This component, often called the "brain" of the computer, processes instructions.
What is the CPU (Central Processing Unit)?
This networking technology allows devices to connect to the internet wirelessly.
What is Wi-Fi?
These are the two most popular mobile operating systems.
What are iOS and Android?
This basic security measure involves using a combination of letters, numbers, and symbols to protect accounts.
What is a strong password?
This company, founded by Steve Jobs and Steve Wozniak in 1976, introduced the Macintosh computer.
What is Apple?
This type of software manages hardware and software resources on a computer.
What is an operating system?
This global system of interconnected computer networks was developed in the 1960s.
What is the Internet?
This term refers to software applications designed to run on mobile devices.
What are apps (or mobile applications)?
This security feature requires a second form of identification in addition to a password.
What is two-factor authentication?
This co-founder and his wife became the world's biggest tech philanthropists.
Who is Bill Gates (and Melinda Gates)?
This term refers to the physical components of a computer system.
What is hardware?
These unique addresses are used to identify devices on a network.
What are IP addresses?
This latest generation of cellular network technology promises faster speeds and lower latency.
What is 5G?
This type of malicious software encrypts a user's files and demands payment for the decryption key.
What is ransomware?
This programming language, developed by Dennis Ritchie at Bell Labs in the early 1970s, revolutionized operating system development and is still widely used today.
What is C?
This type of memory temporarily stores data for active programs and is cleared when the computer is turned off.
What is RAM (Random Access Memory)?
This network device directs data packets between computer networks.
What is a router?
This type of mobile app runs within a browser and doesn't need to be installed on the device.
What is a web app?
This practice of sending fraudulent emails pretending to be from reputable companies is a common security threat.
What is phishing?
This British mathematician and computer scientist is often considered the father of artificial intelligence.
Who is Alan Turing?
This type of software is embedded in hardware devices and provides low-level control.
What is firmware?
This protocol suite is the foundation of internet communication, named after its two main protocols.
What is TCP/IP (Transmission Control Protocol/Internet Protocol)?
This technology allows mobile devices to make secure payments by tapping on a terminal.
What is NFC (Near Field Communication)?
This type of security software creates a barrier between a trusted internal network and untrusted external networks.
What is a firewall?
This wartime need was the primary motivation for creating the first general-purpose electronic computer, ENIAC.
What is calculating artillery firing tables (or ballistic trajectories)?