This component, often called the "brain" of the computer, carries out computations and commands.
CPU
Name one of the three most common operating systems.
Windows, macOS, or Linux
This is the process of scrambling data so only authorized parties can access it.
Encryption
A type of network that connects devices in a small area, such as a home or office.
LAN (Local Area Network)
This process converts plain text into a coded format to prevent unauthorized access.
Encryption
This type of memory is short-term and temporarily stores data that the computer needs to retrieve quickly.
RAM
This operating system was originally developed by Microsoft and is used on most personal computers.
Windows
This type of cyber attack locks a victim’s files and demands payment to restore access.
Ransomware
A type of network that spans multiple locations, such as the internet.
WAN (Wide Area Network)
This encryption method uses a public key for encryption and a private key for decryption.
Public-key encryption
This device keeps the CPU cool and prevents it from overheating.
Cooler/fan
This operating system is often used for servers due to its open-source nature and security.
Linux
A password attack that tries every possible combination until the correct one is found.
Brute force attack
This type of wireless communication allows computers and mobile devices to connect to the internet without cables.
Wi-Fi
This simple encryption method shifts letters a fixed number of places in the alphabet.
Caesar cipher
This storage device uses flash memory and has no moving parts, making it faster than a traditional hard disk drive.
Solid-State Drive
This type of operating system is found on most smartphones and tablets, competing with Android.
iOS
The practice of using two different forms of verification to secure an account.
Two-factor authentication (2FA)
A network security tool that filters incoming and outgoing traffic to protect against cyber threats.
Firewall
In this type of encryption, each letter in a message is replaced with a randomly assigned letter.
Random substitution cipher
These slots on a motherboard allow users to upgrade their computer by adding new components like a graphics card.
Expansion slots.
What's the main purpose of an OS?
To manage computer hardware and software
This type of cyber threat occurs when unauthorized individuals access sensitive or personal information.
Data Breach
A device that connects to the internet and helps transfer data between networks.
Modem
A secure method of hiding data within other data, such as embedding messages in images.
Steganography