Computer hardware
Operating systems
Ethics
Security
Misc
100

What is the primary function of the CPU?

Processing instructions.

100

What OS is developed by Microsoft.

Windows.

100

What is the term for accessing systems without authorization?

Hacking.

100

What does the acronym “VPN” stand for?

Virtual Private Network.

100

What does “URL” stand for?

Uniform Resource Locator.

200

What piece of hardware stores data permanently?

A hard drive (HDD/SDD)?

200

What is the name of the core program that manages system resources. 

The kernel.

200

What federal law protects the privacy of health information?

HIPAA.

200

What is a common method to verify user identity online?

two-factor authentication.

200

Which protocol is used for secure web browsing?

HTTPS.

300

This Memory type is erased when the computer is turned off.

This is RAM.

300

What is a popular open source operating system.

Linux.

300

This term refers to using someone else’s work or code without permission.

plagiarism or copyright infringement.

300

This type of malware encrypts files and demands payment.

Ransomware.

300

What is the name for a secret word or phrase used to access information?

Password.

400

What piece of hardware is responsible for rendering images on your display?

A graphics card or a GPU.

400

What feature allows multiple users to operate a system independently?

Multi-user support?

400

What is it called when a company collects user data without proper consent?

A privacy violation.

400

What is the process of converting data into unreadable form called

Encryption.

400

This type of test is used to evaluate how secure a system is.

Penetration testing.

500

what type of hardware card allows a device to connect to the internet wirelessly.

 wireless network card (Wi-Fi adapter).

500

What command in Unix-like systems changes file permissions?

 chmod

500

What is the term for ethically testing systems for vulnerabilities?

White-hat hacking or ethical hacking?

500

What is the term for manipulating people into revealing confidential information

Social engineering.

500

A common method used to breach weak passwords through repeated attempts.

The brute force technique.