Where are websites stored on the Internet?
Servers
What symbol is displayed in the address bar that indicates it is a safe site to enter personal information?
A lock or padlock
What is the fastest way to change all of the slide layouts and colors of your presentation?
Theme
The legal right granted to the creator of an original work, giving them exclusive rights to use, distribute, and modify that work.
Copyright
What hardware device receives and retransmits a wireless signal to extend the range of a Wi-Fi network, effectively creating a stronger signal in areas with weak or no coverage.
Repeater
When text is shown with a red, squiggly line under it, you can right-click it to ...
Choose spelling or grammar check
Software that is designed to damage your computer or gain unauthorized access.
Malware
The place where the column and row intersect on a spreadsheet is called a
Cell
Creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce.
Intellectual Property
If you see bullying and respond by confronting the bully you are reacting as a _____
Upstander
___ is a letter sent with, and explaining the contents of your resume and application explaining why you would be a good fit for a job opening.
Cover Letter
the trail of data you leave behind when using the internet, including website visits, social media posts, emails, and any other online activity
Digital Footprint
To preview your Google Form, click on the button that looks like a (an)
Eye
A legal doctrine that allows limited use of copyrighted material without requiring permission from the rights holders, under certain conditions.
Fair use
Short for Binary Digit - the name for a single unit of information in a computer often represented as a 0 or 1.
Bit
___ is the physical components of a computer system, encompassing both internal and external devices that can be touched or seen
Hardware
When someone tries to steal or access your information, it is called......
Hacking
____ is the process of joining more than one cell together
Merge / Merging / Merge Cells
The practice of taking someone else's work or ideas and passing them off as one's own without proper attribution.
Plagiarism
This is made up of 8 Bits
Byte
___ refers to the instructions, data, or computer programs that tell a computer what to do and how to do it.
Software
the state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone.
Privacy
Which function would you use to add the values of five cells together?
=SUM
A symbol, word, or words legally registered or established by use as representing a company or product.
Trademark
A system of interconnected devices (like computers, servers, or other hardware) that share data and resources.
Network