Computer Security
Software
Hardware
The Internet
Keyboard Shortcuts
100
This is a general term for software that is intended to damage a computer, mobile device, or network, or to take partial control over its operation.
What is malware?
100
This kind of software consists of a set of programs that directs a computer's operations and manages all the other programs in a computer.
What is an operating system?
100
In a desktop computer, this is the case that contains the major components such as the processor, hard drive, RAM, and power supply unit. It is separate from the monitor, keyboard, and mouse.
What is the tower? (aka "chassis" or cabinet)
100
The internet has its roots in a networking project created by this part of the U.S. government (bonus: what was the original network called?).
What is the Dept. of Defense / "ARPANET"?
100
Copy
What is CTRL-C?
200
A self-replicating computer program that penetrates an operating system with the intent of spreading malicious code. They use networks to send copies of themselves to other computers.
What is a worm?
200
Programs designed to make users more productive and/or assist them with personal tasks.
What is application software ("apps")
200
A computer dedicated to providing one or more services to other computers or devices on a network. The services might include storing content and controlling access to software and other resources on a network.
What is a server?
200
A business that provides individuals and organizations access to the internet free or for a fee.
What is an ISP?
200
Paste
What is CTRL-V?
300
A system designed to prevent unauthorized access to or from a network based on specified criteria. May be implemented using hardware or software.
What is a firewall?
300
Installing and using an unauthorized copy of software might violate this kind of intellectual property.
What is copyright?
300
The general name for auxiliary devices such as a mouse or keyboard that connects to a computer and is not part of the essential computer.
What are peripherals / peripheral devices?
300
.com, .edu, and .gov are examples of this.
What is a top-level domain?
300
Select all
What is CTRL-A?
400
This kind of security is based on verification of an individual's physical characteristics. It can be implemented on laptops, hard drives, and other devices.
What is biometric?
400
Software that enables users with an internet connection to access and view webpages on a computer or mobile device.
What is a browser?
400
The points at which peripheral devices attach to or communicate with computers or mobile devices.
What are ports?
400
The address for a resource or document on the world wide web (such as http://www.facebook.com).
What is a url (uniform resource locator)?
400
Cut
What is CTRL-X?
500
A scam in which a perpetrator sends an official-looking email message that attempts to obtain your personal and/or financial information.
What is phishing?
500
You must do this in order to remove a program from your computer.
What is uninstall it?
500
The most widely used hardware interface for attaching peripherals to a computer.
What is a USB port?
500
An environment of servers that house and provide access to resources users access through the internet.
What is the cloud / cloud computing?
500
Save
What is CTRL-S?
M
e
n
u