PC Hardware
Digital Literacy
Security Awareness
Computer Networks
Data Management
100

THE PRIMARY OUTPUT DEVICE ON YOUR DESKTOP OR LAPTOP COMPUTER.

MONITOR

100

MICROSOFT WINDOWS, APPLE MAC OS AND GOOGLE CHROME OS ARE ALL EXAMPLES OF THIS TYPE OF SOFTWARE

Operating system
100

A POPULAR SCAMMING TECHNIQUE THAT INVOLVES SENDING FRAUDULENT EMAILS TO RANDOM PEOPLE IN THE HOPES THAT ONE WILL “BITE”

Phishing

100

A COMMON FORM OF INTERNET CONNECTIVITY THAT REQUIRES NO WIRES BETWEEN YOU COMPUTER AND THE INTERNET SOURCE

Wi-fi

100

USED TO RESTORE A COMPUTER TO ITS FORMER STATE IN THE EVENT OF A SYSTEM FAILURE

Backup

200

THE 2 (TWO) PRIMARY INPUT DEVICES ON YOUR LAPTOP OR DESKTOP COMPUTER.

Keyboard and Mouse

200

THIS IS THE OLDEST FORM OF ONLINE COMMUNICATION.  

Email

200

A COMMON CLASS OF MALICIOUS SOFTWARE THAT SPREADS FROM ONE COMPUTER TO THE NEXT DUE TO THE ACTIONS OF UNEDUCATED USERS.

Virus
200

THE NETWORKING DEVICE THAT ALLOWS YOU TO CONNECT FROM YOUR LOCAL NETWORK TO REMOTE NETWORKS AROUND THE WORLD

Router

200

THE TERM FOR THE SMALLEST AMOUNT OF DATA A COMPUTER CAN STORE

Bit

300

THE COMPONENT THAT ACTS AS THE BRAIN OF THE COMPUTER.

CPU OR PROCESSOR

300

T@$TYC@K322 WOULD BE CONSIDERED A STRONG ONE OF THESE

Password

300

THE TERM USED TO DESCRIBE THE SUM OF ALL OF A PERSON’S ONLINE ACTIVITIES

Digital Footprint

300

THE NAME OF THE MOST COMMON FORM OF WIRED NETWORK CABLING

Ethernet

300

DATA THAT IS STORED ON A HARD DRIVE IS REFERRED TO DATA AT _______

Rest

400

THE COMPONENT THAT CONVERTS AC ELECTRICITY TO DC ELECTRICITY.

Power Supply

400

THE .XLSX FILE EXTENSION IS USED TO STORE FILES MADE BY THIS SOFTWARE PROGRAM

Microsoft Excel

400

SOFTWARE USED TO BLOCK MALICIOUS NETWORK TRAFFIC FROM ENTERING YOUR COMPUTER NETWORK

Firewall

400

THE ONLINE FORM OF NETWORK WIRING TO USE LASER LIGHT INSTEAD OF ELECTRICITY TO CARRY DATA SIGNALS

Fiber Optics

400

THE PROGRAMMING LANGUAGE OF DATABASES

SQL

500

THE DEVICE THAT PROVIDES SHORT-TERM STORAGE IN COMPUTERS, ALLOWING THEM TO RUN MULTIPLE APPLICATIONS AT ONCE.

Ram or Memory

500

THE FIELD USED TO SEND A COPY OF A EMAIL TO SOMEONE WITHOUT LETTING OTHER EMAIL RECIPIENTS KNOW.

BCC (Blind Carbon Copy)

500

A FORM OF CYBER ATTACK THAT DEPENDS ON DECEIVING PEOPLE RATHER THAN BYPASSING TECHNOLOGY

Social Engineering

500

THE STRONGEST FORM OF ENCRYPTION AVAILABLE FOR WIRELESS NETWORKS

WPA 2 (Wi-Fi Protected Access 2)

500

THE METHOD OF PROTECTING DATA BY USING A STRONG MATH PROBLEM COMBINED WITH SECRET KEY TO SCRAMBLE THE DATA, CONVERTING IT INTO CIPHER TEXT

Encryption
M
e
n
u