Hardware
Software
Internet
Security
Course Materials
100

This input device is used to click on items and navigate through programs on your computer.

What is a mouse?

100

Microsoft Word is an example of this type of software.

What is application software?

100

This is what you open in your browser to visit a website, like "www.google.com".

What is a URL?

100

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system.

What is Malware?

100

The classroom number for this course.

What is HEC 0104?

200

This device connects different networks together and directs internet traffic between them.

What is a router?

200

This tool helps programmers track changes to code and collaborate.

What is version control (or Git)?

200

This is the program you use to access websites, like Chrome or Safari.

What is a web browser?

200

A collection of software tools used by a hacker to mask intrusion and obtain admin-level access to a computer or computer network.

What is Rootkit?

200

This instructor for COP 4910 holds a BS in Computer Science and an MS in Engineering from UCF.

What is Craig Loftin?

300

A type of computer memory  that provides temporary storage for data that the computer is actively using.

What is RAM?

300

This is the practice of hosting and running software over the internet, rather than on a local computer.

What is cloud computing (or Software as a Service - SaaS)?

300

This is a hidden part of the internet that isn't indexed by search engines.

What is the deep web?

300

A type of virus that infects the storage drive area containing the necessary data and code used to start the OS.

What is Boot Sector Virus?

300

Storytelling format used to dissect our textbook chapters.

What is Story Spine?

400

This cooling technology uses a liquid instead of air to dissipate heat from computer components.

What is liquid cooling/water cooling?

400

This type of software testing simulates user behavior without knowledge of the codebase.

What is black-box testing?

400

This protocol is used to transfer web pages securely, and is signaled by a padlock in your browser.

What is HTTPS?

400

A type of attack aimed at exploiting a vulnerability present in already released software, but unknown to the software developer.

What is Zero-Day attack?

400

The story we analyzed during class at the beginning of the semester.

What is The Wizard of Oz?

500

This specialized graphics hardware technology enables real-time light ray simulation to create more realistic shadows, reflections, and illumination in 3D rendering.

What is ray tracing?

500

This secure software development practice involves integrating security checks and practices at every stage of the software development lifecycle.

What is DevSecOps (Development, Security, and Operations)?

500

This system turns domain names like "openai.com" into IP addresses that computers use.

What is DNS (Domain Name System)?

500

Entry fields of web forms lacking input validation are vulnerable to this kind of attack.

What is SQL injection attacks?

500

Professor Loftin’s wife's PhD major.

What is Chemistry?

M
e
n
u