This OS is known for its penguin mascot.
(Linux)
The physical layer of a network
Hardware
A structured set of data organized for use in a computer system.
(Database)
A high-level programming language known for its use in web development.
JavaScript
The process of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
(Information Security
The core of an operating system responsible for managing hardware and software resources.
(Kernel)
A network that spans a wide geographical area.
WAN
A type of database that stores data in tables.
(Relational Database)
A programming language often used for data science and machine learning.
Python
A type of attack that attempts to overload a system with traffic, making it unavailable to legitimate users.
(Denial-of-Service)
This process allows multiple programs to run seemingly simultaneously.
(Multitasking)
The process of converting data into a format suitable for transmission over a network.
(Encoding)
A unique identifier for each record in a database table.
Primary Key
A programming language known for its use in system programming.
(c)
Describe the concept of network security and common threats.
Network security involves protecting computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. Common threats include malware, phishing, and denial-of-service attacks.
A common type of file system used in Linux and other Unix-like systems.
(ext4)
A unique identifier assigned to each device on a network.
IP Address
The process of retrieving specific data from a database.
(Query)
Explain the concept of object-oriented programming (OOP).
OOP is a programming paradigm based on the concept of "objects," which contain data and methods that operate on that data.
Explain the concept of a VPN and its security benefits.
A VPN (Virtual Private Network) creates a secure, encrypted connection over a public network, protecting data from eavesdropping and unauthorized access.
The process of loading an operating system into computer memory.
(Booting)
A type of network topology where all devices are connected to a central hub or switch.
Star
Explain the difference between ACID properties in database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability. These properties ensure that database transactions are processed reliably.)
Discuss the importance of version control systems in software development.
Version control systems track changes to code over time, allowing developers to collaborate effectively and revert to previous versions if needed.
What is the purpose of a DNS server?
To translate domain names into IP addresses.