Computer History
Cyberbullying
Cyber-Intelligence
Computer Components
Info Literacy
100
Solving problems quicker and easier...


DAILY DOUBLE

Computer Science

100

Stands up for the victim of bullying...

Upstander

100

Passwords should contain...

Letters, numbers and symbols

100

The circuit board used to connect the main devices of a computer.


DAILY DOUBLE

Motherboard

100

Legal rights protecting creative works and inventions. 


DAILY DOUBLE

Intellectual Property


200

The word computer was first used in what year?

1613

200
Does nothing when witnessing bullying...

Bystander

200

What you leave behind every single time you are using the Internet...

Digital Footprint

200

Is the brains of the computer...

CPU or Central Processing Unit

200

A non-profit organization that offers free licenses to creators so they can make their work available to the public. 


DAILY DOUBLE

Creative Commons

300

Something or someone used to make computations and calculations...

Computer

300

The one who gets bullied...

Target or victim

300

Devices can be tracked through the Internet by its...

IP Address

300

Temporarily stores data...

RAM or Random Access Memory

300

The practice of taking someone else's work or ideas and passing them off as one's own.

Plagiarism

400

Who invented the world wide web?

Tim Berners-Lee

400

Ways to deal with bullies...

Avoid, Ignore, Stand Up to them, Report them, travel in packs

400

One misconception about password security is...


DAILY DOUBLE 

Changing your password frequently

Your password is secure with large companies

Biometrics can solve all your security problems

400

Permanently stores data...

Hard Drive

400

Larry has a logo for his company and it looks a lot like Nike's logo. This is an example of image _________?

Plagiarism

500

One of the oldest computers was the Chinese ______.

Abacus

500

What is the definition of a bully given in class?

Someone who seeks power or laughter at the expense of another.

500

Name the 3 types of hackers and what they do...

White Hat Hackers: Hired by companies

Grey Hat Hackers: Let companies know when they have been hacked and request payment

Bacl Hat Hackers: Illegally access networks for $

500

BIOS (boots everything up)

Basic Input Output System

500

Copying a song someone else wrote is an example of ____________ plagiarism?

Text

M
e
n
u