Internet Security
Hardware
Software
Computer Storage Units
Programming
100

The act of gaining of unauthorized access to data in a system or computer. 



Hacking

100

Full form of CPU

Central Processing Unit


100

Microsoft Edge, Google Chrome and Mozilla Firefox are all examples of what?

Browser

100

This is the smallest unit of storage in a computer. 

A bit.
100

This number system consists of the digits 0-9 and A-F. 

Hexadecimal.

200
Name 3 Types of Malware

Virus, Ransomware, Spyware, Worm, Trojan, Keystroke Locker, etc.

200

Name two devices used to listen to music.

Headphone, Speaker, etc.


200

A combination of HTML, CSS and JavaScript is commonly used to make what?

Websites 

200

This basic unit of digital information storage is often equivalent to 8 bits. What is it?

Byte

200

The structure or grammar that a programming language follows is known as?

Syntax.

300

This practice involves disguising information to make it unreadable for unauthorized users and is commonly used for securing sensitive data.

Encryption


300

This memory of the CPU stores data temporarily.

RAM/Cache

300

These three colors are used to represent all other colors in computer systems.

Red, Blue, Green

300

This term, often used in programming, refers to a named storage location that holds a value or data. What is it?

Variable

300

Assembly Language and Machine Language are examples of what type of programming language?

Low Level Programming Language

400

This security system reads incoming internet traffic and decides whether to block a network or not.

Firewall

400

This traditional storage device uses spinning disks to store data magnetically. What is it?

Hard Disk Drive (HDD)

400

What does the "S" in HTTPS represent? 

Security/Secured

400

How many Megabytes is 1 Kilobyte.

1/1000
400

This term in programming refers to a named block of code that performs a specific task and can be reused throughout a program. What is it?

Function/Procedure/Subroutine

500

This type of attack involves overwhelming a system or network with traffic to disrupt its normal functioning. What is it called?

DDoS (Distributed Denial Of Service) Attack

500

This component, commonly equipped with fans or liquid cooling, prevents the CPU from overheating. What is it?

Heat Sink


500

The ROM of the computer contains what kind of information?

Information to start/boot the computer // Bootstrap loader // Information to start the operating system

500

Unlike classical bits, which can be either 0 or 1, these quantum counterparts can exist in multiple states simultaneously. What are they called?  

Qubits

500

This data structure follows the Last In, First Out (LIFO) principle and is often used for managing function calls and expressions. What is it?

Stack

M
e
n
u