Word
Security
Discovering Computers
Python
Random Stuff
100

Descriptive text associated with a figure, photo, illustration, or screenshot.

What is caption?

100

Taking someone's personal information and posing as that person for financial or legal transactions is known as________.

What is identity theft?

100

What is the piece of hardware known as the "brains of the computer"

What is CPU (central processing unit)?

100

People who write programs for digital applications are called ___________.

What are programmers?

100

What are the laws that protect a persons work that they created from being copied by someone else. 

What are copyright laws?

200

To make a paragraph really stand out, you might want to put a __________ around it or shade its background.

What is a boarder?

200

The most common occurrence of identity compromise is through ____________.

A. Stolen Wallets

B. Phishing Scams

C. Data breaches of a company that stores your information

What is C. Data breaches of a company that stores your information?

200

The physical equipment of a computer system such as its screen, keyboard and storage devices. 

What is the hardware?

200

A program is a set of ____________ that tell a ______ what to do.

What is instructions and computer?

200

The largest network used as a communication tool across the world.

What is the internet?

300

Using too many fonts in the same document is a mark of inexperience, so don't use more that ___ or ____.

What is two or three?

300

Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.

What is a hacker?

300

The information entered into the computer to be processed. It can be text, numbers, sound and images.

What is data?

300

_______text such as a word, phrase, or sentence

What is string?

300

What device do you use to move the pointer around on the screen and select things?

What is a mouse?

400

To vary the look of a font, you can change what attributes. (Please list at least 5 variants)

What are size, style, effects, bold, italic, underline, strikethrough, color, artistic text effects, superscript, subscript, highlight color and character spacing?

400

A good way to keep hackers out of a computer is to install a(n) ___________.

What is a firewall?

400

The _______ is used to indicate the location on the monitor where typing will appear. 

What is the cursor?

400

Pick the correct code for the output.

10

A. print ('5+5')

B. print (5+5)

C. print ("6+4")

What is B. print (5+5)

400

List 3 credible research websites

What is .gov, .edu, .mil sites, academic databases,  medical journals, and scholar websites. 

500

List 5 advantages of document collaboration.

What are mark up documents without losing the original document, display ad review document markup, compare and merge documents, control content changes, coauthor documents, legible feedback, implement specific changes, save trees and time, document review at the same time, a way to respond to to comments or queries, and track all changes?

500

Which of the following is a program that appears to be something malicious in the background?

A. A Bot

B. A Trojan Horse

C. A Worm

What is B. A Trojan Horse?

500

List 5 health related issues tied to computer use and explain what they are and how to alleviate them.

What is ergonomics, vision problems, back pain, sitting complications, wrist injuries, technology addiction, headaches, carpal tunnel syndrome, tennis elbow, disc injuries and mental health issues?

500

The "native language of a computer is __________.

What is binary code. A computer "speaks" in only 1's and 0's.

500

You should always protect your _______.

What is data?

M
e
n
u