There are two types of research, they are quantitative and qualitative ones. True or False?
True
What is the most common type of malware
Adware
_____ is a way of repeating code
Loop
The _______ looks like a TV screen and lets you see your work and your files.
monitor
It’s recommended to make your password at least __ characters long.
8
What does Quantitative data deal with?
Numerical data
Which of the following is the act of accessing, downloading, copying, and distributing files without payment or the owner’s permission.
Piracy
A bug in computer science is...
part of a program that does not work correctly
Microsoft Edge, Mozilla are all examples of what?
Internet Browsers
A credible source is a source of information that is:
unbiased &
supported by evidence
What step does every scientific experiment begin with?
question/problem
A barrier in which the computer sets up which allows information through the port is known as what?
Firewall
A _______ is a list of steps that you can follow to finish a task
Algorithm
Fiber Optic cable is made of what material?
Glass thread
How do you know if a website has an SSL certificate?
The website starts with "https" in the browser.
Continuous data is what?
data that can take any value and can be infinitely broken down into smaller parts
What is the type of software that locks your device until you pay a hacker to gain access again?
Ransomware
Fair use states...
Under certain circumstances small amounts of work can be used
What does Antivirus scan?
emails
personal documents
software
websites
What thing(s) should you look for when you are deciding whether a source is credible or not?
Date written
Author
Type of website (.edu, .gov, .com, etc.)
Type of source (news article, social media post, etc.)
To find out the relationship between the two variables, whether it is positive or negative is the aim of __________.
Correlation
Software designed to damage a computer or phone is what?
Malware
The process of identifying and removing errors from computer hardware or software.
Debugging
What are the 3 components of the CPU?
Arithmetic and Logic Unit
Control Unit
Registers
When a scammer impersonates a legitimate company, usually through email, in order to trick you into giving them money or information.
Phishing