Hardware & OS
Networking
Data & Code
Security & Encryption
AI & Ethics
100

When your VM won’t boot, this is the first thing you should do.

Check power and restart

100

Ping works but websites don’t load—this might be the problem.

A DNS or browser issue

100

Malformed input can lead to this database vulnerability.

SQL Injection

100

When a file’s checksum doesn’t match, this might have happened.

Corruption or tampering

100

Turning in an AI‑written essay without citation creates this issue.

Plagiarism

200

This firmware feature ensures only trusted OS software loads.

Secure Boot

200

This initial process in HTTPS securely exchanges encryption keys.

Handshake

200

This process organizes data to reduce redundancy.

Normalization

200

MD5 differs from SHA‑256 mainly in this way.

Strength (MD5 is weaker and more collision prone)

200

This happens when a prompt reveals sensitive information.

Prompt leakage

300

This technology creates a safe, isolated environment for labs.

Virtualization

300

This attack redirects users to fake websites.

DNS spoofing

300

This Python statement prints the sum of two variables a and b.

print(a+b)

300

You can’t recover encrypted files without this.

The key

300

Deepfakes threaten security by creating these.

Fake videos or voices

400

This core component of an OS manages system resources.

The Kernel

400

 Packet routing happens at this layer of the OSI model.

The network layer

400

Hashes always produce this, no matter the input size.

Fixed-length output

400

This encryption type secures emails using public/private keys.

Asymmetric encryption

400

You can detect AI content by checking for these clues.

Inconsistencies or metadata

500

This determines how access rights propagate to subfolders.

Permission inheritance

500

A safe Wi‑Fi plan uses a unique SSID, WPA3, and these kinds of channels.

Non-overlapping channels

500

A database with fields for ID, Name, and Major is an example of this.

Schema

500

This ensures that lost or stolen keys don’t compromise data.

Key management

500

This classroom rule encourages honesty in AI use.

Cite AI and verify information

M
e
n
u