Document 11683291

advertisement
Computer
System
Storage &
Memory
Copyright
Law & Ethics
Connecting
Computers
Security
Threats
10
10
10
10
10
20
20
20
20
20
30
30
30
30
30
40
40
40
40
40
50
50
50
50
50
An electronic device that
accepts information and
instructions (input) from
the user performs the
necessary processing and
provides feedback
(output)
Computer
A computer system
includes two basic
components, what are
they?
Hardware and software
Software that helps the
USER perform specific
tasks
Application software
Most computer hardware
perform one of two basic
functions. What are they?
Input and output
Name the components of
a basic computer system.
Category 1 – 50 Points
Monitor, keyboard, mouse,
computer or CPU
The main permanent
storage on any computer
system
Category 2 – 10 Points
Hard Drive
A portable external
storage device
Category 2 – 20 Points
Flash drive or External hard drive
Non-volatile or permanent
memory
Category 2 – 30 Points
ROM (Read Only Memory)
A series of 8 bits is
called…
Category 2 – 40 Points
Byte
Computers recognize data
in a string of 0s or 1s. This
is called . . .
Category 2 – 50 Points
Binary digits
Using computers for
positive results
Category 3 – 10 Points
Ethical computer use
Give three examples of
material that can be
copyright protected.
Category 3 – 20 Points
Movies, poems, software, songs,
dances, art work, videos,
documents on the computer
Permits created items to
be consumed in “fair use.”
Category 3 – 30 Points
Copyright law
To protect your
investment, some software
companies allow you to
create this for your
software purchases
Category 3 – 40 Points
Backup copies
When the school
purchases large quantities
of software for all
computers in the building,
it is called ________.
Category 3 – 50 Points
Site license
Connecting one computer
to another creates a
______.
Category 4 – 10 Points
Network
What does ISP mean?
Category 4 – 20 Points
Internet Service Provider
Connects one web page to
a file on a network server
Category 4 – 30 Points
Hyperlink
Software used to acces,
retrieve, and interact with
web pages like Internet
Explorer are called ______
Category 4 – 40 Points
Web browser
A central storage location
for programs and data is
connected to a client
creating a __________
Category 4 – 50 Points
Client/server network
Spreads through
networks, replicating itself
to take up space on your
computer
Category 5 – 10 Points
Worm
Looks exactly like an
authentic site, but created
to obtain your personal
information
Category 5 – 20 Points
Spoofed site
The easiest way to protect
your computer from
malicious programs
Category 5 – 30 Points
Virus protection software
Name the three categories
of viruses.
Category 5 – 40 Points
Hoaxes, Worms, and Malicious
programs
Virus protection software
must do these two things
regularly…
Category 5 – 50 Points
Update and Scan
Download