Cybersecurity
UAA Tech Tools
Tech Acronyms
Cutting Edge
Tech Bytes
100

Also known in the medical world, a program that is designed to harm a computer system or network.

What is a virus?

100

Zoom, Teams, and Google all can be used for this common service.

What is web conferencing?

100

PC

What is a Personal Computer?

100

Developed by IBM, this AI was initially developed to answer questions on the quiz show Jeopardy.

Who is Watson?

100

Computer hardware used to point, click, drag, or select.

What is a mouse?

200

This type of cyber attack involves tricking a user into providing sensitive information, such as login credentials or credit card numbers.

What is a phishing attack?

200

Your first online stop for self-service support and ticket submission for IT and Shared Services.

What is the UAA Service Portal?

200

RAM

What is Random Access Memory

200

This emerging AI chatbot, which was developed by startup OpenAI, is making headlines with the novel ways it is being used.

What is ChatGPT?

200

This keyboard addition created in 1999 by Shigetaka Kurity replaced emoticons.

What are emojis?

300

This is the term for a type of malicious software that is designed to lock or encrypt a user's files until a ransom is paid.

What is ransomware?

300

UAA employees can easily download university software through this.

What is the software center?

300

VPN

What is a Virtual Private Network?

300

This computer-generated environment makes a user feel like they are immersed in their surroundings.  

What is virtual reality?

300

This system manages system resources on a computer.

What is the Operating System (OS)?

400

This method of authorization is used to grant a user access to a website or application after verifying their identity on more than one device.

What is Multi Factor Authentication?

400

These two manufacturers are the approved standard computers at UAA.

What is Dell and Apple?

400

CPU

What is the Central Processing Unit?

400

The T1000, aka The Terminator, is a pop culture example of this emerging technology.

What is AI or Artificial Intelligence?

400

This action is a typical first step when trouble shooting a computer problem.

Have you turned if off and turned it back on?

500

This type of attack happens when a hacker attempts to gain unauthorized access to a computer system or network by trying different username and password combinations.

What is brute force attack?

500

UAA’s room scheduling tool

What is 25live?

500

WiFi

What is Wireless Fidelity

500

The name of the Boston Dynamics robot dog.


Who is Spot?

500

This popular operating system launched in 1991 also has it’s own Mascot, Tux, the Penguin.

What is Linux?

M
e
n
u