Browse Definitions :

Hardware 101

Those parts of the system that you can hit with a hammer are called hardware; those program instructions that you can only curse at are called software.
~Anonymous, from ~Our Favorite Technology Quotations

Now that you understand the difference between hardware and software, are you ready to move on to (slightly) more difficult fare? Take our quiz to test your hardware knowledge.

1. Is firmware hardware or software?

2. What test has a hardware component passed if it doesn't catch fire the first time it's used?

3. What's the other member of the board family besides the motherboard:
a. fatherboard
b. sonboard
c. daughterboard

4. What was the first virus in the wild that was capable of damaging hardware?

5. Is a clock pendulum an oscillator or a gyroscope?

6. Why would you run a burn-in test on a hardware component?

7. What do you call the practice of taking parts from one machine to use in another?

8. What type of device destroys hardware in much the same way as a wood chipper disposes of tree limbs?

9. What are you doing if you reset some computer component so that it runs faster than the manufacturer-specified speed?

10. Can you use software to cool hardware?

How did you do? Let us know!

See our Down in the Engine Room quiz for more fun with hardware.

This was last updated in July 2009
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...