Cyber Security
Hackers
Operating Systems
PC Components
Random Tech Information
100

What should you do first if you get hacked on your PC? 

Log off the WI-FI.

100

This type of hacker works to identify security weaknesses to fix them, not exploit them.

White Hat Hacker

100

The operating system developed by Microsoft.

Windows


100

This component is known as the "brain" of the computer.

CPU

100

Who created the Iphone? 

Apple - Steve Jobs


200

A common type of cyberattack where an email appears to come from a trusted source to trick the recipient.

Phishing

200

This is the term for a hacker who acts based on their mood or situation, sometimes helping and sometimes harming.

Grey-hat hacker

200

This open-source operating system is popular among developers and servers.

Linux

200

This type of memory is volatile and stores data temporarily while the computer is on.

RAM

200

The first widely used search engine on the internet.

Yahoo

300

This type of software is designed to harm or disrupt computers.

Malware

300

The term for a hacker who uses their skills for malicious intent.

Black Hat Hacker

300

Apple's operating system for desktop and laptop computers.

MacOS

300

The device responsible for rendering images and videos on your screen.

GPU

300

The year the first iPhone was released.

2007

400

This cybersecurity method involves creating a barrier to keep unauthorized users out of a network.

Firewall. 

400

his hacking technique involves overwhelming a system with traffic to make it unavailable.

DDoS attack

400

The lightweight, fast-operating system designed primarily for mobile devices by Google.

Android

400

This component stores your files and operating system, either as a hard disk or solid-state drive.

Storage or Hard Drive

400

What does WI-FI stand for?

Wireless Fidelity 

500

This type of cyberattack locks users out of their files or systems until a ransom is paid.

Ransomware

500

This term refers to a hacker who exploits vulnerabilities in industrial control systems, such as power plants or water treatment facilities.

Industrial Hacker or infrastructure hacker

500

This operating system is used by 90% of the world’s supercomputers.

Linux

500

This part connects all the components of the computer and allows them to communicate.

Motherboard

500

This company is known for its processors, often found in most PCs.

Intel 

M
e
n
u