a system where almost everything communicates over the Internet
Internet of Things
a chip that executes the instructions within a device, sometimes referred to as the brains of the computer
Central Processing Unit
a non-physical, intangible creation that has value
Intellecual Property
type of spyware that secretly documents keystrokes of the user to steal passwords and other sensitive information
keylogger
The Fantastic Four have their headquarters in what building?
Baxter Building (or Four Freedoms Plaza)
human thinking and problem solving by a machine, including learning, reasoning, and self-correction
Artificial Intelligence
a system that offers users icons and images instead of only text commands
Graphical User Interface
a license that gives the holder the exclusive right over selling, making, or using an invention
patent
type of malware that locks users out of their system or device, and forces them to pay the attacker a ransom to gain access
ransomware
Peter Parker works as a photographer for...
The Daily Bugle
computing resources available on-demand over the Internet, providing users with off-site data are storage, management, and processing services
Cloud Computing
a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages
Hypertext markup language
a secret about processes, formulae, devices, or tools that give a company a competitive edge because they provide economic value
Trade Secret
type of malware that tricks the user into allowing access to the system or computer, by posing as a different type of file
trojan horse
Thor has two war goats to pull his chariot. They are named:
Toothgrinder and Toothgnasher
computer technology based on quantum mechanics, where data is stored using the quantum properties of particles, dramatically increasing computing capabilities
Quantum Computing
a language written for computers, usually specific to the computer’s hardware, which is closer to machine language
low level programming language
having control over our personal information and who has access to it
Privacy
weakness that puts a system or computer at risk
vulnerability
S.H.I.E.L.D.'s highest ranking agent is
Nick Fury
a precise set of instructions used to solve a problem or perform a calculation
algorithm
a prediction that processing speed would double every 2 years
Moore's Law
anything that might cause serious harm to a system or computer
cyberthreat
the economy that is based on the online connections among businesses, people, devices, data, systems, and processes
digital economy
Captain America was frozen in which war?
World War II
the process of distributing program instructions to be executed across multiple processors working at the same time, making processing speed faster and more efficient
parallel processing
a glass tube containing electrodes used as a switch to produce on or off signals for the computer, 1904 (first generation of computing)
Vacuum Tube
property rights that are assigned to the holder or owner that gives the holder a monopoly over the property and prevents others from using, copying, imitating, or duplicating the intellectual property unfairly
Intellecual property rights
the legal right given to organizations to exclusively use names, brands, and signs that identify their products, services, and companies
trademark
Blade is half-man and half-what?
half-vamprie
raw facts and figures that are entered into or collected by a computer for future use
Data
the tangible parts of a computer that you can touch; the physical components of the computer or device
Hardware
software used to identify and remove malware from computers and systems
anti-malware
device or software that monitors and controls network traffic to prevent security breaches
firewall
What is commonly believed to be the Black Widow's previous occupation before becoming a Russian spy?
ballerina