What is C.S primarily the study of?
Computers and Computational Systems
What is phishing?
Fraudulent attempts to obtain sensitive information
What is TCP?
Transmission control Protocol
What does HTML stand for?
HyperText Markup Language
Most Cybersecurity breaches happen due to __________?
Human error
What does CPU stand for?
Central Processing Unit
What is the purpose of a 2FA?
To provide an additional layer of security
What are storage devices?
Computing devices that remember information
What does the IOT stand for?
Internet of Things
What does the CIA Triad stand for?
Confidentiality, Integrity, Availability
algorithms
Which number system is used to store information digitally in a computer?
Binary (base 2)
Today there are how many different programming languages?
200
Data+ Computation= __________
Knowledge
What is cybersecurity?
Protection of computer systems, networks, and data from digital attacks
A _________ is a formal language used to communicate with computers
Programming Language
What is the approximate amount of internet traffic per second, as mentioned in the material?
33,489 GB
All information on the internet is sent over_____?
Shared Wires
What is copyright?
Copyright is a form of protection for intellectual property
Given the IP address of 71.819.200.24 what would be the sub network portion of the address?
819
To protect against unauthorized access
Which of the following activities happens the most per second on the internet, based on the data?
Google searches
Which language is friendlier to people?
high level
Which of the following best describes one purpose of the internet?
A way for all machine to communicate with each other
What indicates a secure website?
HTTPS in the URL