Vocab 1
Vocab 2
Misc.
Protect
Virus/random
100

 An electronic device that accepts information and instructions from a user, manipulates the information according to the instructions, displays the information in some way, and stores the information for retrieval later.

Computer

100

A named collection of stored data.

File

100

Two styles of personal computers

Mac & chromebook

100

A device that shares a single internet connection from your modem to multiple devices (phones, laptops, smart TVs) using radio waves (Wi-Fi), creating a local wireless network (WLAN) in your home or office, while also often providing Ethernet ports for wired connections and managing network security

Wireless Router

100

When searching in a search engine, what should you avoid typing into the search box?

entire question you want answered
(be concise but use your topic words)

200

A metaphorical locked door on a computer, as it prevents other computers on the internet from accessing your computers.

Firewall

200

Designs that may include color, shading, patterns and textures that fill the background of a PowerPoint slide.

Background Styles

200

What is the name of the cable you can use to connect your computer to the internet?

Ethernet

200

How do you protect your files when utilizing a cloud-based program?

Password/2FA

200

 When someone says they will save their document to the “cloud,” what does that mean?

You can access your document up from any device that has internet.

300

Refers to the physical components of a computer.

Hardware

300

The intangible components of a computer system, including the programs.

Software

300

The main circuit board in a computer, acting as the central hub that connects and allows communication between all essential components, like the CPU, RAM, graphics card, storage, and peripherals

Motherboard

300

A vital element of keeping your computer safe from viruses is to…

update your software automatically.

300

A program which misrepresents itself to appear needful, routine, or interesting in order to persuade a victim to install it.

Computer Trojan Horse

400

The largest network in the world, connecting millions of people.

Internet

400

Temporarily stores data (short-term memory) and programs, while you are using them

RAM

400

What is the purpose of a surge protector on a computer?

Safeguard its sensitive internal components from sudden, damaging spikes in electrical voltage (power surges) caused by lightning or grid issues

400

The term for software that can damage an individual’s computer?

Malware

400

A program that replicates itself by attaching to other programs already installed on the computer.

Computer Virus

500

Microprocessor, processor – responsible for executing instructions to process data, brains of the computer.

CPU

500

Permanently stores (long-term memory) the set of instructions that the computer uses to activate the software that control processing functions

Hard Drive

500

 What is the term for copying your files from one computer to another?

Migrating

500

A type of scam in which an email pretends to be from a bank or another trusted source to trick you into handing over your personal information.

Phishing

500

A program that replicates itself in order to spread to other computers, often relying on security failures on the target computer.

Computer Worm

M
e
n
u