The smallest unit of data a computer can read
What is a Bit
The main board of a computer. It's fundamental job is to connect all other hardware and communicate them with each other.
What is Motherboard
Costing nearly $4000, weighing 1.1KG, offering a stunning 30m of talk time and taking over 10 hours to charge. This is the first commercially available mobile phone. Affectionately named "The Brick"
What is Dynatec 8000x
This is the term for a cyberattack that pretends to be a message from a trusted source to steal your personal info.
What is Phishing
Everything we do online leaves a data trail that can be easily traced.
Digital Footprint
in 1956 this computer manufacturer created the FIRST Harddrive and it weight about a ton. it stored up to 5BM of data.
What is IBM
The "Brain" of the computer
What is CPU or Processor
Sent in 1992, for the first time ever, this groundbreaking communication simply wished someone a "Merry Christmas."
What is a Text or SMS
This type of MALWARE encrypts your data on your computer or network. Holding the device for "Ransom"
What is Ransomeware
This process turns your data into a "secret code" that only the right person can read. It scrambles the information during transmission and unscrambles after provided the key
What is Encryption
In 1995, Sony, Philips, Panasonic, and Toshiba introduced this digital optical disc format, set to replace VHS.
hint: stores 4.79GB of data.
What is DVD
This computer component uses a disk that is read by a mechanical arm and needle just like a record player. It is the slowest form of modern storage currently compared to the alternatives
What is a HDD
Released in 1994, this IBM device is widely recognized as the first true smartphone, combining a mobile phone with PDA features like email and a touchscreen
What is: Simon Personal Communicator
This type of cyber threat involves manipulating people by using time pressure, emotional motivation, and clear expectations to trick them into revealing sensitive information.
What is social engineering?
This tool safely manages your complex and strong passwords will be readily available so you wont have to remember them.
What is Password Manager
Freeing users from physical hard drives and USB sticks, this method of data preservation gained significant traction starting in 2006 when amazon launched this service.
Cloud Storage
This type of graphics are built into the processor and share the processors memory, trading cost for efficiency.
what is integrated graphics
Debuting in 2017, this device was the first flagship Apple phone to ditch the home button in favor of a new biometric security system called Face ID.
What is iPhone 10
This term describes a weakness in a system that could be exploited by a threat actor to gain unauthorized access or cause harm.
What is Vulnerability
Never provide sensitive information over an unsecured network, this makes it easy for criminals to steal from you , unless you have one of these
What is VPN
This method of inputting data from punch cards or documents uses light to detect marks or holes.
What is Photoelectric Scanning
___ is Volatile memory that is erased each time the computer is restarted. The more ____ you have the more tasks your computer can preform at one time.
What is RAM
The Pantech GI100 in 2004 was among the first cellphones to incorporate this biometric feature, allowing users to unlock their device with a touch of their digit.
Fingerprint Scanning function
A ___ Phishing attack
is when the message is specially crafted that would make sense to you. It is specific to you and your environment.
What is Spear
The "Gold" Standard of Authentication.
hint: Having a safe that requires more than one key to open the vault. If a person steals one key, they cannot get in without the second.
Multifactor Authentication