Computer Basics
DIGITAL CITIZENSHIP
CYBERSECURITY
INTERNET & EMAIL
WEB DESIGN & CODING
100

What does CPU stand for?

Central Processing Unit

100

What happens to copyrighted work when copyright ends?

It enters the public domain

100

What does CIA stand for in cybersecurity?

Confidentiality, Integrity, Availability

100

What is the internet version of a home address for your computer?

IP Address

100

What does HTML stand for?

HyperText Markup Language

200

Which device connects all the physical components of a computer together?

Motherboard

200

What is a limitation on copyright that allows limited use without permission?

Fair Use

200

Which part of the CIA triad is broken if data is altered without permission?

Integrity

200

True or False: The ā€œSā€ in HTTPS means the site is secure and encrypted.

True

200

What language is used to style web pages?

CSS

300

What is the purpose of an input device?

To give data or information to the computer

300

Name two ways to avoid plagiarism.

Cite work / use quotations / use your own words

300

What is phishing?

Tricking people into giving sensitive information (generally through emails)

300

Which is NOT a good online safety practice:
Opening every email attachment or setting strong passwords?

Opening every email attachment

300

Which HTML tag is used to create a hyperlink?

The <a> tag

400

Which hardware components make up the core of a computer system?

CPU, Memory (RAM), Motherboard

400

True or False: Social media contributes to your digital footprint.

True

400

What type of malware is designed to corrupt or modify files and spread?

Virus

400

What should every professional email include? (Name at least 2)

Subject line, greeting, body, closing, signature

400

Which HTML tag is used to insert an image?

The <img> tag.

500

True or False: The computer does not keep memory of items you delete.

False

500

What is it called when a teen is harassed or threatened online?

Cyberbullying

500

What process protects data by encoding it so only authorized users can access it?

Encryption

500

True or False: Once something is posted online, it is easy to fully delete.

False

500

Why do programmers use functions?(3 reasons)

To break code into parts, avoid repetition, and improve readability