This is the brain of the computer.
What is the CPU?
This is the main software that manages a computer’s hardware and software resources
What is an operating system?
This device connects multiple computers in a network.
What is a router?
This is the act of attempting to gain unauthorized access to a system.
What is hacking?
The first step in troubleshooting a computer issue is often to do this
What is restart the computer?)
This type of memory is volatile and is used for temporary data storage.
What is RAM?
This software type allows users to create and edit text documents.
What is a word processor?
This type of network covers a small geographical area, such as a home or office.
What is a LAN?
This security measure requires two forms of authentication.
What is two-factor authentication?
This diagnostic tool shows running processes on a Windows computer.
What is Task Manager?
This hardware component is responsible for rendering images to a display.
What is a GPU?
This is a collection of instructions that tell a computer what to do.
What is a program?
This protocol is used for sending and receiving emails.
What is SMTP?
This type of malware encrypts files and demands payment for decryption
What is ransomware?
This command-line tool tests network connectivity
(What is ping?
This device provides persistent storage and comes in HDD and SSD types
What is a hard drive or solid-state drive?
This type of software protects against malicious programs.
What is antivirus software?
This unique address is assigned to every device on a network.
What is an IP address?
This security measure converts data into unreadable text without a key.
What is encryption?
This type of boot loads only essential system files
What is Safe Mode?
What is a hard drive or solid-state drive?
What is USB?
This is the term for software that is free to use and modify.
What is open-source software?
This type of attack involves overwhelming a network with traffic
What is a DDoS attack?
This is an attack where an unauthorized person intercepts communication between two parties.
What is a man-in-the-middle attack?
This troubleshooting technique involves replacing one component at a time to identify a faulty part.
What is trial and error?