Understand Tech Basics
Data and Privacy
Cyber
security
Internet Technologies
Random
100

What is input?

This is the first step of the computing cycle, when you click, type, or tap on a device.

100

What are cookies?

These small text files stored on your device track your activity on websites.

100

What is the CIA Triad?

This security model is based on confidentiality, integrity, and availability.

100

What is the Internet?

This is a global system of interconnected computer networks.

100

What is spyware (or adware)?

This malware type displays unwanted ads and pop-ups.

200

What is processing?

This step of the computing cycle is when the CPU figures out what to do with input.

200

What is data in transit?

This type of data is moving across the internet, such as when sending emails.

200

What is confidentiality?

This principle ensures that data is only accessible to authorized users.

200

What is cache (browser cache)?

This browser feature stores website data to help pages load faster.

200

What is HTTPS?

This secure connection method encrypts web traffic and shows a padlock in the browser.

300

What is a server?

These devices connect to the internet and include things like smart TVs and smart speakers.

300

What is a VPN (virtual private network)?

This network tool creates a secure “tunnel” to protect data as it travels online.

300

What is non-repudiation?

This concept ensures a person cannot deny performing an action.

300

What are bookmarks?

This feature saves links to your favorite websites for quick access.

300

What is a worm?

This malware can copy itself across networks without user interaction.

400

What is RAM?

These external devices, like printers and speakers, connect to a computer but are not part of it.

400

What is data profiling (or targeted segmentation through data analytics)?

This concept explains how companies group users based on traits like age, location, and interests.

400

What is ransomware?

This malware attack locked systems and demanded payment for access.

400

What is a Certificate Authority (CA)?

This system verifies website identity through trusted third parties.

400

What is the Caesar cipher?

This encryption method was used by Julius Caesar to shift letters in messages.

500

What is the computing cycle?

This process includes input, processing, storage, and output working together repeatedly at high speed.

500

What is automated data processing (or algorithm-driven analysis)?

This process uses algorithms to automatically analyze massive amounts of user data without human input.

500

What is the Stuxnet attack?

This real-world attack used infected USB drives to target isolated systems.

500

What is a fiber optical network terminal (ONT)?

This device converts fiber signals into a usable form for home devices.

500

What is defense in depth?

This cybersecurity strategy involves multiple layers of protection like firewalls and antivirus.

M
e
n
u