What is the WWW
world wide web
CPU
central Processing Unit
Output
Something that the computer sends back out
What are the signs of a phishing email?
●Unexpected email with a request for information
●Message content contains spelling errors
○Text that is hyperlinked to a domain name that you don't recognise
●Generic emails
What is a brute force attack?
Constant attempts to gain entry by using different passwords
Microsoft Powerpoint is useful for making what?
Presentations
RAM
Random Access Memory
Ethernet Cable
Typically, Ethernet cables are used to provide an internet connection, connect devices to a local network
The internet
The largest network in the world?
What is HTML?
Hypertext Markup Language
Microsoft Access is useful for making what?
A database
HDD
Hard Drive Disk
what is .doc
the file extension for a MS Word document
What does HTTP stand for?
Hypertext Transfer Protocol
What is phishing?
A phishing attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
Where are the font settings found in Word, Excel, and Powerpoint?
Home Tab
SSD
Solid State Drive
What is a Peripheral device?
what is An add-on to your computer. (mouse, keyboard)
What is a hacker?
Someone who gains unauthorised access to a computer system
What does Wi-Fi stand for?
Wireless Fidelity
What are the three free Google competitors to Microsoft Word, Powerpoint, and Excel?
Google Docs, Google Slides, and Google Sheets
What is shouldering
An attack designed to steal a victim's password or other sensitive data.
What is blagging?
An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
What is DOS
When the server is overwhelmed with requests it can't cope and the system crashes
What is it called when a hacker “listens” to your internet traffic?
Tapping