designs, builds, tests, and maintains software applications, using programming languages to solve problems and create tools for web, mobile, or desktop
What is a software developer
A structured collection of data that can be easily accessed, managed, and updated is known as this.
What is a database?
This type of network connects computers over large distances, such as cities or countries.
What is a WAN?
This three-letter acronym refers to the address of a website
What is URL
these unwanted messages fill your inbox with advertisements or scams
what is spam
Ensures connectivity, security, and performance by installing, configuring, and maintaining hardware
What is a network administrator
This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a firewall
This type of software is designed to help users perform specific tasks, such as word processing or graphic design.
What is application software?
This device connects multiple devices on a local network and often includes Wi‑Fi.
what is a router
This programming language, often used for web development, is known for its ability to create interactive effects within web browsers.
What is JavaScript?
This term refers to the delivery of computing services over the internet.
What is cloud computing
This term describes the network of physical devices connected to the internet that can collect and exchange data
What is internet of things?
This operating system is known for its command-line interface and is widely used by developers and system administrators.
What is Linux?
This secret string of characters is used to verify your identity when logging in.
what is security password
This type of software is used to manage and organize files on a computer, allowing users to create, edit, and delete documents.
What is a file management system?
The purpose of this type of software is to detect and remove malicious programs from a computer
what is antivirus software
This term refers to the simulation of human intelligence processes by machines, and one application is virtual personal assistants.
What is artificial intelligance
This term describes the practice of keeping personal information private while using the internet.
What is online privacy?
This three-letter file extension is commonly used for images, such as digital photos.
what is jpg
This term refers to a set of rules that govern data communication over a network.
What is a protocol?
This term refers to the physical components of a computer, such as the CPU and RAM.
What is hardware
This field is crucial for protecting systems, networks, and data from cyber threats.
What is cyber security
This type of software helps manage the hardware and provides a platform for applications to run.
What is system software?
this device lets you move a pointer on the screen and click on icons and buttons.
what is a mouse
This type of attack involves tricking users into providing sensitive information by masquerading as a trustworthy entity.
What is phishing?