Explain how the Internet connects computers globally and what is the role of servers and clients?
The Internet links computers worldwide in a network where clients request data and servers store and send that data.
How does digital currency differ from money stored in a bank account?
Digital currency exists only electronically and often runs without central control, unlike bank money which is regulated by institutions.
What’s the difference between a virus and a worm in computer systems?
A virus needs user action to spread; a worm can self-replicate and spread automatically.
What is data storage?
The process of saving digital information so it can be retrieved and used later.
What is an input device? Give one example
A device that sends data to a computer, like a keyboard or mouse.
What’s the difference between a domain name and an IP address?
A domain name is a readable web address like google.com, while an IP address is the numeric identifier of a device on the network
What is a wallet in cryptocurrency, and what does it store?
A crypto wallet stores the user’s public and private keys needed to access, send, and receive digital currency
Explain why multi-factor authentication increases account security
It requires two or more verification methods, making it harder for hackers to gain access with just a password.
What’s the difference between primary and secondary storage?
Primary storage (RAM) is temporary and fast, while secondary storage (like SSDs or hard drives) is permanent and slower.
What is an output device? Give one example.
A device that displays or produces computer data, like a monitor or printer
Why might a website load slowly even if your Internet speed is fast?
Possible reasons include server overload, large image or video files, too many ads or scripts, or poor website design.
How does a blockchain ensure that no one can spend the same cryptocurrency twice (known as the “double-spending problem”)?
Each transaction is verified by multiple nodes and recorded permanently in a public ledger; once confirmed, previous transactions can’t be changed or reused.
How do cyberattacks exploit weaknesses in human behavior as well as in technology?
Attackers use phishing, fake websites, or emotional manipulation to trick users into giving access — targeting psychology instead of software flaws.
How does optical storage work, and give one example.
It uses lasers to read and write data on discs like CDs, DVDs, or Blu-ray discs.
Explain how a touchscreen can act as both an input and output device.
It displays images (output) and detects touch commands (input), allowing direct interaction with the screen.
What is DNS and how does it make browsing the web easier?
DNS (Domain Name System) converts domain names into IP addresses so users can access sites without memorizing numbers.
How does cryptography maintain trust in digital currency systems, and what might happen if encryption algorithms were ever broken?
Cryptography secures transactions by verifying identities and ensuring data integrity through digital signatures and hashing. If encryption were broken, hackers could forge transactions, create fake coins, or compromise entire blockchains, destroying trust in the system.
Compare symmetric and asymmetric encryption and explain when each is typically used.
Symmetric encryption uses one shared key for both encryption and decryption (fast, used for internal data). Asymmetric uses a public and private key pair (slower but secure, used for online communication).
Compare magnetic, optical, and solid-state storage in terms of how they store data and their advantages.
Magnetic uses spinning disks and magnets (large capacity, cheaper), optical uses lasers (good for media storage), and solid-state uses flash memory (fast and durable, but expensive).
How do scanners and sensors differ in how they collect data?
Scanners capture flat images or documents, while sensors detect physical changes like temperature, motion, or light levels and convert them into data.
How do web browsers use caching, cookies, and scripts to load web pages efficiently and what are the potential privacy or performance issues?
Browsers store cached data to load pages faster, use cookies to track sessions, and run scripts for interactivity. However, this can slow performance, expose user data, or allow third-party tracking
Describe two major economic or environmental criticisms of cryptocurrency and suggest one possible solution for each.
High energy use (solution: shift to Proof of Stake or renewable energy) and price volatility (solution: stablecoins or regulation). Both affect sustainability and trust in digital currencies.
Describe how cybersecurity experts use penetration testing and firewalls together to protect networks, and why both are needed.
Penetration testing simulates attacks to find weaknesses, while firewalls block unauthorized access. Both are necessary because one identifies vulnerabilities, and the other defends against them in real time.
Explain how cloud storage works and discuss one major benefit and one major risk
Cloud storage saves data on remote servers accessed via the Internet. Benefit: accessible from anywhere. Risk: relies on internet connection and may expose data to privacy breaches.
Describe how 3D printers and virtual reality headsets represent advanced output devices, and explain the technology behind one of them.
3D printers output physical objects using layer-by-layer additive manufacturing; VR headsets output immersive visuals using motion sensors and stereoscopic displays to simulate reality.