Vocabulary 1
Vocabulary 2
Information from Reading and Listening
Miscellaneous
100

Graphs, diagrams and maps belong to which data type?

Visual data

100

What is spam?

Unwanted email, usually advertisements

100
The first computer programmer

Ada Lovelace

100

An ancient calculating tool

Abacus

200

Data received via sense of sound

Aural data

200

What means 'legitimate'

Reasonable and acceptable/allowed by law

200

The share of spams in all emails that we receive daily

48%

200

What means BYOD?

Bring your own device

300

Data that is generated or related to touch

Haptic data

300

software designed by criminals to prevent computer users from getting access to their own computer system unless they pay money

Ransomware

300

An example of Ransomware which used fake emails from police about traffic violations. 

CryptoLocker

300

Under whose leadership Microsoft surpassed Apple to become the world's most valuable publicly traded company.

Satya Nadella

400

Computer software that is designed to damage the way a computer works

Malware

400

An attempt to trick a particular person or group into giving private information over the internet, especially by sending emails that seem to be from someone they know

Spear phishing

400

What did Colossus (Turing's machine) use to input data?

Punched tape

400

What is the meaning of word 'obsolete'?

Ancient, historical, old

500

Intended to harm other people 

Malicious

500

a type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or some other innocent party

Spoofing

500

A machine that is used to loom fabrics and simplified the process of manufacturing textiles with such complex patterns, and which led to the development of computer programming

The Jacquard loom machine

500

How much percent of phishing emails infected with ransomware?

93%