Systems Architecture
Memory and Storage
Computer Networks
Network Connections and Protocols
Network Security
100

To execute instructions through the fetch-decode-execute cycle.

What is the main function of the CPU?

100

One is directly accessible by the CPU, while the other is used for long-term data storage.

What is the difference between primary and secondary storage?

100

It is a network covering a small geographical area

What is a LAN?

100

This is a set of networking protocols that enable communication over the internet

What is TCP/IP?

100

This filters incoming and outgoing network traffic for security

What is a firewall?

200

It connects all components of a computer and allows communication between them.

What is the purpose of the motherboard?

200

It stores data magnetically on spinning disks.

What is a hard disk drive?

200

One is limited to a small area, while the other spans large distances

What is the difference between a LAN and a WAN?

200

This involves devices requesting services from a centralised resource

What is the client-server model in networking?

200

This secures data by converting it into a coded format that only authorized users can read

What is encryption?

300

One is volatile memory used for temporary data storage, while the other is non-volatile and stores firmware

What are the differences between RAM and ROM?

300

It is a section of the hard drive used as RAM when physical memory is full.

What is virtual memory and why is it used?

300

It connects different networks and directs data packets between them

What is the function of a router?

300

They include HTTP, FTP, SMTP, IMAP, UDP

What are common network protocols used in the internet?

300

It provides a secure, encrypted connection over the internet

What is a VPN?

400

It is a small, high-speed memory located close to the CPU that stores frequently accessed data.

What is cache memory?

400

It is non-volatile storage used in SSDs, USB drives, and memory cards

What is flash memory?


400

One of these two uniquely identifies a device on a network, and the other defines its network segment

What is the meaning of the terms IP address and subnet mask?

400

This transfers web data, while the other one adds encryption for security

What is the difference between HTTP and HTTPS?

400

These include malware, phishing, and denial-of-service attacks.

What are common types of cyber threats?

500

It is a computer design model that uses a single memory for both instructions and data.

What is the Von Neumann architecture?

500

It is used to manage multiple storage drives for redundancy and performance improvements

What is the role of a RAID system?

500

This server assigns IP addresses automatically to devices

What is the role of a DHCP server?

500

This translates domain names into IP addresses

What is the purpose of DNS in networking?

500

This verifies user identity to prevent unauthorized access

What is user authentication?

M
e
n
u