POWERPOINT JEOPARDYSecurity Threats
Connecting Computers
Copyright Law & Ethics
Storage & Memory
Computer System
50
40
30
20
10 10
20
30
40
50
10
20
30
40
50
10
20
30
40
50
10
20
30
40
50
An electronic device that accepts information and instructions (input) from the user performs the
necessary processing and provides feedback
(output)
A computer system includes two basic
components, what are they?
Hardware and software
Software that helps the USER perform specific
tasks
Application software
Most computer hardware perform one of two basic
functions. What are they?
Name the components of a basic computer system.
Category 1 – 50 Points
Monitor, keyboard, mouse, computer or CPU
The main permanent storage on any computer
systemCategory 2 – 10 Points
A portable external storage device
Category 2 – 20 Points
Flash drive or External hard drive
Non-volatile or permanent memory
Category 2 – 30 Points
ROM (Read Only Memory)
A series of 8 bits is called…
Category 2 – 40 Points
Computers recognize data in a string of 0s or 1s. This is called . . .
Category 2 – 50 Points
Using computers for positive results
Category 3 – 10 Points
Ethical computer use
Give three examples of material that can be copyright protected.
Category 3 – 20 Points
Movies, poems, software, songs, dances, art work, videos,
documents on the computer
Permits created items to be consumed in “fair use.” Category 3 – 30
Points
To protect your investment, some
software companies allow you to create this for
your software purchasesCategory 3 – 40 Points
When the school purchases large
quantities of software for all computers in the building, it is called
________.Category 3 – 50 Points
Connecting one computer to another creates a
______.Category 4 – 10 Points
What does ISP mean?Category 4 – 20 Points
Internet Service Provider
Connects one web page to a file on a network
serverCategory 4 – 30 Points
Software used to acces, retrieve, and interact with web pages like Internet Explorer are
called ______Category 4 – 40 Points
A central storage location for programs and data is
connected to a client creating a __________
Category 4 – 50 Points
Client/server network
Spreads through networks, replicating
itself to take up space on your computer
Category 5 – 10 Points
Looks exactly like an authentic site, but
created to obtain your personal information
Category 5 – 20 Points
The easiest way to protect your computer
from malicious programsCategory 5 – 30 Points
Virus protection software
Name the three categories of viruses.Category 5 – 40 Points
Hoaxes, Worms, and Malicious programs
Virus protection software must do these two things
regularly…Category 5 – 50 Points