; Jeopardy
Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out
Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

Jeopardy

VIEWS: 15 PAGES: 53

  • pg 1
									           Jeopardy
Hardware Software   File Mgmt   Crash       Safety

Q $100    Q $100     Q $100     Q $100    Q $100

Q $200    Q $200     Q $200     Q $200    Q $200

Q $300    Q $300    Q $300      Q $300    Q $300

Q $400    Q $400     Q $400     Q $400    Q $400

Q $500    Q $500     Q $500     Q $500    Q $500

                                         Final Jeopardy
$100 Question from Hardware

  Hardware that a computer
  needs to connect to a network
  is called this
$100 Answer from Hardware



  Ethernet Card
$200 Question from Hardware

Hardware needed to connect a LAN
together
$200 Answer from Hardware



  HUB/Switch
$300 Question from Hardware


   Type of Ethernet card that uses
   hard wire to connect to the
   network, used for large
   networks
$300 Answer from Hardware



  IEEE
$400 Question from Hardware

Type of ethernet card used for small
networks, uses an antenna to connect
$400 Answer from Hardware



  Wireless
$500 Question from Hardware

 These are PCs on a network that
 can access the server.
$500 Answer from Hardware



  Clients
$100 Question from Software

 Type of software used to
 prevent viruses, AVG, Norton
 and MacAfee for example
$100 Answer from Software



       Antivirus software
$200 Question from Software
Software that is loaded onto your
computer without your knowledge
that cause your computer not to
function properly.
$200 Answer from Software



  Virus
$300 Question from Software

  Software that tracks your
  online activity and reports it
  to a 3rd party.
$300 Answer from Software



  Spyware
$400 Question from Software

  Software that helps prevent
  tracking software from being
  loaded onto your computer. It
  also helps you clean it off if it
  does get loaded, Spybot and
  Adaware are examples.
$400 Answer from Software



  Anti-spyware Software
$500 Question from Software
Protection against new found
viruses and spyware are put into
these. They are routinely
downloaded to ensure current
protection.
$500 Answer from Software



  Definition files
$100 Question from File Mgmt

 When using Word, Excel,
 PowerPoint, Etc, this is the
 folder where the files will be
 saved unless you to tell it
 otherwise
$100 Answer from File Mgmt



  My Documents
$200 Question from File Mgmt

 When saving pictures from a digital
 camera, Internet or a program, this is
 the folder they will be saved in
 unless you tell it otherwise
$200 Answer from File Mgmt



  My Pictures
$300 Question from File Mgmt

Two reasons why it is important
to be able to save to different
storage devices
$300 Answer from File Mgmt


Backup and portability
$400 Question from File Mgmt

  Since most files are larger
  than 1,000 bytes, we
  indicate their file size by
  stating their size in this unit
$400 Answer from File Mgmt



  kilobytes
$500 Question from File Mgmt

 As a good rule of thumb, this
 percentage of a storage device
 should be left free to protect
 against data loss due to
 hardware failure
$500 Answer from File Mgmt



  10%
$100 Question from Crash

Most common weakness
hackers use to attack your
computer
   $100 Answer from Crash


Hole in operating system (Hacker hole)
$200 Question from Crash

 A spyware or virus infection of
 the operating system can cause
 this
$200 Answer from Crash


system crash
 $300 Question from Crash

To prevent against data loss due
to a system crash, critical data
from your hard drive should be
copied to this on a routine basis
$300 Answer from Crash


portable storage device
(jump drive, CD, etc)
  $400 Question from Crash


This is used to prevent
unwanted Internet traffic from
entering the computer
$400 Answer from Crash


firewall
$500 Question from Crash

Off site backup and instant
backup to a backup drive
are the two most common
ways to backup information
on this type of hardware
$500 Answer from Crash


 server
  $100 Question from Safety
Unwanted “junk” email send to
large numbers of people to
promote products or services
$100 Answer from Safety



 spam
   $200 Question from Safety

Sending out spam with the look
and feel of a legitimate site or
company that encourages the
recipient to provide key personal
information
$200 Answer from Safety



 phising
$300 Question from Safety

Stealing personal information
like credit card numbers, social
security numbers and bank
account numbers and using them
fraudulently.
$300 Answer from Safety



 Identity theft
  $400 Question from Safety
Not sharing passwords, not
providing private information
(name, address, etc) and reporting
any messages (IM, email, etc.)
that makes you feel
uncomfortable to a parent are all
ways of doing this
$400 Answer from Safety



 Keeping yourself safe
   $500 Question from Safety
Installing anti-spyware, using
windows automatic updates to
automatically download security
patches and scanning email
attachments for viruses are all ways
of doing this
$500 Answer from Safety



 Keeping your computer safe
      Final Jeopardy
Used to plug hacker holes
Final Jeopardy Answer

 What is a security patch?

								
To top