Operating Systems
Networking
Databases
Programming Languages
Cyber Security
100

This OS is known for its penguin mascot.

(Linux)

100

The physical layer of a network

Hardware

100

A structured set of data organized for use in a computer system.

(Database)

100

A high-level programming language known for its use in web development.

JavaScript

100

 The process of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

(Information Security

200

 The core of an operating system responsible for managing hardware and software resources.

(Kernel)

200

A network that spans a wide geographical area.

WAN

200

A type of database that stores data in tables.

(Relational Database)

200

A programming language often used for data science and machine learning.

Python

200

 A type of attack that attempts to overload a system with traffic, making it unavailable to legitimate users.

(Denial-of-Service)

300

This process allows multiple programs to run seemingly simultaneously.

(Multitasking)

300

The process of converting data into a format suitable for transmission over a network.

(Encoding)

300

A unique identifier for each record in a database table.

Primary Key

300

A programming language known for its use in system programming.

(c)

300

 Describe the concept of network security and common threats.

 Network security involves protecting computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. Common threats include malware, phishing, and denial-of-service attacks.

400

A common type of file system used in Linux and other Unix-like systems.

(ext4)

400

A unique identifier assigned to each device on a network.

IP Address

400

The process of retrieving specific data from a database.

(Query)

400

Explain the concept of object-oriented programming (OOP).

OOP is a programming paradigm based on the concept of "objects," which contain data and methods that operate on that data.

400

Explain the concept of a VPN and its security benefits.

A VPN (Virtual Private Network) creates a secure, encrypted connection over a public network, protecting data from eavesdropping and unauthorized access.

500

The process of loading an operating system into computer memory.

(Booting)

500

 A type of network topology where all devices are connected to a central hub or switch.

Star

500

Explain the difference between ACID properties in database transactions.

ACID stands for Atomicity, Consistency, Isolation, and Durability. These properties ensure that database transactions are processed reliably.)

500

 Discuss the importance of version control systems in software development.

Version control systems track changes to code over time, allowing developers to collaborate effectively and revert to previous versions if needed.

500

 What is the purpose of a DNS server? 

To translate domain names into IP addresses.

M
e
n
u