Chapter 1&2
Chapter 3&4
Chapter 6&7
Chapter 9
Scramble
100

Text, numbers, sounds, images, and videos are all examples of ___________

What is Data?

100

Gigabyte (GB)= 1 _________Characters

What is Billon?

100

When recipients decrypt data they will ____________ it.

What is Decode?

100

A fitness watch that tracks your heart rate and blood pressure sensors on your body is an example of which type of Network?

What is Body Area Network (BAN)?

100

The Brain of the Computer is called the _____________________

What is Central Processing Unit (CPU)

200

_______________ refers to the process of using computers to perform tasks or solve problems. It involves a range of activities, from basic calculations to complex operations and data processing.

What is Computing?

200

Chrome, Microsoft Edge, Firefox, Opera, and Safari are all examples of  _____________

What is Internet Browsers?

200

__________________ occurs when individuals illegally reproduce software, music, or other creative content without permission

What is Copyright Infringement?

200

A ___________________________initiates an instruction to transmit data, instructions, or information

What is Sending Device?

200

_____________________________ refers to the correctness and reliability of information accessible to users

What is Information Accuracy?

300

________________________ are crucial for connecting users to the internet

What is Internet Service Providers (ISP)?

300

________________ is a measure of the capability of a network to send and receive data

What is Bandwidth?

300

A ____________________ is a legal agreement that allows multiple users to access the software on the server simultaneously

What is Network License?

300

____________________ is the process in which two or more computers or devices transfer data, instructions, and information.

  • What is Digital Communication?
300

A __________________________ is an assault whose purpose is to disrupt computer access to an Internet service, such as the web or email.

What is Denial of Service Attack (DoS Attack)?

400

The Oxide coded plastic storage media is called

What is Mylar?

400

A _____________is a program that performs a repetitive task on a network

What is Bot?

400

______________________________ encompasses technologies used to prevent the unauthorized distribution of digital content

What is Digital Rights Management (DRM)?

400

____________________ refers to the structural layout of a network, describing how various devices, connections, and protocols interact.

What is Network Architecture?

400

The acronym for ARPANET?

What is Advanced Research Project Agency Network?

500

________________ is the electronic components that store instructions waiting to be executed and the data needed by the instructions.

What is Memory?

500

A _______________ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

What is Back Door?

500

An ________________________________ outlines what constitutes appropriate technology use within an organization.

What is Acceptable Use Policy (AUP)?

500

_______________________________ offer additional services like secure data transfer and email management to businesses.

What is Value-Added Networks (VANs)?

500

The encrypted (scrambled) data is called_____________

What is Ciphertext?