What does PAN stand for?
Personal Area Network
How many bit is ASCII?
7 bit
What is spyware?
It monitor target computer's action
Give an example of hardware?
keyboard,Mouse,Speaker
What does malicious means?
Something that causes harm
Count 4 types of servers
Mail,print,file and web servers
Which numbers does Denary format includes?
0,1,2,3,4,5,6,7,8,9
What does "unathorised" means?
Not allowed
Which type of memory is volatile?
RAM
True or False.Antivirus always deletes data without telling the user about it
False
What are 3 benefits of networking?
Can share devices
Software is often cheaper
Can share internet connection
Can communicate with each other
what is echo-checking?
When a computer receives data, it immediately returns it to the sending computer for comparison.
The sender then compares the two sets of data to check whether they match. If they match, there is no error. However, if they do not match, then the data is sent again.
In which cyber attack hackers use very large dictionary to hack the password?
Brute force attack
What are the 4 types of operating system user interface?
Command line,GUI,NOS and natural language or speech
What do firewalls do?
prevent unathorised access
Often switches connect devices using what?
Ethernet or copper wire cable
What is parallel transmission?
8bits or 1 byte of data can be sent simultaneously
How many ILOVEYOU bug damaged in money?
$15 billion
What is a popular example of Natural language and speech operating system interface?
Smart Speakers
Which cyber attack is quite difficult to prevent?
spyware
What is serial transmission?
data is transferrred one bit at a time
What is power surge?
Temporary increase in power often caused by lightining
In which year ILOVEYOU bug was happened?
2000s year
What does Command line opperating system interface do?
process a command for user to type
Experts estimated that in 2031 there will be ransomware attack in every how may seconds?
2 seconds