Also known in the medical world, a program that is designed to harm a computer system or network.
What is a virus?
Zoom, Teams, and Google all can be used for this common service.
What is web conferencing?
PC
What is a Personal Computer?
Developed by IBM, this AI was initially developed to answer questions on the quiz show Jeopardy.
Who is Watson?
Computer hardware used to point, click, drag, or select.
What is a mouse?
This type of cyber attack involves tricking a user into providing sensitive information, such as login credentials or credit card numbers.
What is a phishing attack?
Your first online stop for self-service support and ticket submission for IT and Shared Services.
What is the UAA Service Portal?
RAM
What is Random Access Memory
This emerging AI chatbot, which was developed by startup OpenAI, is making headlines with the novel ways it is being used.
What is ChatGPT?
This keyboard addition created in 1999 by Shigetaka Kurity replaced emoticons.
What are emojis?
This is the term for a type of malicious software that is designed to lock or encrypt a user's files until a ransom is paid.
What is ransomware?
UAA employees can easily download university software through this.
What is the software center?
VPN
What is a Virtual Private Network?
This computer-generated environment makes a user feel like they are immersed in their surroundings.
What is virtual reality?
This system manages system resources on a computer.
What is the Operating System (OS)?
This method of authorization is used to grant a user access to a website or application after verifying their identity on more than one device.
What is Multi Factor Authentication?
These two manufacturers are the approved standard computers at UAA.
What is Dell and Apple?
CPU
What is the Central Processing Unit?
The T1000, aka The Terminator, is a pop culture example of this emerging technology.
What is AI or Artificial Intelligence?
This action is a typical first step when trouble shooting a computer problem.
Have you turned if off and turned it back on?
This type of attack happens when a hacker attempts to gain unauthorized access to a computer system or network by trying different username and password combinations.
What is brute force attack?
UAA’s room scheduling tool
What is 25live?
WiFi
What is Wireless Fidelity
The name of the Boston Dynamics robot dog.
Who is Spot?
This popular operating system launched in 1991 also has it’s own Mascot, Tux, the Penguin.
What is Linux?