Keyboard Techniques
Computer Components
Phishing and Scamming
Copyright Terms
Target Audience and Marketing
100

You press these keys when you want to log out of your computer.

What is Shift+Command+Q

100

This helps keep the computer from overheating.

What is the cooling system?

100

when someone poses as an institution to try and get you to share your information...

What is phishing?

100
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.


What is copyright? 

100

a specific group of people who are likely to buy a product


What is Target Audience?

200

This is the button you press when someone else's login is on the desktop. HINT: It is on the back on the bottom left corner of the monitor.

What is the power button?

200

This is the "brain" of the computer, helping it process information.

What is the CPU/Central Processing Unit?

200

This is something you own that someone else would want to steal.

What is identity?

200

The length of time the law allows copyright owners to hold the exclusive rights on their original works.


What is Copyright Term? 

200

The process of promoting and selling a product...

What is Marketing?

300

These are the 2 keys that should be visible on your keyboard when following proper typing techniques.

What is G and H 

300

This chip holds the memory in the computer.

What is RAM?

300

A web address that has been condensed and could lead a user to a risky website. 

What is a shortened URL? 
300

Treat others work the way you want yours to be treated. 

What is the Golden Rule of Copyright? 

300

The identity or image of a product or company...

What is Brand? 
400

You press these keys to take a screenshot on your computer...

What is Shift+Command+4
400

This unit helps your computer run videos, graphics, and images. 

What is the GPU/Graphics Processing Unit?

400

A type of crime in which your private information has been stolen and used for criminal activity..

What is identity theft? 

400

a published false statement that is damaging to a person's reputation; a written defamation.


What is Libel? 

400

These 3 things should be what you consider when building a brand...

What is consistent colors, slogans and logos? 

500

These keys need to be visible when following proper typing etiquette...

What is G and H

500

These are the 3 most popular operating systems...

What is Linux, MacOS and Windows

500

Unique information that is personalized to you...

What is private information? 
500

Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying.


What is piracy? 

500

Name the target audience: A makeup brand creates a tutorial ad with a popular influencer talking about confidence and self-expression.

What is teenagers and young adults who follow trends and influencers?