I am the brain of the computer and in charge of processing.
CPU
I connect computers within 1 single LAN
A switch
.....................is a subfield of Artificial intelligence
Machine Learning
What is software (or hardware) designed to block unauthorized access to or from a private network?
A firewall
I am like Mr. Z's desk. The info. will not stay permanently once desk cleared
RAM
I connect devices between 2 or more LANs
Router
AI will replace .......... jobs globally by ........
A/ 92 million, 2030
B/ 85 thousand, 2026
C/ 75 million, 2050
D/ 1.5 billion, 2027
A/ 92 million, 2030
What type of malware encrypts files on a victim's computer and demands payment for their release?
Ransomware
What do computers eat for snacks?
Microchips!
(or data)
(or binaries)
What do you call a networking party for routers?
a/ LAN
b/WAN
c/ SOHO
d/MAN
b/WAN
I am one of the new automation tools. The most famous one to create an agent. In fact, Mr. Z mentioned me many times for the poster project.
n8n
What do we call the process of protecting information by encoding it into an unreadable format that can only be decoded by authorized parties?
a/Brute Force
b/Hashing
c/Encryption
d/Decryption
c/Encryption
How does a computer take a break?
It "logs off"!
(or shutdown)
What type of cable is commonly used to connect a computer to a router or switch?
An ethernet cable
What term describes the ability of an AI system to understand, interpret, and generate human-like language?
a/Natural Language Processing (NLP)
b/Natural Machine Processing (NMP)
c/Artificial Neural Networks (ANN)
d/Artificial General Intelligence (AGI)
a/Natural Language Processing (NLP)
What is the term for a malicious software program that disguises itself as legitimate software to gain access to a system's resources?
a/Trojan horse or Trojan.
b/Intrusion Detection System.
c/Hacktivist
d/Ethical Hacking
a/Trojan horse or Trojan.