This data structure stores multiple values in a single variable using indexed positions.
Array
This component is known as the “brain” of the computer.
CPU
This three-letter acronym stands for the local network inside a building or home.
LAN
This popular open-source operating system is based on UNIX.
LINUX
This term refers to unwanted or malicious email messages.
Spam
This loop continues as long as a condition remains true
While Loop
This type of memory is volatile and is cleared when the computer turns off.
RAM
This device connects multiple network devices and forwards data based on MAC addresses
Switch
This OS component manages hardware resources and communication with software.
The Kernel
This type of malware encrypts files and demands payment
Ransomware
This programming concept allows a function to call itself
Recursion
This unit is responsible for supplying power to all computer components
PSU (Power suply unit)
This protocol translates human-readable domain names into IP addresses.
DNS
This type of OS allows multiple users to access a computer simultaneously.
Multiuser OS
This security practice involves verifying that a user is who they claim to be.
Authentication
This term refers to variables that exist only inside a function
Local Scope
This part of a processor determines how many instructions it can execute at once.
Number of cores
This process breaks large messages into smaller packets and reassembles them on arrival
Packet Switching
This mechanism isolates apps and their dependencies in lightweight, portable units.
Containers
This type of attack floods a server with traffic to make it unavailable
DDoS attack
This type of error occurs when a program runs but produces incorrect results
Logic Error
This term refers to the connection standard used to plug GPUs into the motherboard.
PCI Express (PCIe)
This IPv4 class uses addresses from 192.168.0.0 to 192.168.255.255 for private networks.
Class C
This scheduling algorithm selects the process with the shortest estimated run time.
Shortest Job First (SJF)
This concept involves identifying and reducing possible security weaknesses in a system.
vulnerability assessment