Noun Forms
📘 Summary Table — Rare Earths & Where Europe Has Them
(Übersichtstabelle – Seltene Erden und ihre Vorkommen in Europa)
| Rare Earth (REE)(Seltenes Element) | Used in Heat Pumps for…(Verwendung in Wärmepumpen für…) | Main European Sources(Wichtige europäische Quellen) | Status(Status) |
|---|---|---|---|
| Neodymium (Nd)(Neodym) | Motors, compressors(Motoren, Kompressoren) | Sweden (Kiruna), Norway (Fen), Finland (Sokli)(Schweden, Norwegen, Finnland) | Good potential(Gutes Potenzial) |
| Praseodymium (Pr)(Praseodym) | Motors(Motoren) | Same regions as Nd(Gleiche Regionen wie Nd) | Good potential(Gutes Potenzial) |
| Dysprosium (Dy)(Dysprosium) | High-temperature magnets(Hitzebeständige Magnete) | Sweden (Norra Kärr), Greenland(Schweden, Grönland) | Limited but present(Begrenzt, aber vorhanden) |
| Terbium (Tb)(Terbium) | Magnetic stability, sensors(Magnetische Stabilität, Sensoren) | Sweden (Norra Kärr), Greenland(Schweden, Grönland) | Limited(Begrenzt) |
| Gadolinium (Gd)(Gadolinium) | Magnetocaloric materials(Magnetokalorische Materialien) | Sweden (Kiruna)(Schweden) | Trace amounts(Spurenmengen) |
| Samarium (Sm)(Samarium) | High-temp magnets(Hochtemperatur-Magnete) | Norway / Finland(Norwegen / Finnland) | Moderate(Mittelmäßig) |
| Yttrium (Y)(Yttrium) | Electronics, coatings(Elektronik, Beschichtungen) | Sweden, Greece, Iberia(Schweden, Griechenland, Iberische Halbinsel) | Trace(Spuren) |
| Cerium (Ce)(Cerium) | Catalysts, glass polishing(Katalysatoren, Glaspolitur) | Common across Europe(Weit verbreitet in Europa) | Abundant(Reichlich vorhanden) |
| Lanthanum (La)(Lanthan) | Electronics, circuits(Elektronik, Schaltkreise) | Common across Europe(Weit verbreitet in Europa) | Abundant(Reichlich vorhanden) |
| Scandium (Sc)(Scandium) | Power electronics(Leistungselektronik) | Finland, Ukraine(Finnland, Ukraine) | Small, high-value(Gering, aber wertvoll) |
| Holmium, Erbium, Ytterbium (Ho, Er, Yb)(Holmium, Erbium, Ytterbium) | Sensors, optics(Sensoren, Optik) | Sweden (Norra Kärr)(Schweden) | Rare, research scale(Selten, Forschungsebene) |
Cybersecurity – Social Engineering Attacks
1. An attacker sends deceptive emails to steal user credentials. This attack is called
______.
phishing
a) spear phishing (spezifisches zielgerichtetes Phishing)
b) phishing (allgemeines betrügerisches E-Mail-Phishing)
2. A highly targeted phishing attack aimed at a specific individual is known as
______.
spear phishing
a) whaling (Phishing für Führungskräfte)
b) spear phishing (zielgerichtetes, personalisiertes Phishing)
3. When attackers target executives or high-profile individuals, the attack is called
______.
whaling
a) whaling (Phishing gegen hochrangige Personen)
b) smishing (Phishing per SMS)
4. An attack using fraudulent telephone calls to obtain information is
______.
vishing
a) vishing (Phishing per Telefon)
b) baiting (Ködern mit attraktiven Angeboten)
5. A phishing attack carried out through text messages (SMS) is called
______.
smishing
a) smishing (SMS-Phishing)
b) tailgating (unerlaubtes Mitgehen in gesicherte Bereiche)
6. Malicious QR codes used to redirect users to fake websites are part of
______.
quishing
a) pretexting (vorgeschobene falsche Geschichten)
b) quishing (QR-Code-Phishing)
7. Creating a fabricated story to gain someone's trust is known as
______.
pretexting
a) impersonation (Vortäuschen einer falschen Identität)
b) pretexting (erfundene Vorwände zur Manipulation)
8. Offering something attractive (e.g., free USB stick) to trick a target is called
______.
baiting
a) baiting (Ködern mit verlockenden Objekten)
b) whaling (Phishing für Führungskräfte)
9. When an attacker quietly follows someone into a secure building, it is known as
______.
tailgating
a) tailgating (unerlaubtes Hinterhergehen in gesicherte Bereiche)
b) phishing (betrügerisches E-Mail-Phishing)
10. Pretending to be a trusted person or organisation to gain information is called
______.
impersonation
a) impersonation (Vortäuschen einer falschen Identität)
b) smishing (SMS-Phishing)
11. When criminals hijack or spoof business email accounts to steal money or data, this is
______.
Business Email Compromise (BEC)
a) Business Email Compromise (BEC) (Geschäfts-E-Mail-Betrug)
b) vishing (Telefon-Phishing)