Networking Basics
Types of Devices
System Components
Security Concerns
Managing an OS
100

This is a 32-bit address primarily used in LANs

What is an IPv4 address?

100

A mouse, a monitor and a printer are examples of this type of device

What is a peripheral device?

100

In layman's terms this component is considered the brain of the computer

What is the CPU?

100

This type of network lets you make calls, text, and access data while traveling without relying on open Wi-Fi

What is a cellular network?

100

This interface uses icons and point/click interactions

What is a GUI?

200

This is a device that creates networks via wired connections

What is a switch?

200

A touchscreen monitor and a multi-function printer are examples of this type of device

What are input/output devices?

200

This component provides low level control of a computer's hardware. Typically, stored on a small chip using flash memory

What is firmware?

200

This social engineering attack tricks you into giving up sensitive information by pretending to be something you trust over email.

What is Phishing?

200

This Windows tool lets you see which programs and processes are running, and end tasks if something is frozen.

What is Task Manager?

300

This is the most secure and reliable way to connect to a network

What is a wired connection?

300

The four functions that represent the way that data flows through a computer

What is input, processing, output, and storage?

300

A computer can have multiple of this component based on the number of connections needed

What are NICs

300

This type of cyberattack involves an attacker secretly inserting themselves between two communicating parties

What is a Man-in-the-Middle attack?

300

This management tool can be used to setup a RAID configuration or partition a drive

What is Disk Management?

400

This is the standard for WIFI

What is IEEE 802.11?

400

This provides the interface for a user to interact with on a device

What is software

400

This switch, found on the PSU provides compatibility with a country's power grid 

What is the voltage selector?

400

This type of malware locks your files and demands money to unlock them

What is ransomware?

400

This management program is home to both the Event Viewer and Local Users and Groups tools

What is Computer Management?

500

This protocol is used to secure communication between a sender and receiver 

What is SSL/TLS?

500

In computing, these are represented as ones and zeros

What are bits?

500

This type of motherboard port is used exclusively to connect disk drives

What is SATA?

500

This practice involves regularly updating software to fix bugs and security flaws

What is patching?

500

This technology allows a user to run multiple operating systems on the single host machine

What is virtualization?

M
e
n
u