What is the purpose of a CPU?
The CPU is the brain of the computer, executing instructions and processing data.
What are the core functions of an operating system?
Why are computer ethics important?
Protecting Rights, Preventing Harm, Fostering Trust, Promoting Fairness, Ensuring Accountability
What makes a computer unsecure?
weak passwords, outdated software, insufficient firewalls, and vulnerabilities in operating systems and applications
What is the capital of australia?
Canberra
What are some common input devices?
Examples include keyboards, mice, image scanners, and microphones.
What is the difference between a kernel and an operating system?
What are the 2 basic computer ethics?
Respect the privacy of others, Respect the integrity of the computing systems, Always identify the user accurately, Respect copyrights and licenses, Respect the intellectual property of others.
What is a DDoS Attack?
A Distributed Denial of Service attack overwhelms a target server or network with traffic from multiple sources, making it unavailable to legitimate users.
What is the most common house animal?
A dog.
What is a network?
A network is a collection of interconnected devices that communicate with each other, often for sharing resources and information
What are the different types of kernels?
What are the 4 issues of computer ethics?
Privacy, accuracy, property and accessibility
What is Phishing?
Phishing is a type of cyberattack where attackers attempt to fraudulently obtain sensitive information, like passwords or credit card details, by posing as a legitimate entity in an email or other communication.
When was the first computer made?
1822
What is an IP address?
An IP address is a unique numerical label assigned to each device participating in a computer network.
What is a deadlock?
Who is the father of computer ethics?
What is a Honeypot?
A honeypot is a decoy system designed to attract and trap cybercriminals, allowing security professionals to study their tactics and methods.
Who invented the computer?
Charles Babbage
What is ROM?
ROM is a type of memory that stores firmware, which is the software embedded into hardware to control it.
What is Belady's anomaly?
What is unethical computer use?
identity theft, music and file sharing, and cyberbullying.
What is the Principle of Least Privilege?
The principle of least privilege dictates that users and systems should only have access to the minimum level of privileges necessary to perform their tasks.
What are the main components of a computer?