What is the primary function of the CPU?
Processing instructions.
What OS is developed by Microsoft.
Windows.
What is the term for accessing systems without authorization?
Hacking.
What does the acronym “VPN” stand for?
Virtual Private Network.
What does “URL” stand for?
Uniform Resource Locator.
What piece of hardware stores data permanently?
A hard drive (HDD/SDD)?
What is the name of the core program that manages system resources.
The kernel.
What federal law protects the privacy of health information?
HIPAA.
What is a common method to verify user identity online?
two-factor authentication.
Which protocol is used for secure web browsing?
HTTPS.
This Memory type is erased when the computer is turned off.
This is RAM.
What is a popular open source operating system.
Linux.
This term refers to using someone else’s work or code without permission.
plagiarism or copyright infringement.
This type of malware encrypts files and demands payment.
Ransomware.
What is the name for a secret word or phrase used to access information?
Password.
What piece of hardware is responsible for rendering images on your display?
A graphics card or a GPU.
What feature allows multiple users to operate a system independently?
Multi-user support?
What is it called when a company collects user data without proper consent?
A privacy violation.
What is the process of converting data into unreadable form called
Encryption.
This type of test is used to evaluate how secure a system is.
Penetration testing.
what type of hardware card allows a device to connect to the internet wirelessly.
wireless network card (Wi-Fi adapter).
What command in Unix-like systems changes file permissions?
chmod
What is the term for ethically testing systems for vulnerabilities?
White-hat hacking or ethical hacking?
What is the term for manipulating people into revealing confidential information
Social engineering.
A common method used to breach weak passwords through repeated attempts.
The brute force technique.