Computer History
Ways a computer can become compromised
LAN, MAN, WAN
Extra
100

Early computers were large, shared systems with no _____.

real security

100

What is Malware?

Malicious software

100

What is LAN?

Local Area Network

100

What is Amplitude?

the height or strength of awave — it measures how much energy thewave carries.

200
  • As time-sharing systems emerged, ______________ were introduced to separate user data.

passwords and user authentication

200

What is a Virus / Worm?

replicating code that corrupts files or spreads across networks.

200

What is MAN?

Metropolitan Area Network

200

What does Antivirus/Antimalware Software do?

Detect andremove malicious programs.

300

The rise of personal computers and early networks led to the first __________ programs.

  • first viruses and antivirus

300

What is a Trojan?

disguised as legitimate software but gives attackers access.

300

What is WAN?

Wide Area Network

300

What do Firewalls do?

Block unauthorized access to internal networks.

400

The internet boom created new threats like hacking, phishing, and malware;________ became essential.

 firewalls and encryption

400

What is Ransomware?

encrypts files and demands payment to unlock them.

400

What is an example of LAN?

School computer lab, home Wi-Fi

400

What is a DDOS attack?

a cyberattack that floods a website, server, or network with an overwhelming amount of fake internet traffic, making it slow down or crash.

500
  • Focus has shifted to cloud security, AI-based threat detection, and ________ architecture to protect data in highly connected environments.

zero-trust

500

What does Rootkit / Bootkit do?

 hide malicious processes deep in OS/boot chain.

500

What is an example of WAN?

The Internet itself is the biggest WAN

500

What were computers like in 1995?

Big, heavy

Dial-up (slow)

Manual, with disks

M
e
n
u