This is the breaking down of a significant problem into smaller sub-problems.
Decomposition
The number of possible combinations with 6 bits
64
The three storage methods used with secondary storage
Magnetic, Optical, & Solid State
Forms the acronym WAN
Wide Area Network
These two words combine together to form the word 'malware'
Malicious Software
Removing unnecessary detail from a problem so you can focus on the essentials
Abstraction
Splitting a byte into these help translate binary into hexidecimal
Nibbles
One of four areas of management that an operating system handles
File, Process, Peripheral, & User
This is the unit ISPs state for bandwidth speeds
Megabit / Mb
The term used when manufacturers design products to fail after a certain period of time
Planned Obsolescence
This type of search is also know as 'divide & conquer' and requires data be sorted before it can be run
Binary Search
109 in Two's Complement (answer in binary)
1001 0011
The three buses that are used with the CPU
Address, Data, and Control Bus
When transferring data across a network, a file is broken up into these
This type of malware holds a computer hostage by locking or encrypting data
Ransomware
This type of table shows the output from all possible combinations of inputs from a Boolean expression
Truth Table
These two words form the word 'pixel'
Picture Element
One of two translation methods when turning a high-level program into machine code
Interpreter or Compiler
This particular network topology has all devices connect to a central switch
Star
This act requires organisations to keep only relevant data on people and justify why they have it
Data Protection Act (2018)
The three types of logic gates used with binary logic
AND, OR, & NOT
The length of time between two measured points of an audio file
Sample Interval
Von Neumann
(Partial) Mesh
Proprietary Software