+ All Categories
Home > Documents > Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40...

Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40...

Date post: 27-Dec-2015
Category:
Upload: jewel-cole
View: 213 times
Download: 0 times
Share this document with a friend
52
Basic Computers!
Transcript

Basic Computers!

POWERPOINT JEOPARDYSecurity Threats

Connecting Computers

Copyright Law & Ethics

Storage & Memory

Computer System

50

40

30

20

10 10

20

30

40

50

10

20

30

40

50

10

20

30

40

50

10

20

30

40

50

An electronic device that accepts information and instructions (input) from the user performs the

necessary processing and provides feedback

(output)

Computer

A computer system includes two basic

components, what are they?

Hardware and software

Software that helps the USER perform specific

tasks

Application software

Most computer hardware perform one of two basic

functions. What are they?

Input and output

Name the components of a basic computer system.

Category 1 – 50 Points

Monitor, keyboard, mouse, computer or CPU

The main permanent storage on any computer

systemCategory 2 – 10 Points

Hard Drive

A portable external storage device

Category 2 – 20 Points

Flash drive or External hard drive

Non-volatile or permanent memory

Category 2 – 30 Points

ROM (Read Only Memory)

A series of 8 bits is called…

Category 2 – 40 Points

Byte

Computers recognize data in a string of 0s or 1s. This is called . . .

Category 2 – 50 Points

Binary digits

Using computers for positive results

Category 3 – 10 Points

Ethical computer use

Give three examples of material that can be copyright protected.

Category 3 – 20 Points

Movies, poems, software, songs, dances, art work, videos,

documents on the computer

Permits created items to be consumed in “fair use.” Category 3 – 30

Points

Copyright law

To protect your investment, some

software companies allow you to create this for

your software purchasesCategory 3 – 40 Points

Backup copies

When the school purchases large

quantities of software for all computers in the building, it is called

________.Category 3 – 50 Points

Site license

Connecting one computer to another creates a

______.Category 4 – 10 Points

Network

What does ISP mean?Category 4 – 20 Points

Internet Service Provider

Connects one web page to a file on a network

serverCategory 4 – 30 Points

Hyperlink

Software used to acces, retrieve, and interact with web pages like Internet Explorer are

called ______Category 4 – 40 Points

Web browser

A central storage location for programs and data is

connected to a client creating a __________

Category 4 – 50 Points

Client/server network

Spreads through networks, replicating

itself to take up space on your computer

Category 5 – 10 Points

Worm

Looks exactly like an authentic site, but

created to obtain your personal information

Category 5 – 20 Points

Spoofed site

The easiest way to protect your computer

from malicious programsCategory 5 – 30 Points

Virus protection software

Name the three categories of viruses.Category 5 – 40 Points

Hoaxes, Worms, and Malicious programs

Virus protection software must do these two things

regularly…Category 5 – 50 Points

Update and Scan


Recommended