Computer System Storage & Memory Copyright Law & Ethics Connecting Computers Security Threats 10 10 10 10 10 20 20 20 20 20 30 30 30 30 30 40 40 40 40 40 50 50 50 50 50 An electronic device that accepts information and instructions (input) from the user performs the necessary processing and provides feedback (output) Computer A computer system includes two basic components, what are they? Hardware and software Software that helps the USER perform specific tasks Application software Most computer hardware perform one of two basic functions. What are they? Input and output Name the components of a basic computer system. Category 1 – 50 Points Monitor, keyboard, mouse, computer or CPU The main permanent storage on any computer system Category 2 – 10 Points Hard Drive A portable external storage device Category 2 – 20 Points Flash drive or External hard drive Non-volatile or permanent memory Category 2 – 30 Points ROM (Read Only Memory) A series of 8 bits is called… Category 2 – 40 Points Byte Computers recognize data in a string of 0s or 1s. This is called . . . Category 2 – 50 Points Binary digits Using computers for positive results Category 3 – 10 Points Ethical computer use Give three examples of material that can be copyright protected. Category 3 – 20 Points Movies, poems, software, songs, dances, art work, videos, documents on the computer Permits created items to be consumed in “fair use.” Category 3 – 30 Points Copyright law To protect your investment, some software companies allow you to create this for your software purchases Category 3 – 40 Points Backup copies When the school purchases large quantities of software for all computers in the building, it is called ________. Category 3 – 50 Points Site license Connecting one computer to another creates a ______. Category 4 – 10 Points Network What does ISP mean? Category 4 – 20 Points Internet Service Provider Connects one web page to a file on a network server Category 4 – 30 Points Hyperlink Software used to acces, retrieve, and interact with web pages like Internet Explorer are called ______ Category 4 – 40 Points Web browser A central storage location for programs and data is connected to a client creating a __________ Category 4 – 50 Points Client/server network Spreads through networks, replicating itself to take up space on your computer Category 5 – 10 Points Worm Looks exactly like an authentic site, but created to obtain your personal information Category 5 – 20 Points Spoofed site The easiest way to protect your computer from malicious programs Category 5 – 30 Points Virus protection software Name the three categories of viruses. Category 5 – 40 Points Hoaxes, Worms, and Malicious programs Virus protection software must do these two things regularly… Category 5 – 50 Points Update and Scan