Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40 30 20 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50.

Similar presentations


Presentation on theme: "Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40 30 20 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50."— Presentation transcript:

1

2 Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40 30 20 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50

3 An electronic device that accepts information and instructions (input) from the user performs the necessary processing and provides feedback (output)

4 Computer

5 A computer system includes two basic components, what are they?

6 Hardware and software

7 Software that helps the USER perform specific tasks

8 Application software

9 Most computer hardware perform one of two basic functions. What are they?

10 Input and output

11 Name the components of a basic computer system. Category 1 – 50 Points

12 Monitor, keyboard, mouse, computer or CPU

13 The main permanent storage on any computer system Category 2 – 10 Points

14 Hard Drive

15 A portable external storage device Category 2 – 20 Points

16 Flash drive or External hard drive

17 Non-volatile or permanent memory Category 2 – 30 Points

18 ROM (Read Only Memory)

19 A series of 8 bits is called… Category 2 – 40 Points

20 Byte

21 Computers recognize data in a string of 0s or 1s. This is called... Category 2 – 50 Points

22 Binary digits

23 Using computers for positive results Category 3 – 10 Points

24 Ethical computer use

25 Give three examples of material that can be copyright protected. Category 3 – 20 Points

26 Movies, poems, software, songs, dances, art work, videos, documents on the computer

27 Permits created items to be consumed in “fair use.” Category 3 – 30 Points

28 Copyright law

29 To protect your investment, some software companies allow you to create this for your software purchases Category 3 – 40 Points

30 Backup copies

31 When the school purchases large quantities of software for all computers in the building, it is called ________. Category 3 – 50 Points

32 Site license

33 Connecting one computer to another creates a ______. Category 4 – 10 Points

34 Network

35 What does ISP mean? Category 4 – 20 Points

36 Internet Service Provider

37 Connects one web page to a file on a network server Category 4 – 30 Points

38 Hyperlink

39 Software used to acces, retrieve, and interact with web pages like Internet Explorer are called ______ Category 4 – 40 Points

40 Web browser

41 A central storage location for programs and data is connected to a client creating a __________ Category 4 – 50 Points

42 Client/server network

43 Spreads through networks, replicating itself to take up space on your computer Category 5 – 10 Points

44 Worm

45 Looks exactly like an authentic site, but created to obtain your personal information Category 5 – 20 Points

46 Spoofed site

47 The easiest way to protect your computer from malicious programs Category 5 – 30 Points

48 Virus protection software

49 Name the three categories of viruses. Category 5 – 40 Points

50 Hoaxes, Worms, and Malicious programs

51 Virus protection software must do these two things regularly… Category 5 – 50 Points

52 Update and Scan


Download ppt "Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40 30 20 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50."

Similar presentations


Ads by Google