This component is considered the “brain” of the computer.
What is the CPU
This type of software manages hardware resources and provides services for applications.
What is the operating system
A collection of related data organized in tables.
What is a database
This device connects multiple devices on a network and forwards data based on MAC addresses.
What is a switch
This type of malware locks users out of their systems until a payment is made.
What is Ransomware
This type of memory is volatile and is cleared when the computer is turned off.
What is RAM
This open-source operating system is often used for servers.
What is Linux
This language is used to manage and query relational databases.
What is SQL
This type of IP address does not change and must be configured manually.
What is a static IP address
This method of authentication requires two or more verification methods.
What is Multi Factor Authentication (MFA)
A solid-state drive (SSD) uses this type of memory technology instead of spinning disks.
What is flash memory
A program designed to perform malicious tasks, often disguised as legitimate software
What is a trojan horse
In a database table, this uniquely identifies each row or record.
What is a primary key
This protocol is used to securely browse websites and encrypt HTTP traffic.
BONUS POINTS: What is the port number
What is HTTPS
What is 443
A security practice that ensures users only have access to the data they need.
What is the principle of least privilege
This expansion slot type is commonly used for modern graphics cards.
What is PCIe
This type of software is free to use, modify, and distribute.
What is open source software
A field in a table that refers to the primary key in another table.
What is a foreign key
This protocol translates domain names into IP addresses.
What is DNS
This type of attack tricks users into revealing sensitive information, often through fake emails.
What is Phishing
This type of memory chip is non-volatile and stores the firmware used to boot the computer.
What is Read Only Memory (ROM)
This command-line tool in Windows is used to display network configuration details.
What is ipconfig
This SQL command retrieves data from one or more tables.
What is SELECT
The range of private IP addresses starting with 192.168.x.x belongs to this class.
What is class C
This type of attack overwhelms a system with traffic to make it unavailable.
What is a Denial of Service (DOS) attack
This component regulates voltage from the power outlet to usable levels for the computer.
AC --> DC
What is the Power Supply Unit (PSU)
This type of virtualization allows multiple operating systems to run on a single physical machine.
BONUS POINTS: What are the 2 types of hypervisors & how do they differ
What is a hypervisor (virtualization)
Type 1: Bare metal, sits on top of the computers hardware
Type 2: Hosted, Runs on top of an operating system
This type of database does not rely on tables and rows, and instead can store data as documents, key-value pairs, or graphs.
What is a non-relational database (NoSQL)
This model has 7 layers and is used to standardize network communication.
What is the OSI model
The process of scrambling data so it can only be read with a key
What is encryption