Hardware
Networking
AI
Cybersecurity
100

I am the brain of the computer and in charge of processing.

CPU

100

I connect computers within 1 single LAN

A switch

100

.....................is a subfield of Artificial intelligence

Machine Learning

100

What is software (or hardware) designed to block unauthorized access to or from a private network?

A firewall

200

I am like Mr. Z's desk. The info. will not stay permanently once desk cleared

RAM

200

I connect devices between 2 or more LANs

Router

200

AI will replace ..........  jobs globally by ........

A/ 85 million, 2025

B/ 85 thousand, 2026

C/ 75 million, 2023

D/ 1.5 billion, 2027

A/ 85 million, 2025

200

What type of malware encrypts files on a victim's computer and demands payment for their release?

Ransomware

300

What do computers eat for snacks?

Microchips!

300

What do you call a networking party for routers?
a/ LAN

b/WAN

c/ SOHO

d/MAN

 

 b/WAN

300

What do we call the process of protecting information by encoding it into an unreadable format that can only be decoded by authorized parties?
a/Brute Force

b/Hashing

c/Encryption

d/Decryption

c/Encryption

400

How does a computer take a break?

It "logs off"!

400

What type of cable is commonly used to connect a computer to a router or switch?

An ethernet cable

400

What term describes the ability of an AI system to understand, interpret, and generate human-like language?

a/Natural Language Processing (NLP)

b/Natural Machine Processing (NMP)

c/Artificial Neural Networks (ANN)

d/Artificial General Intelligence (AGI) 


a/Natural Language Processing (NLP) 

400

What is the term for a malicious software program that disguises itself as legitimate software to gain access to a system's resources? 

a/Trojan horse or Trojan. 

b/Intrusion Detection System.

c/Hacktivist

d/Ethical Hacking

a/Trojan horse or Trojan.

M
e
n
u