Malicious software, such as viruses, worms, or ransomware, designed to damage or gain unauthorized access to computer systems.
What is malware?
This is often called the "brain" of the computer, responsible for executing instructions
What is the CPU (Central Processing Unit)?
A network that connects computers within a limited geographical area, such as a school building or office.
What is a LAN (Local Area Network)?
The smallest unit of data in a computer, represented by either a 0 or a 1.
What is a bit?
This refers to the moral principles and values that guide behaviour related to the use of computers and technology.
What are ethics?
A type of cyber attack where a user is tricked into revealing sensitive information, often through deceptive emails or websites.
What is phishing?
Temporary storage used by the CPU to hold data and instructions that are currently being used; its contents are lost when the power is turned off.
What is RAM (Random Access Memory)?
A network device that connects different networks together and directs data packets between them.
What is a router?
A group of 8 bits, commonly used as the basic unit of computer memory.
What is a byte?
This legal concept protects original works of authorship, such as software code, music, and writing, from being copied without permission
What is copyright?
A security measure that creates a barrier between a trusted internal network and untrusted external networks, filtering traffic based on rules.
What is a firewall?
This component of the CPU fetches instructions from memory and decodes them before execution.
What is the Control Unit?
The set of rules that govern how data is transmitted over the internet, ensuring reliable communication between devices.
What is TCP/IP (Transmission Control Protocol/Internet Protocol)?
This number system uses 16 unique digits (0-9 and A-F) and is often used as a shorthand for binary.
What is hexadecimal?
The principle that individuals have the right to control their personal information and how it is collected, used, and shared online.
What is privacy?
The process of converting data into a secret code to prevent unauthorized access, requiring a key to decrypt it.
What is encryption?
A type of non-volatile storage that uses magnetic fields to store data on spinning platters.
What is a Hard Disk Drive (HDD)?
In this network topology, all devices are connected to a central hub or switch.
What is a star topology?
A standard character encoding system that uses different combinations of bits to represent letters, numbers, and symbols.
What is ASCII or Unicode? (Either is acceptable at this level, as Unicode is a superset of ASCII and more comprehensive).
This refers to the environmental impact of manufacturing, using, and disposing of electronic devices and computer hardware
What is e-waste (or electronic waste)?
This UK law makes it illegal to gain unauthorised access to computer material, including data and programs.
What is the Computer Misuse Act?
A dedicated computer system with a specific function, often part of a larger mechanical or electronic system, like those found in washing machines or cars.
What is an embedded system?
The protocol used by web browsers to request and display web pages, often seen at the beginning of a website's address.
What is HTTP (Hypertext Transfer Protocol)?
The number of pixels per unit of area in a bitmap image, affecting its detail and file size.
What is resolution?
The act of restricting access to certain websites or information online, which can raise ethical questions about freedom of speech.
What is censorship?