Computer Basics
Netiquette +
Networks
Networks part 2
Junk Mail
100
information that has been translated into a form that is more convenient to move or process
What is Data
100
What does rule #1, remember the human, mean
What is Respect Others
100
this sends data to every computer on the network at the same time
What is a Hub
100
this does not require human interaction to spread from computer to computer
What is a Worm
100
sequence, selection, repetition
What are types of Algorithms
200
a wireless, portable personal computer with a touchscreen interface
What is a Tablet Computer
200
expressing a strongly held opinion without holding back any emotion
What is Flaming
200
worms, viruses, trojan horses
What are Malicious Programs
200
what values can a boolean expression have
What are True and False
200
binary is an example of a …..
What is a Positional Number System
300
input, processing, storage, output
What are the parts of the information Processing Cycle
300
the correct way to interact with people through technology
What is Netiquette
300
this was released in 1984 and is considered the first virus
What is Core Wars
300
the internet started as a project for this Government department
What is the Defense Department
300
two things data must have to become information
What are Meaning and Context
400
keyboard, mouse
What are input devices
400
this is a type of anti-malware software
What is Malware Bytes
400
electronic junk mail or junk newsgroup postings
What is Spam
400
resource sharing, distribution of workload, expandability/scalability
What are the advantages of computer networks
400
1011101 in decimal
What is 93
500
this is also called a logic chip
What is a Microprocessor
500
this is the most recommended browser because it has the best security and it auto-updates
What is Chrome
500
this may open a "backdoor" to allow access to your system
What is a Trojan Horse
500
star, ring, linear
What are types of Network Typologies
500
adding these around my search will narrow my results
What are Quotation Marks