Hardware & Devices
Software & Operating Systems
Databases
Networking
Security and Best Practices
100

This component is considered the “brain” of the computer.

What is the CPU

100

This type of software manages hardware resources and provides services for applications.

What is the operating system

100

A collection of related data organized in tables.

What is a database

100

This device connects multiple devices on a network and forwards data based on MAC addresses.

What is a switch

100

This type of malware locks users out of their systems until a payment is made.

What is Ransomware 

200

This type of memory is volatile and is cleared when the computer is turned off.

What is RAM

200

This open-source operating system is often used for servers.

What is Linux

200

This language is used to manage and query relational databases.

What is SQL

200

This type of IP address does not change and must be configured manually.

What is a static IP address 

200

This method of authentication requires two or more verification methods.

What is Multi Factor Authentication (MFA)

300

A solid-state drive (SSD) uses this type of memory technology instead of spinning disks.

What is flash memory

300

A program designed to perform malicious tasks, often disguised as legitimate software

What is a trojan horse

300

In a database table, this uniquely identifies each row or record.

What is a primary key

300

This protocol is used to securely browse websites and encrypt HTTP traffic.

BONUS POINTS: What is the port number  

What is HTTPS

What is 443

300

A security practice that ensures users only have access to the data they need.

What is the principle of least privilege 

400

This expansion slot type is commonly used for modern graphics cards.

What is PCIe

400

This type of software is free to use, modify, and distribute.

What is open source software 

400

A field in a table that refers to the primary key in another table.

What is a foreign key

400

This protocol translates domain names into IP addresses.

What is DNS

400

This type of attack tricks users into revealing sensitive information, often through fake emails.

What is Phishing 

500

This type of memory chip is non-volatile and stores the firmware used to boot the computer.

What is Read Only Memory (ROM)

500

This command-line tool in Windows is used to display network configuration details.

What is ipconfig

500

This SQL command retrieves data from one or more tables.

What is SELECT

500

The range of private IP addresses starting with 192.168.x.x belongs to this class.

What is class C

500

This type of attack overwhelms a system with traffic to make it unavailable.

What is a Denial of Service (DOS) attack

600

This component regulates voltage from the power outlet to usable levels for the computer. 

AC --> DC

What is the Power Supply Unit (PSU)

600

This type of virtualization allows multiple operating systems to run on a single physical machine.

BONUS POINTS: What are the 2 types of hypervisors & how do they differ  

What is a hypervisor (virtualization) 

Type 1: Bare metal, sits on top of the computers hardware 

Type 2: Hosted, Runs on top of an operating system 

600

This type of database does not rely on tables and rows, and instead can store data as documents, key-value pairs, or graphs.

What is a non-relational database (NoSQL)

600

This model has 7 layers and is used to standardize network communication.

What is the OSI model

600

The process of scrambling data so it can only be read with a key

What is encryption