This programming language is known for its simplicity and is often used for teaching beginners.
What is Python?
This is a type of software designed to harm or exploit any programmable device.
What is malware?
This device directs data between computer networks and is crucial for the internet to function.
What is a router?
This company was founded by Steve Jobs, Steve Wozniak, and Ronald Wayne in 1976.
What is Apple?
This component of a computer is responsible for executing instructions.
What is the CPU?
HTML is used for structuring web pages. What does HTML stand for?
What is HyperText Markup Language?
This security measure scrambles data to protect it from unauthorized access.
What is encryption?
The standard set of rules for sending data over the internet is called this.
What is TCP/IP?
The first-ever website was created by this organization.
What is CERN?
This type of storage is non-volatile and retains data even when powered off.
What is an SSD (Solid State Drive)?
This version control system is widely used in software development for tracking changes in code.
What is Git?
A cyberattack that floods a network with traffic to make it unavailable is called this.
What is a DDoS attack?
This type of network covers a small geographic area, like a home or office.
What is a LAN (Local Area Network)?
The first computer virus, created in 1986, was called this.
What is the Brain virus?
The Windows Task Manager allows users to do this when a program is unresponsive.
What is end a task?
The process of finding and fixing errors in code is called this.
What is debugging?
This type of hacker has good intentions and helps companies find security vulnerabilities.
What is a white-hat hacker?
This device connects multiple devices within a network but does not route data between networks.
What is a switch?
This operating system, created by Linus Torvalds, is widely used in servers and open-source environments.
What is Linux?
The abbreviation "GUI" stands for this.
What is Graphical User Interface?
In object-oriented programming, this principle refers to restricting access to certain details of an object.
What is encapsulation?
The OWASP Top 10 is a list of critical security risks for what kind of applications?
What are web applications?
The maximum data transfer rate of a network is called this.
What is bandwidth?
This tech pioneer is credited with coining the term “artificial intelligence” in 1956.
Who is John McCarthy?
This Linux command is used to list the contents of a directory.
What is ls?