DAILY DOUBLE
Computer Science
Stands up for the victim of bullying...
Upstander
Passwords should contain...
Letters, numbers and symbols
The circuit board used to connect the main devices of a computer.
DAILY DOUBLE
Motherboard
Legal rights protecting creative works and inventions.
DAILY DOUBLE
Intellectual Property
The word computer was first used in what year?
1613
Bystander
What you leave behind every single time you are using the Internet...
Digital Footprint
Is the brains of the computer...
CPU or Central Processing Unit
A non-profit organization that offers free licenses to creators so they can make their work available to the public.
DAILY DOUBLE
Creative Commons
Something or someone used to make computations and calculations...
Computer
The one who gets bullied...
Target or victim
Devices can be tracked through the Internet by its...
IP Address
Temporarily stores data...
RAM or Random Access Memory
The practice of taking someone else's work or ideas and passing them off as one's own.
Plagiarism
Who invented the world wide web?
Tim Berners-Lee
Ways to deal with bullies...
Avoid, Ignore, Stand Up to them, Report them, travel in packs
One misconception about password security is...
DAILY DOUBLE
Changing your password frequently
Your password is secure with large companies
Biometrics can solve all your security problems
Permanently stores data...
Hard Drive
Larry has a logo for his company and it looks a lot like Nike's logo. This is an example of image _________?
Plagiarism
One of the oldest computers was the Chinese ______.
Abacus
What is the definition of a bully given in class?
Someone who seeks power or laughter at the expense of another.
Name the 3 types of hackers and what they do...
White Hat Hackers: Hired by companies
Grey Hat Hackers: Let companies know when they have been hacked and request payment
Bacl Hat Hackers: Illegally access networks for $
BIOS (boots everything up)
Basic Input Output System
Copying a song someone else wrote is an example of ____________ plagiarism?
Text