This is known as the smallest measure (unit) of data.
What is a Bit?
It is known as the company to develop the first mobile phone.
What is Motorola? The DynaTAC 8000x
The amount of cables under water worldwide?
What are over 400?
Underwater internet cables, also known as submarine communications cables, are the backbone of the global internet, carrying the majority of international data.
The Agent used to remove dust from vents and fans.
What is Compressed Air?
With computers and electronics, compressed air is the preferred method for removing dust and dirt from sensitive electronics.
Derived from SMS the type of cybercrime that uses text messages to divulge personal information.
What is Smishing?
Smishing, a combination of the words "SMS" and "phishing", is a cyber attack that uses text messages to trick people into sharing personal information or downloading malicious software
It has a range of 0.0.0.0 - 255.255.255.255.
What is an IP Address?
This was determined to be the fastest growing web browser in 2020,
What is Microsoft Edge?
Microsoft has absolutely no regrets about gutting its Edge browser and rebuilding it around Chromium, the same underlying engine that powers Google's own Chrome browser.
The year in which the placing of underwater cables began?
What is 1858?
Worldwide telecommunications began somewhere around 150 years ago,by 1858, the first trans-Atlantic telegraph cable connected London with North America when 143 words were transmitted in about 10 hours.
The area or device that needs to be verified when losing power or signal to the PC.6
What is a Cable/Cord Connection?
The physical connection between a computer and another device, or to the ports and sockets used to connect cables to a computer or device.
The area in a web browser to determine if you are at the location of a legitimate web address?
What is the URL?
A URL (Uniform Resource Locator) is a text string that specifies the location of a resource on the internet, such as a web page, image, or video.
This connects devices over a short distance using radio frequency.
The Institution that is credited for creating the first website.
What is CERN?
CERN is an acronym for the European Organization for Nuclear Research, which comes from the French Conseil Européen pour la Recherche Nucléaire:
Underwater cables are about the size of this beverage that comes with a smile.
What is a Soda Can (Coke)?
An underwater cable, also called a submarine cable, is typically about the size of a soda can in diameter, meaning it's several inches thick, especially near the shoreline; in deep ocean sections.
A standard process to keep drivers, programs, applications and OS regulated?
What is Upgrading / System Upgrades?
"Upgrading" or "system upgrades" refers to the process of replacing or enhancing existing hardware or software components within a computer system with newer, better versions to improve its performance, functionality, and capabilities.
Installed on a device after clicking on a link without your knowledge.
What is known as Spyware?
Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
This type of drive device has no moving parts.
What is a SSD (Solid State Drive)?
This University created the first ever Computer Science Department.
What is Purdue University?
The first computer science department was formed at Purdue University in 1962.
What is Mount Everest?
At extreme depths of up to 8,000 meters below sea level (as deep as Mt Everest is tall), the constantly moving cable-layers amazingly have to aim the cable over 16,000 meters behind them, as the cable sinks in at an angle behind the vessel.
The process of removing unnecessary files, applications & using disk cleanup tools is called.
What is Managing Storage?
Storage management is the process of using technologies and techniques to optimize the use of data & storage resources
A standalone malicious program that replicates itself without needing to attach to other software.
What is a Worm?
Worms can spread through email attachments, text messages, file-sharing programs, social networking sites, network shares, removable drives, and software vulnerabilities.
A term that references turning something from readable into un-readable.
What is called Encryption?
DAILY DOUBLE!
The year that the oldest programming language was invented, is still in use today (Bonus* Name of Programming Language)
When is 1957?
('FORTRAN' Formula Translation?)
Fortran is widely considered the oldest programming language still actively used in supercomputing, having been developed in 1957 and specifically designed for scientific and numerical computations.
DAILY DOUBLE!!
The closer this is to _____ the more ______ they are.
What are CABLES and What is VULNERABLE?
Best known practice of rectifying/repairing a PC after it has been compromised.
What is using Anti-Virus Software?
Actively running a computer program designed to detect, quarantine, remove viruses, worms, & trojans from your device, protecting from potential threats by scanning files & systems for suspicious activity and neutralize them.
Disguising itself as a standard recognized program, that has a destructive intent/capability.
What is a Trojan Horse?
a type of malicious software (malware) that disguises itself as a legitimate program to trick users into downloading and executing it, allowing attackers to gain unauthorized access to a system and steal sensitive data, all while appearing harmless.