The parts of a computer that we can physically touch and see are called, ______.
Hardware
An example of a computer's hardware would be, ____.
A) MS Word
B) Keyboard
C) MS Publisher
Keyboard
Bullying online is called, _______.
Cyberbullying
What is cybersecurity?
is the protection of computer systems and networks from attacks.
What program do you use in Mrs. Jimenez's class?
Google Chrome/Classroom
What is virtual reality?
A simulated experience that can be similar or completely different to the real world.
A speaker is an ______ device.
Output
What is the purpose of parental controls?
a) To restrict internet access for everyone
b) To monitor and control internet usage for children
c) To increase online advertising
d) To prevent antivirus software from running
b) To monitor and control internet usage for children
Who should you tell if you are experiencing cyberbullying?
A) Parent/Guardian
B) Friends
C) Teacher
D) A & C
D) A - Parent/Guardian & C - Teacher
What does AI stand for in technology?
Artificial Intelligence
Programs that give instructions to a computer are, _______.
Software
An example of software would be,
A) MS PowerPoint
B) Monitor
C) Keyboard
D) Printer
MS PowerPoint
What is the purpose of antivirus software?
a) To increase internet speed
b) To protect against online threats such as malware and viruses
c) To send spam emails automatically
d) To access blocked websites
b) To protect against online threats such as malware and viruses
What does a strong password include?
A) Capital Letters
B) Lowercase Letters
C) Symbols
D) Minimum 8 characters
E) All of the above
E) All of the above
WWW stands for?
World Wide Web
What is a "BIT" in computer science?
What kind of device is the keyboard?
Input/Hardware
What is the purpose of privacy settings on social media platforms?
a) To restrict internet access
b) To protect personal information and control who can view it
c) To share personal information with advertisers
d) To block all incoming messages
b) To protect personal information and control who can view it
What is a common risk associated with sharing personal information online?
a) Increased popularity
b) Identity theft
c) Improved online security
d) Access to exclusive content
b) Identity theft
Microsoft word is used for...?
Typing
What is the name of the first computer?
ENIAC (Electronical Numerical Integrator and Computer)
_____ is known as the brain of the computer.
CPU
How can you protect yourself from online scams?
a) Download all available apps and software
b) Ignore warning signs and click on suspicious links
c) Avoid providing personal information to unknown sources
d) Share your credit card details on every website
c) Avoid providing personal information to unknown sources
What is the purpose of two-factor authentication?
a) To make login processes more complicated
b) To protect against unauthorized access by requiring additional verification
c) To provide access to restricted websites
d) To increase internet speed
b) To protect against unauthorized access by requiring additional verification
Who is the father of computers?
Charles Babbage