Defend Your Base
Hi-Fi for Wi-Fi
Date-a-base
Intel-Robo Style
Media Blasters
100
This method of security is illustrated by the following:
What are biometrics?
100
Wi-Fi is a truncated version of this word.
What is Wireless Fidelity?
100
Information pertaining to one person, product or event
What is a record?
100
A software program that is designed to replicate the decision making process of a human expert.
What is an expert system?
100
This type of program allows someone to edit photos.
What is image processing software?
200
A security protocol that is used to secure 802.11 wireless networks.
What is WEP?
200
This hardware is used to connect computers or devices with network cards to the internet wirelessly.
What is a wireless router?
200
A field containing data that identifies a specific record.
What is a key field?
200
A method to test for artificial intelligence that involves the asking of questions to a computer terminal.
What is the Turing test?
200
The creation of motion from still pictures.
What is animation?
300
A private network that maintains security through the process of encryption while on a public network (such as the internet).
What is a Virtual Private Network?
300
An area that provides internet access wirelessly.
What is a hotspot?
300
The action taken when requesting information in a database.
What is a query?
300
A set of rules for constructing sentences from words.
What is syntax?
300
A program that convert analog video signals into digital data.
What is a video digitizer?
400
This method, implemented by firewalls, moderates incoming and outgoing packets from the internet.
What is Packet Filtering?
400
This Wi-Fi standard is the latest standard to be ratified.
What is 802.11g?
400
This type of database groups data based on commonalities that are present in the data.
What is a relational database?
400
A system of rules for determining and changing the relationship among facts in an artificial intelligence database.
What is a knowledge base system?
400
A higher _________ produces more realistic digital sounds.
What is a sampling rate?
500
Also known as "ethical hackers", these people test the potency of a firewall/security system by using hacker methods to spot potential weak points.
What are white hat hackers?
500
This technology allows for Wi-Fi to be spread across a widespread area.
What is WiMAX?
500
This language is used to program complex queries.
What is SQL (Structured Query Language)?
500
This process breaks a complex job into many smaller simpler jobs, and completes those jobs simultaneously.
What is parallel processing?
500
A picture element on a computer screen or printout
What is a pixel?