When your VM won’t boot, this is the first thing you should do.
Check power and restart
Ping works but websites don’t load—this might be the problem.
A DNS or browser issue
Malformed input can lead to this database vulnerability.
SQL Injection
When a file’s checksum doesn’t match, this might have happened.
Corruption or tampering
Turning in an AI‑written essay without citation creates this issue.
Plagiarism
This firmware feature ensures only trusted OS software loads.
Secure Boot
This initial process in HTTPS securely exchanges encryption keys.
Handshake
This process organizes data to reduce redundancy.
Normalization
MD5 differs from SHA‑256 mainly in this way.
Strength (MD5 is weaker and more collision prone)
This happens when a prompt reveals sensitive information.
Prompt leakage
This technology creates a safe, isolated environment for labs.
Virtualization
This attack redirects users to fake websites.
DNS spoofing
This Python statement prints the sum of two variables a and b.
print(a+b)
You can’t recover encrypted files without this.
The key
Deepfakes threaten security by creating these.
Fake videos or voices
This core component of an OS manages system resources.
The Kernel
Packet routing happens at this layer of the OSI model.
The network layer
Hashes always produce this, no matter the input size.
Fixed-length output
This encryption type secures emails using public/private keys.
Asymmetric encryption
You can detect AI content by checking for these clues.
Inconsistencies or metadata
This determines how access rights propagate to subfolders.
Permission inheritance
A safe Wi‑Fi plan uses a unique SSID, WPA3, and these kinds of channels.
Non-overlapping channels
A database with fields for ID, Name, and Major is an example of this.
Schema
This ensures that lost or stolen keys don’t compromise data.
Key management
This classroom rule encourages honesty in AI use.
Cite AI and verify information