Integrated Development Environment
What umbrella term describes attacks exploiting human behavior?
social engineering
What technique uses historical and real-time data to forecast failures or optimize operations?
Predictive analytics