Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology Safeguards Theft Q $100 Q $100 Q $100 Q $100 Q $100 Q $200 Q $200 Q $200 Q $200 Q $200 Q $300 Q $300 Q $300 Q $300 Q $300 Q $400 Q $400 Q $400 Q $400 Q $400 Q $500 Q $500 Q $500 Q $500 Q $500 Final Jeopardy
$100 Question from H1 any event or action that could cause loss of, or damage to computer equipment, software, data and information or processing capability
Computer Security Risk $100 Answer from H1 Computer Security Risk
$200 Question from H1 replaces the program that is used to start the computer system with a modified, infected version of the startup program
$200 Answer from H1 Boot sector virus
$300 Question from H1 virus that hides within or is designed to look like a legitimate program
$300 Answer from H1 Trojan Horse
$400 Question from H1 Copies itself repeatedly, using up resources and shutting down the computer and/or network
$400 Answer from H1 Worm
Well-known time bomb virus $500 Question from H1 Well-known time bomb virus
$500 Answer from H1 Michelangelo Virus March 6
$100 Question from H2 These programs detect viruses and inoculate against them as well as repair infected programs and files
$100 Answer from H2 Antivirus Programs Norton’s McAfee AVG
$200 Question from H2 Any item that you must carry to gain access to a computer or computer facility
$200 Answer from H2 Possessed object Badges, cards, keys,etc
$300 Question from H2 A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network
$300 Answer from H2 Firewall
$400 Question from H2 Duplicate of a file, program, or disk that can be used if the original is lost
$400 Answer from H2 Backup
$500 Question from H2 the use of a computer or data for unapproved or possibly illegal activities
$500 Answer from H2 Unauthorized use
The most common type of software theft $100 Question from H3 The most common type of software theft
$100 Answer from H3 Piracy
$200 Question from H3 antipiracy technology designed to verify that software products have been legitimately licensed
$200 Answer from H3 Product Activation
Software that is distributed free for a trial use period $300 Question from H3 Software that is distributed free for a trial use period
$300 Answer from H3 Shareware
$400 Question from H3 a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient
$400 Answer from H3 Phishing
allows network users to share a single copy of the software $500 Question from H3 allows network users to share a single copy of the software
$500 Answer from H3 Site License
$100 Question from H4 Moral guidelines that govern the use of computers, networks and information systems
$100 Answer from H4 Computer ethics
$200 Question from H4 protect original materials created by students and teachers posted on the Web , apply to all creative works , are contained in the Copyright Act of 1976 and its numerous amendments
$200 Answer from H4 Copyright Laws
$300 Question from H4 Allow educators to use certain copyrighted works for nonprofit educational purposes
$300 Answer from H4 Fair use Guidelines
$400 Question from H4 set of rules that govern the use of school and school district computers, networks, and the Internet
$400 Answer from H4 AUP Acceptable Use Policy
$500 Question from H4 Passed by Congress in 2000 to protect children from obscene, pornographic, and other harmful information
Children’s Internet Protection Act $500 Answer from H4 CIPA Children’s Internet Protection Act
$100 Question from H5 technology that will significantly impact education during the next five years
$100 Answer from H5 DVD Based Technology
$200 Question from H5 As all areas of education begin to use these, the traditional textbooks used in K-12 schools will disappear
Web and video enhanced textbooks $200 Answer from H5 Web and video enhanced textbooks
Technologies that help special needs students have equal access $300 Question from H5 Technologies that help special needs students have equal access
$300 Answer from H5 Assistive Technology
$400 Question from H5 Revolution that is dominating the first decade of the 21st century in technology
$400 Answer from H5 Wireless revolution
$500 Question from H5 These instructional strategies offer creative solutions for teacher shortages, homebound, challenged and at risk students
Web based instructional strategies $500 Answer from H5 Web based instructional strategies
Final Jeopardy An applied science devoted to incorporating comfort, efficiency and safety into the design of items in the workplace
Final Jeopardy Answer Ergonomics