Linux Command
Simple Hardware
Networking
Security
Windows
100

This command lists the files and directories in the current working directory.

What is ls?

100

This is the main circuit board in a computer, housing the CPU, RAM, and expansion slots.

What is the motherboard?

100

This wireless networking technology, commonly used in homes and offices, follows standards like 802.11ac and 802.11ax.

What is Wi-Fi?

100

This type of attack involves attempting to gain unauthorized access to a system by tricking individuals into revealing sensitive information, often through deceptive emails or websites.

What is phishing?

100

This command is used to optimize the performance of a hard drive by reorganizing fragmented data.

What is defrag?

200

This command is used to change the current working directory in the terminal.

What is cd?

200

This component is the "brain" of the computer, executing instructions and performing calculations.

What is the CPU (Central Processing Unit)?

200

This low-power wireless communication protocol is primarily used in home automation for devices like smart lights and locks.

What is Z-Wave?

200

This physical security device, often used with laptops, secures the device to a stationary object to prevent theft, typically using a key or combination lock.

What is a cable lock?

200

This command is used to prepare a disk for use by erasing all data and creating a new file system.

What is format?

300

This command-line tool, used in RPM-based Linux distributions, helps manage software packages by installing, updating, and removing them.

What is YUM (Yellowdog Updater, Modified)?

300

This volatile memory stores data temporarily for quick access by the CPU and loses data when the power is turned off.

What is RAM (Random Access Memory)?

300

This command-line tool is used to test the reachability of a host on a network by sending ICMP Echo Request packets and measuring the response time.

What is ping?

300

This workplace policy allows employees to use their personal devices, such as smartphones and laptops, for work purposes, often requiring security measures to protect company data.

What is BYOD (Bring Your Own Device)?

300

This command is used to check and repair file system errors on a disk.

What is chkdsk?

400

This Linux command is used to change the permissions of a file or directory, allowing users to specify read, write, and execute access.

What is chmod?

400

This type of storage retains data even when the computer is powered off, and is slower than RAM but has higher capacity.

What is a hard drive (HDD) or solid-state drive (SSD)?

400

This networking device directs data packets between different networks, often connecting a local network to the internet.

What is a router?

400

This U.S. law sets standards for the protection of sensitive patient information, ensuring that it is kept confidential and secure in electronic transactions.

What is HIPAA (Health Insurance Portability and Accountability Act)?

400

This command scans and repairs corrupted or missing system files in Windows by using a local copy or retrieving a fresh version from the Windows installation files.

What is System File Checker (SFC)?

500

This command displays the current working directory's full path.

What is pwd?

500

This power supply component converts AC power from the wall outlet to the DC power needed by the computer's internal components.

What is the power supply unit (PSU)?

500

This technology creates a secure, encrypted connection over the internet, allowing users to access a private network remotely as if they were directly connected to it.

What is a VPN (Virtual Private Network)?

500

This cryptographic method ensures the authenticity and integrity of a message or document by using a private key to create a unique signature that can be verified with a public key.

What is a digital signature?

500

This boot mode in Windows allows the operating system to start with only essential drivers and services, often used to troubleshoot problems like system crashes or malware infections.

What is Safe Mode?