computer science
parts of a computer
online etiquette
safety
general
100

The parts of a computer that we can physically touch and see are called, ______.

Hardware

100

An example of a computer's hardware would be, ____.

A) MS Word

B) Keyboard

C) MS Publisher

Keyboard

100

Bullying online is called, _______.

Cyberbullying

100

What is cybersecurity?

is the protection of computer systems and networks from attacks.

100

What program do you use in Mrs. Jimenez's class?

Google Chrome/Classroom

200

What is virtual reality?

A simulated experience that can be similar or completely different to the real world.

200

A speaker is an ______ device.

Output

200

What is the purpose of parental controls?
a) To restrict internet access for everyone
b) To monitor and control internet usage for children
c) To increase online advertising
d) To prevent antivirus software from running
 

b) To monitor and control internet usage for children

200

Who should you tell if you are experiencing cyberbullying?

A) Parent/Guardian

B) Friends

C) Teacher

D) A & C

D) A - Parent/Guardian & C - Teacher

200

What does AI stand for in technology?

Artificial Intelligence 

300

Programs that give instructions to a computer are, _______.

Software

300

An example of software would be,

A) MS PowerPoint

B) Monitor

C) Keyboard

D) Printer

MS PowerPoint

300

What is the purpose of antivirus software?
a) To increase internet speed
b) To protect against online threats such as malware and viruses
c) To send spam emails automatically
d) To access blocked websites

b) To protect against online threats such as malware and viruses

300

What does a strong password include?

A) Capital Letters

B) Lowercase Letters

C) Symbols

D) Minimum 8 characters

E) All of the above

E) All of the above

300

WWW stands for?

World Wide Web

400

What is a "BIT" in computer science?

Binary Digit (0,01,001)
400

What kind of device is the keyboard?

Input/Hardware

400

What is the purpose of privacy settings on social media platforms?
a) To restrict internet access
b) To protect personal information and control who can view it
c) To share personal information with advertisers
d) To block all incoming messages
 

 b) To protect personal information and control who can view it

400

What is a common risk associated with sharing personal information online?
a) Increased popularity
b) Identity theft
c) Improved online security
d) Access to exclusive content
 

b) Identity theft

400

Microsoft word is used for...?

Typing

500

What is the name of the first computer?

ENIAC (Electronical Numerical Integrator and Computer)

500

_____ is known as the brain of the computer.

CPU

500

How can you protect yourself from online scams?
a) Download all available apps and software
b) Ignore warning signs and click on suspicious links
c) Avoid providing personal information to unknown sources
d) Share your credit card details on every website
 

 c) Avoid providing personal information to unknown sources

500

What is the purpose of two-factor authentication?
a) To make login processes more complicated
b) To protect against unauthorized access by requiring additional verification
c) To provide access to restricted websites
d) To increase internet speed

b) To protect against unauthorized access by requiring additional verification

500

Who is the father of computers?

Charles Babbage

M
e
n
u