Download presentation
Presentation is loading. Please wait.
Published byViolet Jackson Modified over 6 years ago
1
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Safeguards Theft Q $100 Q $100 Q $100 Q $100 Q $100 Q $200 Q $200 Q $200 Q $200 Q $200 Q $300 Q $300 Q $300 Q $300 Q $300 Q $400 Q $400 Q $400 Q $400 Q $400 Q $500 Q $500 Q $500 Q $500 Q $500 Final Jeopardy
2
$100 Question from H1 any event or action that could cause loss of, or damage to computer equipment, software, data and information or processing capability
3
Computer Security Risk
$100 Answer from H1 Computer Security Risk
4
$200 Question from H1 replaces the program that is used to start the computer system with a modified, infected version of the startup program
5
$200 Answer from H1 Boot sector virus
6
$300 Question from H1 virus that hides within or is designed to look like a legitimate program
7
$300 Answer from H1 Trojan Horse
8
$400 Question from H1 Copies itself repeatedly, using up resources and shutting down the computer and/or network
9
$400 Answer from H1 Worm
10
Well-known time bomb virus
$500 Question from H1 Well-known time bomb virus
11
$500 Answer from H1 Michelangelo Virus March 6
12
$100 Question from H2 These programs detect viruses and inoculate against them as well as repair infected programs and files
13
$100 Answer from H2 Antivirus Programs Norton’s McAfee AVG
14
$200 Question from H2 Any item that you must carry to gain access to a computer or computer facility
15
$200 Answer from H2 Possessed object Badges, cards, keys,etc
16
$300 Question from H2 A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network
17
$300 Answer from H2 Firewall
18
$400 Question from H2 Duplicate of a file, program, or disk that can be used if the original is lost
19
$400 Answer from H2 Backup
20
$500 Question from H2 the use of a computer or data for unapproved or possibly illegal activities
21
$500 Answer from H2 Unauthorized use
22
The most common type of software theft
$100 Question from H3 The most common type of software theft
23
$100 Answer from H3 Piracy
24
$200 Question from H3 antipiracy technology designed to verify that software products have been legitimately licensed
25
$200 Answer from H3 Product Activation
26
Software that is distributed free for a trial use period
$300 Question from H3 Software that is distributed free for a trial use period
27
$300 Answer from H3 Shareware
28
$400 Question from H3 a scam in which a perpetrator sends an official-looking that attempts to obtain personal and financial information from the recipient
29
$400 Answer from H3 Phishing
30
allows network users to share a single copy of the software
$500 Question from H3 allows network users to share a single copy of the software
31
$500 Answer from H3 Site License
32
$100 Question from H4 Moral guidelines that govern the use of computers, networks and information systems
33
$100 Answer from H4 Computer ethics
34
$200 Question from H4 protect original materials created by students and teachers posted on the Web , apply to all creative works , are contained in the Copyright Act of 1976 and its numerous amendments
35
$200 Answer from H4 Copyright Laws
36
$300 Question from H4 Allow educators to use certain copyrighted works for nonprofit educational purposes
37
$300 Answer from H4 Fair use Guidelines
38
$400 Question from H4 set of rules that govern the use of school and school district computers, networks, and the Internet
39
$400 Answer from H4 AUP Acceptable Use Policy
40
$500 Question from H4 Passed by Congress in 2000 to protect children from obscene, pornographic, and other harmful information
41
Children’s Internet Protection Act
$500 Answer from H4 CIPA Children’s Internet Protection Act
42
$100 Question from H5 technology that will significantly impact education during the next five years
43
$100 Answer from H5 DVD Based Technology
44
$200 Question from H5 As all areas of education begin to use these, the traditional textbooks used in K-12 schools will disappear
45
Web and video enhanced textbooks
$200 Answer from H5 Web and video enhanced textbooks
46
Technologies that help special needs students have equal access
$300 Question from H5 Technologies that help special needs students have equal access
47
$300 Answer from H5 Assistive Technology
48
$400 Question from H5 Revolution that is dominating the first decade of the 21st century in technology
49
$400 Answer from H5 Wireless revolution
50
$500 Question from H5 These instructional strategies offer creative solutions for teacher shortages, homebound, challenged and at risk students
51
Web based instructional strategies
$500 Answer from H5 Web based instructional strategies
52
Final Jeopardy An applied science devoted to incorporating comfort, efficiency and safety into the design of items in the workplace
53
Final Jeopardy Answer Ergonomics
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.