What is input?
This is the first step of the computing cycle, when you click, type, or tap on a device.
What are cookies?
These small text files stored on your device track your activity on websites.
What is the CIA Triad?
This security model is based on confidentiality, integrity, and availability.
What is the Internet?
This is a global system of interconnected computer networks.
What is spyware (or adware)?
This malware type displays unwanted ads and pop-ups.
What is processing?
This step of the computing cycle is when the CPU figures out what to do with input.
What is data in transit?
This type of data is moving across the internet, such as when sending emails.
What is confidentiality?
This principle ensures that data is only accessible to authorized users.
What is cache (browser cache)?
This browser feature stores website data to help pages load faster.
What is HTTPS?
This secure connection method encrypts web traffic and shows a padlock in the browser.
What is a server?
These devices connect to the internet and include things like smart TVs and smart speakers.
What is a VPN (virtual private network)?
This network tool creates a secure “tunnel” to protect data as it travels online.
What is non-repudiation?
This concept ensures a person cannot deny performing an action.
What are bookmarks?
This feature saves links to your favorite websites for quick access.
What is a worm?
This malware can copy itself across networks without user interaction.
What is RAM?
These external devices, like printers and speakers, connect to a computer but are not part of it.
What is data profiling (or targeted segmentation through data analytics)?
This concept explains how companies group users based on traits like age, location, and interests.
What is ransomware?
This malware attack locked systems and demanded payment for access.
What is a Certificate Authority (CA)?
This system verifies website identity through trusted third parties.
What is the Caesar cipher?
This encryption method was used by Julius Caesar to shift letters in messages.
What is the computing cycle?
This process includes input, processing, storage, and output working together repeatedly at high speed.
What is automated data processing (or algorithm-driven analysis)?
This process uses algorithms to automatically analyze massive amounts of user data without human input.
What is the Stuxnet attack?
This real-world attack used infected USB drives to target isolated systems.
What is a fiber optical network terminal (ONT)?
This device converts fiber signals into a usable form for home devices.
What is defense in depth?
This cybersecurity strategy involves multiple layers of protection like firewalls and antivirus.