I am the brain of the computer and in charge of processing.
CPU
I connect computers within 1 single LAN
A switch
.....................is a subfield of Artificial intelligence
Machine Learning
What is software (or hardware) designed to block unauthorized access to or from a private network?
A firewall
I am like Mr. Z's desk. The info. will not stay permanently once desk cleared
RAM
I connect devices between 2 or more LANs
Router
AI will replace .......... jobs globally by ........
A/ 85 million, 2025
B/ 85 thousand, 2026
C/ 75 million, 2023
D/ 1.5 billion, 2027
A/ 85 million, 2025
What type of malware encrypts files on a victim's computer and demands payment for their release?
Ransomware
What do computers eat for snacks?
Microchips!
What do you call a networking party for routers?
a/ LAN
b/WAN
c/ SOHO
d/MAN
b/WAN
What do we call the process of protecting information by encoding it into an unreadable format that can only be decoded by authorized parties?
a/Brute Force
b/Hashing
c/Encryption
d/Decryption
c/Encryption
How does a computer take a break?
It "logs off"!
What type of cable is commonly used to connect a computer to a router or switch?
An ethernet cable
What term describes the ability of an AI system to understand, interpret, and generate human-like language?
a/Natural Language Processing (NLP)
b/Natural Machine Processing (NMP)
c/Artificial Neural Networks (ANN)
d/Artificial General Intelligence (AGI)
a/Natural Language Processing (NLP)
What is the term for a malicious software program that disguises itself as legitimate software to gain access to a system's resources?
a/Trojan horse or Trojan.
b/Intrusion Detection System.
c/Hacktivist
d/Ethical Hacking
a/Trojan horse or Trojan.