A type of fair use often seen on the internet. One that makes a joke using copyright material. Often a picture with text.
A Meme
Ctrl Z does this function.
Undo
What is the acronym www stand for?
World Wide Web
A type of malware that only affects your computer once a file has been executed.
Virus
Top left corner. Not in header.
The tab in word and google docs that allows you to place a picture in the document.
Insert
A smart phone is also this.
Computer
This is the worlds largest network
The Internet
A type of Malware that can infect you computer without executing a file and can spread throughout your networks
Worm
This protects tangible intellectual works such as; tv shows, digital art, movies, music, and literature.
Copyright
The specific format of text wrapping that separates text from an image.
In front of or behind text
A monitor is this kind of device.
Output Device
This is the first and most important rule of netiquette. (online etiquette)
Remember the Human
In this order tell me the what type of hackers are
1. Black Hats
2. Gray Hats
3. White Hats
1. Bad
2. Neutral
3. Good
0101110001001100 is an example of this kind of information.
Binary Information
The name of the line that surrounds an image. Can be adjusted and the color change.
Border
These are the letters of home row.
asdfjkl;
These types of companies have towers everywhere and host very large networks. (3 companies or the type of company for the correct answer)
Wireless providers, Mobile phone companies, Internet access companies, Sprint, Spectrum, Frontier, AT&T, Verizon, Cricket, etc.
This type of cyber attack sends thousands of pings to a website or server and disrupts service.
DDOS (Distributed Denial of Service)
The correct order based on size of the the following words.
Gigabyte, Kilobyte, Terabyte, and Megabyte
1. Kilobyte
2. Megabyte
3. Gigabyte
4. Terabyte
The default line spacing in a word document.
Single
The direction of this determines if a device is input or output.
Information
This is the default browser for Macintosh or IOS.
Safari
Passwords, usernames, bank information, and search history can all be stolen by this type of Malware.
Spyware
This type of information is represented by sound and light waves
Analog information