Computer Hardware
Operating systems
Ethics
Security
Inventions
100

What does network mean?

A group or system of interconnected people or things.

100

What is the Operating Systems main function?

To manage the computer resources

100

What is phishing?

When hackers try and trick you into giving them personal information.

100

What is an anti-virus?

A piece of software designed to detect and destroy computer viruses

100

Who painted the Mona Lisa?

Leonardo Da Vinci 

200

What is a Bandwidth?

How much data you can move.

200

What is an Operating System?

A program that manages the computers hardware and software.

200

Why is it important to have a strong password?

To protect your accounts and data from hackers.

200

What is a data breach?

A security incident where sensitive or confidential information is accessed by unauthorized individuals

200

Who invented the Tesla car?

Martin Eberhard and Marc Tarpenning

300

What is a computer hardware?

The physical components of a computer system that you can see and touch

300

What is a virtual memory?

What allows the OS to use more memory available by swapping data.

300

What is a Firewall?

A network designed to to block unauthorized access.

300

What does VPN stand for?

Virtual Private Network

300

Who Invented the first cellphone?

Martin Cooper

400

What does RAM stand for?

Random Access Memory

400

What are the four main Operating Systems?

Windows, macOS, Linux, and Chrome OS

400

What are the 5 Cs of cybersecurity? 

Change, Compliance, Cost, Continuity, and Coverage

400

What is malware?

Malware/malicious software is a general term for software designed to cause harm, such as viruses, trojan horses, etc.

400

Who invented the motherboard?

Patty McHugh

500

What is the main difference between RAM and ROM?

Ram is volatile, so it loses data when off, ROM can continue to retain data when off. 

500

Is an Operating System an hardware or software?

Software

500

What is Pharming?

A cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the victim's computer in order to gain access to it.

500

 Explain the concept of zero-day vulnerabilities:

Zero-day vulnerabilities are weaknesses in software or hardware that are unknown to the vendor and haven't been patched

500

Extra 500 who built the Tesla? (brand)

Elon Musk