Hardware
Software
Networking
Cybersecurity
IT Troubleshooting
100

This is the brain of the computer.

What is the CPU?

100

This is the main software that manages a computer’s hardware and software resources

What is an operating system?

100

This device connects multiple computers in a network.

What is a router?

100

This is the act of attempting to gain unauthorized access to a system.

What is hacking?

100

The first step in troubleshooting a computer issue is often to do this

What is restart the computer?)

200

This type of memory is volatile and is used for temporary data storage.

What is RAM?

200

This software type allows users to create and edit text documents.

What is a word processor?

200

This type of network covers a small geographical area, such as a home or office.

What is a LAN?

200

This security measure requires two forms of authentication.

What is two-factor authentication?

200

This diagnostic tool shows running processes on a Windows computer.

What is Task Manager?

300

 This hardware component is responsible for rendering images to a display.

What is a GPU?

300

This is a collection of instructions that tell a computer what to do.

What is a program?

300

This protocol is used for sending and receiving emails.

What is SMTP?

300

This type of malware encrypts files and demands payment for decryption

What is ransomware?

300

This command-line tool tests network connectivity

(What is ping?

400

 This device provides persistent storage and comes in HDD and SSD types

What is a hard drive or solid-state drive?

400

 This type of software protects against malicious programs.

What is antivirus software?

400

This unique address is assigned to every device on a network.

What is an IP address?

400

This security measure converts data into unreadable text without a key.

What is encryption?

400

This type of boot loads only essential system files

What is Safe Mode?

500

What is a hard drive or solid-state drive?

What is USB?

500

This is the term for software that is free to use and modify.

What is open-source software?

500

This type of attack involves overwhelming a network with traffic

What is a DDoS attack?

500

This is an attack where an unauthorized person intercepts communication between two parties.

What is a man-in-the-middle attack?

500

This troubleshooting technique involves replacing one component at a time to identify a faulty part.

What is trial and error?