What does CPU stand for?
Central Processing Unit
What happens to copyrighted work when copyright ends?
It enters the public domain
What does CIA stand for in cybersecurity?
Confidentiality, Integrity, Availability
What is the internet version of a home address for your computer?
IP Address
What does HTML stand for?
HyperText Markup Language
Which device connects all the physical components of a computer together?
Motherboard
What is a limitation on copyright that allows limited use without permission?
Fair Use
Which part of the CIA triad is broken if data is altered without permission?
Integrity
True or False: The āSā in HTTPS means the site is secure and encrypted.
True
What language is used to style web pages?
CSS
What is the purpose of an input device?
To give data or information to the computer
Name two ways to avoid plagiarism.
Cite work / use quotations / use your own words
What is phishing?
Tricking people into giving sensitive information (generally through emails)
Which is NOT a good online safety practice:
Opening every email attachment or setting strong passwords?
Opening every email attachment
Which HTML tag is used to create a hyperlink?
The <a> tag
Which hardware components make up the core of a computer system?
CPU, Memory (RAM), Motherboard
True or False: Social media contributes to your digital footprint.
True
What type of malware is designed to corrupt or modify files and spread?
Virus
What should every professional email include? (Name at least 2)
Subject line, greeting, body, closing, signature
Which HTML tag is used to insert an image?
The <img> tag.
True or False: The computer does not keep memory of items you delete.
False
What is it called when a teen is harassed or threatened online?
Cyberbullying
What process protects data by encoding it so only authorized users can access it?
Encryption
True or False: Once something is posted online, it is easy to fully delete.
False
Why do programmers use functions?(3 reasons)
To break code into parts, avoid repetition, and improve readability