When more than 1 CPU is running at 1 time
Multiprocessing
What does the f stand for in f1,f2,f3?
Functions
What is the strongest human muscle?
The jaw
This security measure acts as a barrier, controlling the incoming and outgoing network traffic.
Firewall
How do you get stick keys?
Press shift many times
What performs the math on computers?
Arithmetic/Logic Unit
What is the main high speed memory that holds data and instructions?
What is the only snake known to build a nest?
King Cobra
This specific type of malware encrypts a user's files and demands payment, often through cryptocurrency, to regain access.
Ransomware
Shortcut key for a new window
Ctrl+N
How many generations have computers gone through?
Five
What connects,powers and transfer data between computers?
USB port
Which country has the most islands?
Sweden that has over 220,000
This computer virus replicates itself and then eats up a computer's processing space.
Ctrl+Shift+ESC
What language do computers read to carry out the instructions
Binary
A highlighted word or symbol on a document or webpage that takes you to another place.
Hyperlink
Who is the tallest president in the U.S?
Abraham Lincoln
Programs that pretend to be legitimate software but actually carry out hidden, harmful functions.
Trojan Horse
Shortcut key for Snipping tool
Win+Shift+S
This occurs in an OS when two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock
Which $35 single-board computer, launched in 2012, has transformed computer science education worldwide?
Raspberry PI
Wellington
This type of malicious program records every keystroke made by a user to steal passwords.
Keylogger or spyware
Shortcut key for reopening a closed tab?
Ctrl+Shift+T