THE PRIMARY OUTPUT DEVICE ON YOUR DESKTOP OR LAPTOP COMPUTER.
MONITOR
MICROSOFT WINDOWS, APPLE MAC OS AND GOOGLE CHROME OS ARE ALL EXAMPLES OF THIS TYPE OF SOFTWARE
A POPULAR SCAMMING TECHNIQUE THAT INVOLVES SENDING FRAUDULENT EMAILS TO RANDOM PEOPLE IN THE HOPES THAT ONE WILL “BITE”
Phishing
A COMMON FORM OF INTERNET CONNECTIVITY THAT REQUIRES NO WIRES BETWEEN YOU COMPUTER AND THE INTERNET SOURCE
Wi-fi
USED TO RESTORE A COMPUTER TO ITS FORMER STATE IN THE EVENT OF A SYSTEM FAILURE
Backup
THE 2 (TWO) PRIMARY INPUT DEVICES ON YOUR LAPTOP OR DESKTOP COMPUTER.
Keyboard and Mouse
THIS IS THE OLDEST FORM OF ONLINE COMMUNICATION.
A COMMON CLASS OF MALICIOUS SOFTWARE THAT SPREADS FROM ONE COMPUTER TO THE NEXT DUE TO THE ACTIONS OF UNEDUCATED USERS.
THE NETWORKING DEVICE THAT ALLOWS YOU TO CONNECT FROM YOUR LOCAL NETWORK TO REMOTE NETWORKS AROUND THE WORLD
Router
THE TERM FOR THE SMALLEST AMOUNT OF DATA A COMPUTER CAN STORE
Bit
THE COMPONENT THAT ACTS AS THE BRAIN OF THE COMPUTER.
CPU OR PROCESSOR
T@$TYC@K322 WOULD BE CONSIDERED A STRONG ONE OF THESE
Password
THE TERM USED TO DESCRIBE THE SUM OF ALL OF A PERSON’S ONLINE ACTIVITIES
Digital Footprint
THE NAME OF THE MOST COMMON FORM OF WIRED NETWORK CABLING
Ethernet
DATA THAT IS STORED ON A HARD DRIVE IS REFERRED TO DATA AT _______
Rest
THE COMPONENT THAT CONVERTS AC ELECTRICITY TO DC ELECTRICITY.
Power Supply
THE .XLSX FILE EXTENSION IS USED TO STORE FILES MADE BY THIS SOFTWARE PROGRAM
Microsoft Excel
SOFTWARE USED TO BLOCK MALICIOUS NETWORK TRAFFIC FROM ENTERING YOUR COMPUTER NETWORK
Firewall
THE ONLINE FORM OF NETWORK WIRING TO USE LASER LIGHT INSTEAD OF ELECTRICITY TO CARRY DATA SIGNALS
Fiber Optics
THE PROGRAMMING LANGUAGE OF DATABASES
SQL
THE DEVICE THAT PROVIDES SHORT-TERM STORAGE IN COMPUTERS, ALLOWING THEM TO RUN MULTIPLE APPLICATIONS AT ONCE.
Ram or Memory
THE FIELD USED TO SEND A COPY OF A EMAIL TO SOMEONE WITHOUT LETTING OTHER EMAIL RECIPIENTS KNOW.
BCC (Blind Carbon Copy)
A FORM OF CYBER ATTACK THAT DEPENDS ON DECEIVING PEOPLE RATHER THAN BYPASSING TECHNOLOGY
Social Engineering
THE STRONGEST FORM OF ENCRYPTION AVAILABLE FOR WIRELESS NETWORKS
WPA 2 (Wi-Fi Protected Access 2)
THE METHOD OF PROTECTING DATA BY USING A STRONG MATH PROBLEM COMBINED WITH SECRET KEY TO SCRAMBLE THE DATA, CONVERTING IT INTO CIPHER TEXT