The Information Age
Computer Hardware
Keeping you safe on your computer
To click it or not to click it, that is the question
100

protecting confidential data and information.

Confidentiality

100

A location where you can change display, screen background, time and many other things

settings app

100

Default protection for Windows 10 and Windows 11 systems

Microsoft Defender Firewall

100

involves gathering information about a potential victim.

Reconnaissance

200

is a set of rules or standards you adopt that dictate how you act. As you work with computers, you will be   required to make moral decisions in a variety of situations with many degrees of complexity.

code of ethics
200

holds all deleted files, allowing you to restore them if you later decide that you shouldn't have deleted them.

Recycle Bin

200

allows you to view and configure antivirus software.

Virus & threat protection

200

they are crafted to appear as if they were sent from a legitimate source. The goal is to trick recipients into clicking a link that leads to a fake and malicious website.

Phishing

300

Computer monitors are made up of tiny _ _ and _ lights

RGB Display

300

is currently the most widely used operating system on desktop and notebook devices. was released in October 2021

Windows

300

allows parents to set restrictions to keep their                family safe online.

Family Options

300

use emails to trick the user into providing banking information or sending money to pay fees, and in return, they will receive a much larger amount of money later.

Nigerian scams

400

In 1959  a new technology allowed an entire computer to be built into a single board, rather than needing large modules for each part of the computer.

Microchip

400

application allows you to navigate the file system and manage files and folders, including those on optical disks and external drives. It also lets you manage files on the network and to access cloud storage such as Microsoft OneDrive.                

File Explorer

400

allows you to review the most recent actions by antivirus software and any files that were                quarantined. If you suspect an application was quarantined by mistake, you can release it from this screen.

Protection history

400

when an attacker creates a fake scenario to trick the victim into revealing sensitive information.

Pretexting

500

a way of reducing the size of files, making them easier to store.

Compression

500

located on the right side of the taskbar. It displays the date and time, network connectivity, and notifications from various applications.

Notification Area

500

allows you to manage built-in security options. A couple of examples include secure boot and managing a trusted platform module (TPM).

Device Security

500

involves listening to conversations to obtain sensitive information.

Eavesdropping