Download presentation
Presentation is loading. Please wait.
Published byJewel Cole Modified over 9 years ago
2
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System 50 40 30 20 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50
3
An electronic device that accepts information and instructions (input) from the user performs the necessary processing and provides feedback (output)
4
Computer
5
A computer system includes two basic components, what are they?
6
Hardware and software
7
Software that helps the USER perform specific tasks
8
Application software
9
Most computer hardware perform one of two basic functions. What are they?
10
Input and output
11
Name the components of a basic computer system. Category 1 – 50 Points
12
Monitor, keyboard, mouse, computer or CPU
13
The main permanent storage on any computer system Category 2 – 10 Points
14
Hard Drive
15
A portable external storage device Category 2 – 20 Points
16
Flash drive or External hard drive
17
Non-volatile or permanent memory Category 2 – 30 Points
18
ROM (Read Only Memory)
19
A series of 8 bits is called… Category 2 – 40 Points
20
Byte
21
Computers recognize data in a string of 0s or 1s. This is called... Category 2 – 50 Points
22
Binary digits
23
Using computers for positive results Category 3 – 10 Points
24
Ethical computer use
25
Give three examples of material that can be copyright protected. Category 3 – 20 Points
26
Movies, poems, software, songs, dances, art work, videos, documents on the computer
27
Permits created items to be consumed in “fair use.” Category 3 – 30 Points
28
Copyright law
29
To protect your investment, some software companies allow you to create this for your software purchases Category 3 – 40 Points
30
Backup copies
31
When the school purchases large quantities of software for all computers in the building, it is called ________. Category 3 – 50 Points
32
Site license
33
Connecting one computer to another creates a ______. Category 4 – 10 Points
34
Network
35
What does ISP mean? Category 4 – 20 Points
36
Internet Service Provider
37
Connects one web page to a file on a network server Category 4 – 30 Points
38
Hyperlink
39
Software used to acces, retrieve, and interact with web pages like Internet Explorer are called ______ Category 4 – 40 Points
40
Web browser
41
A central storage location for programs and data is connected to a client creating a __________ Category 4 – 50 Points
42
Client/server network
43
Spreads through networks, replicating itself to take up space on your computer Category 5 – 10 Points
44
Worm
45
Looks exactly like an authentic site, but created to obtain your personal information Category 5 – 20 Points
46
Spoofed site
47
The easiest way to protect your computer from malicious programs Category 5 – 30 Points
48
Virus protection software
49
Name the three categories of viruses. Category 5 – 40 Points
50
Hoaxes, Worms, and Malicious programs
51
Virus protection software must do these two things regularly… Category 5 – 50 Points
52
Update and Scan
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.