Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system
Centralization
Transparency
Closed network
Single point of failure
Bitcoin
Ethereum
Ripple
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Mining
Trading
Investing
Storing
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
Java
Python
C++
Visual Basic for Applications (VBA)
Phishing
Ransomware
Firewall
Malware
A type of computer virus
A security protocol
A programming language
Antivirus software
Encryption
Intrusion detection system (IDS)
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
Socket
Pipe
Port
Machine
Steve Jobs
Bill Gates
John Mashey
John Bredi
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Fisher Ada
Alan Turing
John McCarthy
Allen Newell