Good Computer Gone Bad
In with the Output
Virus On The Loose
Antivirus Where Are You?
Last Column
100

data entered into the computer through a variety of devices such as a keyboard, microphone, scanner, flash drive, or mouse

What is input device

100

software that automatically displays or downloads advertising material (often unwanted) when a user is online.

What is adware

100

"Bad Hacker"-hacks into things for personal purposes, not to help.

What is Black Hat Hacker

100

a feature that allows the user to change the attributes of a file (such as location, file name, or file type) before saving it

What is save as

100

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

What is cyberbullying

200

allows the user to view or listen to the data a computer processes such as a monitor, printer, headphones, or speakers

What is output device

200

program that tracks and spies on you with the intent to collect information.

What is spyware

200

system software that acts as a "go-between", allowing computer hardware and other software to communicate with each other

What is operating system

200

computer software created to allow the user to perform specific a job or task Examples: Word processing, Spreadsheets,

What is application software

200

scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware 

What is antivirus software

300

infected program with the purpose of some sort of destruction.

What is virus

300

storing data for later use

What is save

300

"Good Hacker"-work to find ways into systems to help computer companies fix holes in systems.

What is White Hat Hacker

300

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

What is firewall

300

additional hardware that isn't necessary for a computer to function, but does enhance how the computer can be used

What is peripheral device

400

Spreads the virus over a network of computers

What is computer worm

400

attempt to get personal information, usually bank account info.

What is phishing 

400

A crime that involves someone pretending to be another person in order to steal money or obtain benefits

What is identity theft

400

A program on a computer that allows the user to create, edit, view, print, rename, copy, or delete files, folders, or an entire file system

What is file management

400

malicious file. Disguised as something else to trick someone in opening it.

What is Trojan Horse

500

executes commands from a computer's hardware and software;  the "brain" of a computer

What is central processing unit

500

an extension at the end of a file name, indicating which application was used to create a document

What is file type

500

software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management Examples: BIOS, Microsoft Windows,

What is System software

500

a computer case that contains the CPU, power supply, memory, and storage

What is system unit

500

Name three output devices 

What is speakers, monitor, printer, headphones, projector, etc.