Ethic
Computer Hardware
Operating systems
Security
Fun
100

Is cyber bullying ok?

No because there are hurtful things that you can say to someone while messaging in a online game or chatting on someone on a online dating app

100

What are the the physical components to a computer?

CPU, RAM, motherboard, hard drive, GPU, power supply, and input/output devices such as a keyboard and mouse. 

100
What are some good operating systems?
Linux, Microsoft Windows, macOS and Android are really good at operating within online.
100

What is good security? 

Protecting valuable assets, information, and resources from unauthorized access, use, disclosure, disruption, modification, or destruction

100

What NFL team plays in San Francisco 

The 49ers

200

What is cyber bullying?

The use of technology to harass, threaten, embarrass, or target another person.

200

Where is the motherboard?

The motherboard is the main printed circuit board in a computer, and it's typically located within the computer case.

200

How do you use a operating system?

Interacting with its user interface, typically a graphical user interface to access and control computer resources and applications.

200

What makes a secure security?

Relies on a layered approach, incorporating physical and digital elements, with strong authentication, access controls, and robust incident response procedures

200

Who was the first person to start the 50/50 club in MLB

Shohei Ohtani

300

Where do online attacks come from?

Individuals, groups, and even state-sponsored actors, motivated by financial gain, political agendas, or personal reasons

300

What happens when the computer gets to hot?

When a computer overheats, it can lead to performance issues, such as slowing down, shutting down, or restarting.

300

How fast do operating systems work?

Operating systems generally work extremely quickly, performing thousands of tasks per second

300

What is security prevention?

Implementing measures to proactively stop security threats and vulnerabilities from occurring or being exploited

300

When was Patrick Mahomes drafted to the NFL

The 2017 Draft
400

What information do attackers get?

Social Security numbers — used to open credit accounts or file fraudulent tax returns. Credit card details

400

How do you remove the CPU from the computer?

First open the computer case and locate the CPU on the motherboard. Then, release the bracket or lever holding the CPU in the socket, and carefully lift the CPU out, holding it by the edges

400

What are hazards of operating systems?

Operating systems present several hazards, primarily revolving around security, stability, and resource management

400

What are safety hazards of security?

Physical injuries like slips, trips, and falls, chemical and biological exposures, and psychological stress

400

How many strike outs did Pedro Martinez get in his career

3,154 strike outs

500

How do you find someone that is an attacker?

Almost impossible to trace to their true source using current practices.

500

What is the hardest part about the motherboard?

The complex process of troubleshooting and repairing issues due to its interconnectedness of components

500

What makes a operating system?

Software that manages computer hardware and software resources, acting as an interface between users and the computer's hardware.

500

How does security work?

The measures taken to protect individuals, property, or information from threats, risks, and potential harm

500

Who has the most passing yards in NFL history 

Tom Brady 

M
e
n
u