Scottie's Final
The word "Apple" translated into its ASCII number equivalent is: (Remember, it is case sensitive)
065 112 112 108 101
Decimal to Binary-What is decimal 246 in Binary=
11110110
Binary to Decimal-What is Binary 11010010 in decimal?
210
Decimal to Hex- What is decimal 43 in Hexadecimal=
2B
Hex to Decimal- What is the decimal value for 0x13A=
314
A type of website that allows content to be edited or created by anyone. This allows content to stay up to date and (ideally) allows for errors to be found and corrected.
A "Wiki"
A type of computer that forwards data across a network
A Server
A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
A bit
What is Wi-Fi?
A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
A group of computers and servers that are connected to each other.
A network
Computer programs that can block, detect, and remove viruses and other malware.
Antivirus Software
To guard against malware, you will need to have ________.
Antivirus Software
Extra copies of computer files that can be used to restore files that are lost or damaged.
Backups/backing up files
The amount of data that can pass through a network or part of a network per second.
Bandwidth
Transmission capacity measure by bit rate
Bandwidth
The number of bits per second a system can transmit.
Bitrate
CTRL+B
Bold
A group of computers that is networked together and used by hackers to steal information is called a ...
Botnet
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn't be achieved with a single computer.
Botnet
CTRL+E
Center
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
Computer Virus
Microsoft Word, Google Chrome, iTunes, and Adobe Photoshop are examples of ___________.
Computer applications
If a Windows program has become unresponsive, which keys do you press to open the Task Manager?
Control, Alt, Delete
CTRL+C
Copy
Attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
DDOS
A method of sending information using telephone or television cables
DSL/Cable
CTRL+X
Delete
The service that translates URLs to IP addresses
Domain Name Service (DNS)
A fictional virus modeled after the Stuxnet virus. Like Stuxnet, This is able to damage physical infrastructure
Doxnet
Is a system for sending and receiving electronic mail online.
Prevents unauthorized people from reading data that is transmitted over your wireless network
Encryption
The process of using codes to make readable information unreadable. This information cannot be read until it is decrypted using a secret key.
Encryption
True or False: You cannot get a computer virus if you install antivirus software.
False
A cable that uses light to send information
Fiber-Optic Cable
Software designed to block malware from entering protected networks.
Firewall
What is hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access.
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Hacktivist
CTRL+A
Highlight all
CTRL+K
Hyperlink
A number assigned to any item that is connected to the Internet.
IP Address
What is this called: 125.0.0.1
IP Address
CTRL+M
Indent
Is a type of chat where you communicate with a specific person instead of an entire chat room.
Instant Message
Involves robbing people or companies of their ideas, inventions, and creative expression.
Intellectual Property Theft
CTRL+I
Italicize
A program that records every key struck on a keyboard and sends that information to an attacker.
Keylogger Malware
CTRL+L
Left align
Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
Malware
RAM is like a computer's ______________, while a hard drive is like a computer's ______________
Memory; brain
The most popular operating system for personal computers is ________.
Microsoft Word
The main circuit board in a computer is called the ________.
Motherboard
The principle that all Internet traffic should be treated equally by Internet Service Providers.
Net neutrality
Is a piece of hardware that allows computers to communicate over a computer network
Network Card
Having multiple backups to ensure reliability during cases of high usage or failure
Network redundancy
CTRL+N
New
Is a system that allows users to communicate in real time. Unlike e-mail, all messages show up immediately in the same window, which makes conversations quicker and easier.
Online Chat
CTRL+O
Open
Windows, OS X, and Linux are examples of __________.
Operating systems
Small chunks of information that have been carefully formed from larger chunks of information
Packets
Small chunks of information that have been carefully formed from larger chunks of information.
Packets
CTRL+V
Paste
PDA is short for ________.
Personal Digital Assistant
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Phishing
Peripherals that can be instantly recognized by your computer are known as ________.
Plug and play
You can subscribe to a series of audio or video files that will automatically be downloaded to your computer.
Podcast
CTRL+P
A type of malware that holds victims' computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
Ransomware
Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called ...
Ransomware
CTRL+Y
Repeat typing
CTRL+R
Right align
This is the name of a wireless network. You may not want to use your actual name, but you can use a hobby or other interest (for example, rockclimbing1).
SSID (Service Set Identifier)
CTRL+S
Save
Is a computer that serves many different computers in a network by running specialized software and storing information.
Server
A non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Social Engineering
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
Software Patch
A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Software Vulnerability
Unsolicited emails sent to many addresses. The purpose is to make money through advertising or identity theft
Spam
The cloud allows you to ________.
Store things on the internet rather than your computer's hard drive.
This is the largest computer network in the world, connecting millions of computers.
The Internet
What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the "s")?
The S stands for "Secure". If the web address begins with https://, means your computer is talking to the website in a secure code that no one can eavesdrop on.
Codes have been used for thousands of years in order to:
To keep communications secret
Why do hackers hack?
To steal information, to make a statement and because they can
Instead of a mouse, many laptops use a(n) ________.
Touchpad
True or False: Applications can be downloaded from the Internet.
True
True or False: It is possible to connect peripherals to a laptop.
True
True or False: Some modems include a built-in router.
True
True or False: When something is saved to the cloud, it means it's stored on the Internet instead of on your computer's hard drive.
True
What does a computer allow you to do?
Type documents, send emails, browse the internet, store and retrieve data
What is the technical term for a website? www.ESPN.com?
URL
A mouse can connect to the computer with a ________ connection.
USB, PS/2, Bluetooth
CTRL+U
Underline
CTRL+Z
Undo Typing
Which of the following is a type of monitor port?
VGA port, Display Port, DVI port
This runs familiar software such as web browsers or email software, and it communicates with the server to get the information it requires.
Web server
A method of sending information using radio waves.
Wi-Fi
To navigate through different folders in Windows, you'll use ________ .
Windows Explorer
A binary question is defined as:
Yes/No or True/False questions are binary questions
Which of the following statements are true? a. The Internet gives us access to many resources we couldn't otherwise come in contact with. b. Information can always be trusted to be factual. c. Anything I send in my private email cannot be seen by others. d. Everything that you post online leaves a digital footprint. e. Websites must have my permission to post any personal information about me, like my phone number, address or birthday.
a. The Internet gives us access to many resources we couldn't otherwise come in contact with, d. Everything that you post online leaves a digital footprint
You are in the middle of working on a document and your computer freezes. Which of the following keystroke combinations will bring up the Task Manager on a PC so that you can force the program to quit? a. [CTRL+ALT+DELETE] b. [ALT+SHIFT+CTRL] c. [SHIFT+ENTER] d. [CTRL+SHIFT+TAB]
a. [CTRL+ALT+DELETE]
Which of the following are unethical and/or illegal behaviors? a. plagiarizing b. texting c. hacking d. cyberbullying
a. plagiarizing, c. hacking, d. cyberbullying
"Spamming" is very poor netiquette and means: a. posting or emailing unsolicited advertising messages to a wide audience b. sending in lines of nonsensical garbage in a chat conversation c. posting pictures of meat-byproducts on your desktop d. posting a message that contains graphic descriptions of something really gross
a. posting or emailing unsolicited advertising messages to a wide audience
Which of the following are risky behaviors online? a. sharing your password with a good friend b. posting a picture of your cat c. video chatting with your grandparents d. sharing a friend's poem with his permission e. posting a photo of you standing in front of your school
a. sharing your password with a good friend, e. posting a photo of you standing in front of your school
Which of the following is an example of effective online searching? a. Do a random keyword search on a search engine of your choice. Then, quickly browse through all the results listed and find the ones you think have the most useful information. b. Formulate research questions, list possible sources of information, identify keywords, and begin your search. c. Visit chat rooms and find out what others are saying about your topic. d. Post a question about your topic on a message board and read all the responses.
b. Formulate research questions, list possible sources of information, identify keywords, and begin your search.
Why shouldn't you post personal information in your blog? a. You should. Blogs are supposed to be personal. b. Personal information can be used to harm you. c. People won't read your blog if they know who you are. d. The best blogs are written anonymously.
b. Personal information can be used to harm you.
A computer which links several PCs together in a network is called a _____. a. Minicomputer b. Server c. Client d. main frame
b. Server
Which of the following is the best indicator that a Website is reliable? a. The author of the site tells you the information is reliable. b. The author of the site provides contact information and his or her credentials. c. The author links to his or her favorite Websites. d. The author clearly states that the site has been proofread.
b. The author of the site provides contact information and his or her credentials.
You need to combine and modify some pictures for a project you're working on. Which of the following application types would be best suited to the task? a. presentation b. graphics c. multimedia d. spreadsheet e. word processing
b. graphics
Use ________________ when conducting an Internet search to ensure that your keywords appear in your search results in the order specified. a. capital letters b. quotation marks c. complete sentences d. dashes
b. quotation marks
Time it takes for a bit to travel from its sender to its receiver.
bit rate
A website that is usually updated frequently, often with news articles or random thoughts.
blog
Which one of the following is NOT an example of an extension in a URL? a. .gov b. .org c. .npr d. .com
c. .npr
This measures the computer's CPU speed: a. Gigabytes b. Bytes c. Hertz d. RAM
c. Hertz
What operating system do we use in the computer lab? a. Linux b. iOS c. Microsoft Windows d. Microsoft Office
c. Microsoft Windows
The main circuit board where all critical components of the computer are plugged in is the: a. Power Supply b. Peripherals c. Motherboard d. Hard drive
c. Motherboard
Which of these is an example of remote data storage? a. Saving a digital photo to a computer's hard drive. b. Saving a digital photo to a flash drive. c. Saving a digital photo to the cloud. d. Saving a digital photo to a CD.
c. Saving a digital photo to the cloud.
You and your classmates each researched a different environmental issue. Your teacher has asked you to organize the information to share with students all over the world. Which of the following is the best solution? a. Take everyone's report and copy and paste the text into one email so you can send it to anyone who contacts you. b. Create a slideshow presentation with information about each environmental issue and put it on a flash drive. c. Set up a blog or wiki and dedicate one page to each environmental issue, and then publish it to the Web. d. Create a group podcast in which each classmate talks about his or her environmental issue and then save it to the desktop.
c. Set up a blog or wiki and dedicate one page to each environmental issue, and then publish it to the Web.
What does CPU stand for? a. core processing unit b. computer processing unit c. central processing unit
c. central processing unit
Which of the following statements about search engines is true? a. A search engine does not discriminate between good and bad sites. b. A search engine displays all Web pages that contain your keywords and may list thousands of unordered results. c. Some of the first page results are reserved for paying customers. d. All of the above
d. All of the above
Critically evaluating content on the Web is important because... a. Web authors are always less professional. b. Web authors are always biased. c. Printed information is always more accurate than information found on the Web. d. Anyone can publish on the Web. There's no guarantee that what you're reading is objective and has gone through standard fact-checking and editorial reviews.
d. Anyone can publish on the Web. There's no guarantee that what you're reading is objective and has gone through standard fact-checking and editorial reviews.
What does a network enable computers to do? a. solve complicated mathematical problems b. communicate with other computers c. take commands from users d. all of the above
d. all of the above
As part of your science fair report, you've been asked to measure, record, and graph the effects of sugar on plant growth. What application would be best to record and graph the data collected? a. online database b. word processor c. draw/paint program d. spreadsheet
d. spreadsheet
What does a firewall do? a. Prevents outsiders from connecting to your computer over the internet. b. Makes sure that any peripherals you plug into your computer don't damage it. c. Removes viruses from your computer. d. Blocks pop-ups when browsing. e. All of the above
e. All of the above
Which of the following is not a computer input device? a. monitor b. keyboard c. mouse d. digital camera e. scanner
e. scanner