1
2
3
4
5
100

This device allows graphic designers to edit images with precision

Graphics Tablet

100

This device is commonly used to capture video during online classes

Webcam

100

This device is an essential part of any computer setup, used for typing text and commands.

Keyboard

100

This device is used to display images or data generated by a computer.

Monitor

100

This type of malware allows attackers to control a system remotely

Bot

200

This operating system function involves managing user authentication and access control

Security Management

200

Reinstalling OS from scratch

Clean Install

200

This type of OS is best for running multiple applications at the same time.

Multitasking OS

200

This boot method allows you to install an operating system over the network.

PXE Boot

200

This is a psychological attack that targets human behavior.

Social Engineering

300

This attack involves the encryption of files and demands payment to unlock them.

Ransomware

300

This storage device is known for faster data access and is commonly used in modern computers

SSD

300

This type of attack involves an attacker stealing sensitive data by impersonating a legitimate source.

Phising

300

This type of partition style supports a maximum partition size of 2TB.

MBR Partition Style

300

The process of adding extra security to user logins with something like a code sent to a phone is called what?

Two-Factor Authentication
400

The storage device installed inside a computer unit, often referred to as "fixed", is known as what?

Hard Disk

400

The full form of DNS stands for what in networking?

Domain Name System
400

This is the first step when installing a new operating system on a computer.

Downloading the OS

400

This type of software controls hardware and allows communication with applications.

System Software

400

This type of partition style is required for disks larger than 2TB.

GPT

500

This type of operating system supports real-time operations where the system responds immediately to inputs, often used in critical environments such as aviation and medical systems.  

RTOS
500

This term refers to an attack where malicious software secretly records user activity, often used to capture sensitive information like passwords and credit card details.

Keylogger

500

This tool is designed to assist users in designing and creating images or artwork, allowing for detailed editing and manipulation of digital graphics.

Graphics Software- (ex.Adobe Photoshop)

500

This type of software is responsible for managing the hardware resources of a computer and provides a platform for other applications to run.

System Software

500

This specialized type of computer, designed to handle and process large-scale computations, is often used for tasks like scientific research, simulations, and complex mathematical modeling

Supercomputer

M
e
n
u