Hardware
Operating Systems
Security & Safety
Networks
Encryption
100

This component, often called the "brain" of the computer, carries out computations and commands.

CPU

100

Name one of the three most common operating systems.  

Windows, macOS, or Linux

100

This is the process of scrambling data so only authorized parties can access it.

Encryption

100

A type of network that connects devices in a small area, such as a home or office.

LAN (Local Area Network)

100

This process converts plain text into a coded format to prevent unauthorized access.

Encryption

200

This type of memory is short-term and temporarily stores data that the computer needs to retrieve quickly.

RAM

200

This operating system was originally developed by Microsoft and is used on most personal computers.

Windows

200

This type of cyber attack locks a victim’s files and demands payment to restore access.

Ransomware

200

A type of network that spans multiple locations, such as the internet.

WAN (Wide Area Network)

200

This encryption method uses a public key for encryption and a private key for decryption.

Public-key encryption

300

This device keeps the CPU cool and prevents it from overheating.

Cooler/fan

300

This operating system is often used for servers due to its open-source nature and security.

Linux

300

A password attack that tries every possible combination until the correct one is found.

Brute force attack

300

This type of wireless communication allows computers and mobile devices to connect to the internet without cables.

Wi-Fi

300

This simple encryption method shifts letters a fixed number of places in the alphabet.

Caesar cipher

400

This storage device uses flash memory and has no moving parts, making it faster than a traditional hard disk drive.

Solid-State Drive

400

This type of operating system is found on most smartphones and tablets, competing with Android.

iOS

400

The practice of using two different forms of verification to secure an account.

Two-factor authentication (2FA)

400

A network security tool that filters incoming and outgoing traffic to protect against cyber threats.

Firewall

400

In this type of encryption, each letter in a message is replaced with a randomly assigned letter.

Random substitution cipher

500

These slots on a motherboard allow users to upgrade their computer by adding new components like a graphics card.

Expansion slots.

500

What's the main purpose of an OS?

To manage computer hardware and software

500

This type of cyber threat occurs when unauthorized individuals access sensitive or personal information.

Data Breach

500

A device that connects to the internet and helps transfer data between networks.

Modem

500

A secure method of hiding data within other data, such as embedding messages in images.

Steganography

M
e
n
u