Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
An electronic device that accepts information and instructions (input) from the user performs the necessary processing and provides feedback (output)
Computer
A computer system includes two basic components, what are they?
Hardware and software
Software that helps the USER perform specific tasks
Application software
Most computer hardware perform one of two basic functions. What are they?
Input and output
Name the components of a basic computer system. Category 1 – 50 Points
Monitor, keyboard, mouse, computer or CPU
The main permanent storage on any computer system Category 2 – 10 Points
Hard Drive
A portable external storage device Category 2 – 20 Points
Flash drive or External hard drive
Non-volatile or permanent memory Category 2 – 30 Points
ROM (Read Only Memory)
A series of 8 bits is called… Category 2 – 40 Points
Byte
Computers recognize data in a string of 0s or 1s. This is called... Category 2 – 50 Points
Binary digits
Using computers for positive results Category 3 – 10 Points
Ethical computer use
Give three examples of material that can be copyright protected. Category 3 – 20 Points
Movies, poems, software, songs, dances, art work, videos, documents on the computer
Permits created items to be consumed in “fair use.” Category 3 – 30 Points
Copyright law
To protect your investment, some software companies allow you to create this for your software purchases Category 3 – 40 Points
Backup copies
When the school purchases large quantities of software for all computers in the building, it is called ________. Category 3 – 50 Points
Site license
Connecting one computer to another creates a ______. Category 4 – 10 Points
Network
What does ISP mean? Category 4 – 20 Points
Internet Service Provider
Connects one web page to a file on a network server Category 4 – 30 Points
Hyperlink
Software used to acces, retrieve, and interact with web pages like Internet Explorer are called ______ Category 4 – 40 Points
Web browser
A central storage location for programs and data is connected to a client creating a __________ Category 4 – 50 Points
Client/server network
Spreads through networks, replicating itself to take up space on your computer Category 5 – 10 Points
Worm
Looks exactly like an authentic site, but created to obtain your personal information Category 5 – 20 Points
Spoofed site
The easiest way to protect your computer from malicious programs Category 5 – 30 Points
Virus protection software
Name the three categories of viruses. Category 5 – 40 Points
Hoaxes, Worms, and Malicious programs
Virus protection software must do these two things regularly… Category 5 – 50 Points
Update and Scan