1 of 33

IT\Cyber Edition

2 of 33

Panel

PC Hardware

Digital Literacy

Security Awareness

Computer NEtworks

Software DEV

Data Management

$200

$400

$600

$800

$1000

$200

$400

$600

$800

$1000

$200

$400

$600

$800

$1000

$200

$400

$600

$800

$1000

$200

$400

$600

$800

$1000

$200

$400

$600

$800

$1000

3 of 33

THE PRIMARY OUTPUT DEVICE ON YOUR DESKTOP OR LAPTOP COMPUTER.

PC Hardware · $200

⬅ BACK TO PANEL

4 of 33

THE 2 (TWO) PRIMARY INPUT DEVICES ON YOUR LAPTOP OR DESKTOP COMPUTER.

PC Hardware · $400

⬅ BACK TO PANEL

5 of 33

THE COMPONENT THAT ACTS AS THE BRAIN OF THE COMPUTER.

PC Hardware · $600

⬅ BACK TO PANEL

6 of 33

THE COMPONENT THAT CONVERTS AC ELECTRICITY TO DC ELECTRICITY.

PC Hardware · $800

⬅ BACK TO PANEL

7 of 33

THE DEVICE THAT PROVIDES SHORT-TERM STORAGE IN COMPUTERS, ALLOWING THEM TO RUN MULTIPLE APPLICATIONS AT ONCE.

PC Hardware · $1000

⬅ BACK TO PANEL

8 of 33

MICROSOFT WINDOWS, APPLE MAC OS AND GOOGLE CHROME OS ARE ALL EXAMPLES OF THIS TYPE OF SOFTWARE

Digital Literacy · $200

⬅ BACK TO PANEL

9 of 33

THIS IS THE OLDEST FORM OF ONLINE COMMUNICATION.

Digital Literacy · $400

⬅ BACK TO PANEL

10 of 33

T@$TYC@K322 WOULD BE CONSIDERED A STRONG ONE OF THESE

Digital Literacy · $600

⬅ BACK TO PANEL

11 of 33

THE .XLSX FILE EXTENSION IS USED TO STORE FILES MADE BY THIS SOFTWARE PROGRAM

Digital Literacy · $800

⬅ BACK TO PANEL

12 of 33

THE FIELD USED TO SEND A COPY OF A EMAIL TO SOMEONE WITHOUT LETTING OTHER EMAIL RECIPIENTS KNOW.

Digital Literacy · $1000

⬅ BACK TO PANEL

13 of 33

A POPULAR SCAMMING TECHNIQUE THAT INVOLVES SENDING FRAUDULENT EMAILS TO RANDOM PEOPLE IN THE HOPES THAT ONE WILL “BITE

Security Awareness · $200

⬅ BACK TO PANEL

14 of 33

A COMMON CLASS OF MALICIOUS SOFTWARE THAT SPREADS FROM ONE COMPUTER TO THE NEXT DUE TO THE ACTIONS OF UNEDUCATED USERS.

Security Awareness · $400

⬅ BACK TO PANEL

15 of 33

THE TERM USED TO DESCRIBE THE SUM OF ALL OF A PERSON’S ONLINE ACTIVITIES

Security Awareness · $600

⬅ BACK TO PANEL

16 of 33

SOFTWARE USED TO BLOCK MALICIOUS NETWORK TRAFFIC FROM ENTERING YOUR COMPUTER NETWORK

Security Awareness · $800

⬅ BACK TO PANEL

17 of 33

A FORM OF CYBER ATTACK THAT DEPENDS ON DECEIVING PEOPLE RATHER THAN BYPASSING TECHNOLOGY

Security Awareness · $1000

⬅ BACK TO PANEL

18 of 33

A COMMON FORM OF INTERNET CONNECTIVITY THAT REQUIRES NO WIRES BETWEEN YOU COMPUTER AND THE INTERNET SOURCE

Computer Networks · $200

⬅ BACK TO PANEL

19 of 33

THE NETWORKING DEVICE THAT ALLOWS YOU TO CONNECT FROM YOUR LOCAL NETWORK TO REMOTE NETWORKS AROUND THE WORLD

Computer Networks · $400

⬅ BACK TO PANEL

20 of 33

THE NAME OF THE MOST COMMON FORM OF WIRED NETWORK CABLING

Computer Networks · $600

⬅ BACK TO PANEL

21 of 33

THE ONLINE FORM OF NETWORK WIRING TO USE LASER LIGHT INSTEAD OF ELECTRICITY TO CARRY DATA SIGNALS

Computer Networks · $800

⬅ BACK TO PANEL

22 of 33

THE STRONGEST FORM OF ENCRYPTION AVAILABLE FOR WIRELESS NETWORKS

Computer Networks · $1000

⬅ BACK TO PANEL

23 of 33

THE PART OF A SOFTWARE PROGRAM THAT ALLOWS A PERSON TO INTERACT WITH THE IT

Software Dev · $200

⬅ BACK TO PANEL

24 of 33

A PROGRAMMING LOGIC STRUCTURE THAT CONTINUES TO PERFORM A SET OF TASKS OVER AND OVER UNTIL IT IS FORCED TO STOP

Software Dev · $400

⬅ BACK TO PANEL

25 of 33

THE TERM USED TO DESCRIBE THE PROCESS OF WRITING OUT PROGRAM INSTRUCTIONS IN SIMPLE LANGUAGE BEFORE CONVERTING IT INTO A CODING LANGUAGE

Software Dev · $600

⬅ BACK TO PANEL

26 of 33

THE CODING LANGUAGE OF THE INTERNET

Software Dev · $800

⬅ BACK TO PANEL

27 of 33

A REUSABLE BLOCK OF CODE THAT CAN BE CALLED BY NAME MULTIPLE TIMES IN A PROGRAM

Software Dev · $1000

⬅ BACK TO PANEL

28 of 33

USED TO RESTORE A COMPUTER TO ITS FORMER STATE IN THE EVENT OF A SYSTEM FAILURE

Data Management · $200

⬅ BACK TO PANEL

29 of 33

THE TERM FOR THE SMALLEST AMOUNT OF DATA A COMPUTER CAN STORE

Data Management · $400

⬅ BACK TO PANEL

30 of 33

DATA THAT IS STORED ON A HARD DRIVE IS REFERRED TO DATA AT _______

Data Management · $600

⬅ BACK TO PANEL

31 of 33

THE PROGRAMMING LANGUAGE OF DATABASES

Data Management · $800

⬅ BACK TO PANEL

32 of 33

THE METHOD OF PROTECTING DATA BY USING A STRONG MATH PROBLEM COMBINED WITH SECRET KEY TO SCRAMBLE THE DATA, CONVERTING IT INTO CIPHER TEXT

Data Management · $1000

⬅ BACK TO PANEL

33 of 33