Computer Hardware
Networking & Internet
Cybersecurity
Software
Programming Basics
100

This device allows you to input text into the computer. 

Keyboard 



100

This device connects multiple computers in a local network and directs traffic.

Router 

100

This type of malware can replicate itself and spread to other computers.

Virus

100

Computers process binary numbers, which are composed of ____.

1’s and 0’s

100

This is a set of instructions written for a computer to follow.

A Program

200

This component is known as the “brain” of the computer.

CPU (Central Processing Unit)

200

LAN stands for this.

Local Area Network 


200

A strong password should include letters, numbers, and this.

Special Characters 

200

This type of software helps users perform specific tasks like writing documents or creating spreadsheets.

Excel

200

What is correcting errors in a program called?

Debugging 

300

This hardware stores data permanently, even when the computer is turned off.

Hard Drive (HDD) or Solid State Drive (SDD)

300

This protocol is used to transfer web pages over the internet.

HTTP (HyperText Transfer Protocol)

300

Phishing is a scam where attackers try to steal information by pretending to be this.    

A trusted source or big company 

300

This type of software controls the computer’s hardware and allows other programs to run.

Operating System

300

A variable is used to do this in a program.

Store Data

400

RAM stands for this.

Random Access Memory

400

This type of network covers a large geographic area, like a country.

WAN (Wide Area Network)

400

This security system monitors and controls incoming and outgoing network traffic.

Firewall

400

This software is designed to detect and remove malicious programs.

Antivirus software 

400

This error occurs when the program breaks the rules of the programming language.

Syntax Error

500

This component supplies power to all internal computer parts.

Power Supply Unit (PSU)

500

This unique number identifies a device on a network.

IP Address

500

This method adds an extra layer of security by requiring two forms of verification. 

Two-Factor Authentication

500

This type of software is designed to perform maintenance tasks such as disk cleanup and file compression. 

Utility Software

500

A programming language having a ____ is slow in execution.

Interpreter