The act of gaining of unauthorized access to data in a system or computer.
Hacking
Full form of CPU
Central Processing Unit
Microsoft Edge, Google Chrome and Mozilla Firefox are all examples of what?
Browser
This is the smallest unit of storage in a computer.
This number system consists of the digits 0-9 and A-F.
Hexadecimal.
Virus, Ransomware, Spyware, Worm, Trojan, Keystroke Locker, etc.
Name two devices used to listen to music.
A combination of HTML, CSS and JavaScript is commonly used to make what?
Websites
This basic unit of digital information storage is often equivalent to 8 bits. What is it?
Byte
The structure or grammar that a programming language follows is known as?
Syntax.
This practice involves disguising information to make it unreadable for unauthorized users and is commonly used for securing sensitive data.
This memory of the CPU stores data temporarily.
RAM/Cache
These three colors are used to represent all other colors in computer systems.
Red, Blue, Green
This term, often used in programming, refers to a named storage location that holds a value or data. What is it?
Variable
Assembly Language and Machine Language are examples of what type of programming language?
Low Level Programming Language
This security system reads incoming internet traffic and decides whether to block a network or not.
Firewall
This traditional storage device uses spinning disks to store data magnetically. What is it?
Hard Disk Drive (HDD)
What does the "S" in HTTPS represent?
Security/Secured
How many Megabytes is 1 Kilobyte.
This term in programming refers to a named block of code that performs a specific task and can be reused throughout a program. What is it?
Function/Procedure/Subroutine
This type of attack involves overwhelming a system or network with traffic to disrupt its normal functioning. What is it called?
DDoS (Distributed Denial Of Service) Attack
This component, commonly equipped with fans or liquid cooling, prevents the CPU from overheating. What is it?
Heat Sink
The ROM of the computer contains what kind of information?
Information to start/boot the computer // Bootstrap loader // Information to start the operating system
Unlike classical bits, which can be either 0 or 1, these quantum counterparts can exist in multiple states simultaneously. What are they called?
Qubits
This data structure follows the Last In, First Out (LIFO) principle and is often used for managing function calls and expressions. What is it?
Stack