Data
Virus
Coding
Computer Parts
Safety
100

There are two types of research, they are quantitative and qualitative ones. True or False?

True

100

What is the most common type of malware


Adware


100

_____ is a way of repeating code

Loop

100

The _______ looks like a TV screen and lets you see your work and your files.

monitor 

100

It’s recommended to make your password at least __ characters long.

8

200

What does Quantitative data deal with?

Numerical data

 

200

Which of the following is the act of accessing, downloading, copying, and distributing files without payment or the owner’s permission.

Piracy

200

A bug in computer science is...

part of a program that does not work correctly

200

Microsoft Edge, Mozilla are all examples of what?

Internet Browsers

200

A credible source is a source of information that is:

unbiased &

supported by evidence


300

What step does every scientific experiment begin with?

question/problem

300

A barrier in which the computer sets up which allows information through the port is known as what?

Firewall

300

 A _______ is a list of steps that you can follow to finish a task

Algorithm

300

Fiber Optic cable is made of what material?

Glass thread

300

How do you know if a website has an SSL certificate?

The website starts with "https" in the browser.

400

Continuous data is what?


data that can take any value and can be infinitely broken down into smaller parts

400

What is the type of software that locks your device until you pay a hacker to gain access again?

Ransomware

400

 

Fair use states...

Under certain circumstances small amounts of work can be used

400

What does Antivirus scan?


emails

personal documents

software

websites

400

What thing(s) should you look for when you are deciding whether a source is credible or not?

Date written

Author

Type of website (.edu, .gov, .com, etc.)

Type of source (news article, social media post, etc.)

500

To find out the relationship between the two variables, whether it is positive or negative is the aim of __________.

Correlation

500

 Software designed to damage a computer or phone is what?

Malware

500

The process of identifying and removing errors from computer hardware or software.

Debugging

500

What are the 3 components of the CPU?

Arithmetic and Logic Unit

 Control Unit

Registers

500

When a scammer impersonates a legitimate company, usually through email, in order to trick you into giving them money or information.

Phishing

M
e
n
u