What is the term for a malicious software designed to disrupt or damage systems?
What is malware?
This classic arcade game features a yellow character who eats dots while avoiding ghosts.
What is Pac-Man?
This coding language is primarily used for creating web pages.
What is HTML?
This type of malware encrypts a victim's files and demands payment for the decryption key.
What is ransomware?
This technology involves creating machines that can think and learn like humans.
What is artificial intelligence?
What type of attack overwhelms a server with traffic to disrupt services?
What is a DDoS attack (Distributed Denial of Service)?
This gaming console, released in the 1980s, popularized home video gaming.
What is the Nintendo Entertainment System (NES)?
This foundational concept in computer science describes a step-by-step procedure for solving a problem or completing a task.
What is an algorithm?
This security measure involves using two different methods to verify a user’s identity.
What is two-factor authentication?
This technology allows for the creation of digital currencies that operate on decentralized networks.
What is blockchain?
What is the term for a digital footprint created by online activities?
What is your online presence?
This genre of games features complex narratives and character development
What is role-playing games (RPGs)?
A set of rules governs how data is transmitted over a network.
What is a protocol?
This term describes a network of compromised computers controlled by a malicious actor.
What is a botnet?
This futuristic concept aims to integrate human brains with computer systems for enhanced capabilities.
What is brain-computer interface (BCI)?
This term refers to the process of optimizing a website to rank higher in search engine results.
What is search engine optimization (SEO)?
This company is known for producing the gaming franchise that includes "Call of Duty."
What is Activision?
This algorithmic process enables machines to learn from data without explicit programming.
What is machine learning?
This practice involves testing a system for vulnerabilities to improve its security.
What is penetration testing?
This technology uses algorithms to analyze large data sets and is essential for making predictions in various fields.
What is big data analytics?
This protocol is used for transferring files over the internet.
What is FTP (File Transfer Protocol)?
This technology allows players to immerse themselves in a simulated environment using specialized headsets.
What is virtual reality (VR)?
This protocol is commonly used for communication in IoT devices, allowing them to connect and share data efficiently.
What is MQTT (Message Queuing Telemetry Transport)?
This malicious software is designed to gain unauthorized access to a system, often for the purpose of stealing sensitive information.
What is a Trojan horse?
This form of technology combines the physical and digital worlds, allowing users to interact with virtual elements in real time.
What is augmented reality (AR)?