This part of a computer is considered its "brain" and is responsible for performing calculations and tasks.
What is the CPU (Central Processing Unit)?
This common solution, often the first step in troubleshooting, involves turning a device off and then back on.
What is rebooting or restarting?
This popular cloud storage service by Google allows users to save files online and access them from any device.
What is Google Drive?
This type of software is designed to detect and remove malicious programs from a computer.
What is antivirus software?
This digital record system is used by healthcare providers to store and manage patient health information electronically.
What is an Electronic Health Record (EHR) or Electronic Medical Record (EMR)?
This is the primary storage device used in modern computers, known for its fast data access and lack of moving parts.
What is an SSD (Solid-State Drive)?
This term describes the unauthorized access of a user account by guessing or using stolen passwords.
What is a security breach or account compromise?
This type of cloud computing service, abbreviated as SaaS, provides software applications over the internet instead of installing them locally.
What is Software as a Service?
This practice involves using a long, unique combination of letters, numbers, and symbols to protect online accounts.
What is creating a strong password?
These types of wearable device, commonly used to track physical activity, can monitor heart rate and count steps.
What is a fitness tracker (e.g., Fitbit, Apple Watch)?
This input device, invented in the 1960s by Douglas Engelbart, is used to control the pointer on a computer screen.
What is a mouse?
This type of connection abbreviated RDP allows IT support to access and control a user's computer remotely to help resolve issues.
Remote Desktop Protocol
This leading cloud platform by Amazon offers a wide range of services, including computing power, storage, and databases.
What is Amazon Web Services (AWS)?
This type of attack involves sending fraudulent emails that appear to come from a trusted source in order to steal personal information.
What is phishing?
This type of healthcare service allows patients to consult with doctors remotely using video calls or online messaging.
What is telemedicine?
This type of memory, often abbreviated as RAM, is used to store data that the CPU needs quick access to while the computer is running.
What is Random Access Memory?
When a user can't connect to the internet, this icon often appears in the taskbar with a red "X" or a yellow triangle.
What is the network connection icon?
This cloud deployment model combines both private and public cloud resources to provide greater flexibility and security.
What is a hybrid cloud?
This security measure, often abbreviated as VPN, encrypts a user's internet connection to protect their privacy.
What is a Virtual Private Network?
This application feature allows patients to view their lab results, schedule appointments, or message their healthcare provider directly from their own devices.
What is a patient portal?
This hardware component, abbreviated as GPU, is designed to accelerate the rendering of images and videos, and is essential for gaming and graphic design.
What is a Graphics Processing Unit?
This protocol, often used for remote troubleshooting, allows IT personnel to securely access command-line interfaces of network devices.
What is SSH (Secure Shell) or Power Shell?
This process, crucial in cloud computing, involves distributing workloads across multiple servers to ensure high availability and reliability.
What is load balancing?
This form of malware encrypts a user's files and demands payment for the decryption key.
What is ransomware?
This standard, commonly abbreviated, is used for exchanging, integrating, and sharing electronic health information across different healthcare systems.
What is Health Level 7 (HL7)?