This is a 32-bit address primarily used in LANs
What is an IPv4 address?
A mouse, a monitor and a printer are examples of this type of device
What is a peripheral device?
In layman's terms this component is considered the brain of the computer
What is the CPU?
This type of network lets you make calls, text, and access data while traveling without relying on open Wi-Fi
What is a cellular network?
This interface uses icons and point/click interactions
What is a GUI?
This is a device that creates networks via wired connections
What is a switch?
A touchscreen monitor and a multi-function printer are examples of this type of device
What are input/output devices?
This component provides low level control of a computer's hardware. Typically, stored on a small chip using flash memory
What is firmware?
This social engineering attack tricks you into giving up sensitive information by pretending to be something you trust over email.
What is Phishing?
This Windows tool lets you see which programs and processes are running, and end tasks if something is frozen.
What is Task Manager?
This is the most secure and reliable way to connect to a network
What is a wired connection?
The four functions that represent the way that data flows through a computer
What is input, processing, output, and storage?
A computer can have multiple of this component based on the number of connections needed
What are NICs
This type of cyberattack involves an attacker secretly inserting themselves between two communicating parties
What is a Man-in-the-Middle attack?
This management tool can be used to setup a RAID configuration or partition a drive
What is Disk Management?
This is the standard for WIFI
What is IEEE 802.11?
This provides the interface for a user to interact with on a device
What is software
This switch, found on the PSU provides compatibility with a country's power grid
What is the voltage selector?
This type of malware locks your files and demands money to unlock them
What is ransomware?
This management program is home to both the Event Viewer and Local Users and Groups tools
What is Computer Management?
This protocol is used to secure communication between a sender and receiver
What is SSL/TLS?
In computing, these are represented as ones and zeros
What are bits?
This type of motherboard port is used exclusively to connect disk drives
What is SATA?
This practice involves regularly updating software to fix bugs and security flaws
What is patching?
This technology allows a user to run multiple operating systems on the single host machine
What is virtualization?