Chapter 5 - System Software
Chapter 6 - System Security
100
The concentric circles on a hard disk platter are called what
tracks
100
People who use computers, networks, and the Internet to perpetrate a crime
Cybercriminals
200
What kind of interface does DOS have
command-driven
200
Name the 3 types of hackers
Black hat, grey hat, white hat
300
What term refers to the combination of the operating system and the processor
platform
300
What type of attack keeps legitimate users from accessing a Web site because a hacker is repeatedly making a request
denial of service
400
What kind of chip is the basic input/output system is stored on
ROM
400
Unwanted software that usually downloads with other software, and then runs in the background
spyware
500
Where are the different configurations used by the OS and other applications stored
registry
500
Name 3 of the 5 types of viruses identified by Chapter 6
Boot-Sector Viruses, Logic and Time Bombs, worms, E-mail Viruses, Encryption Viruses
Continue
ESC
Reveal Correct Response
Spacebar
M
e
n
u
Team 1
0
+
-
Intro to Computers Concepts Final Review II
No teams
1 team
2 teams
3 teams
4 teams
5 teams
6 teams
7 teams
8 teams
9 teams
10 teams
Custom
Press
F11
Select menu option
View > Enter Fullscreen
for full-screen mode
Edit
•
Print
•
Download
•
Embed
•
JeopardyLabs