Stole it Straight from Wilkes County. Questions from 1.01.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
2.00 Understand Computer Fundamentals
Computer Hardware 4 Main Types.
 Prof. Dr. M. H. Assal Introduction to Computer AS 26/10/2014.
The Operating System. What is an Operating System? The software which makes it possible for you to use your computer The software which starts up when.
Security, Privacy, and Ethics Online Computer Crimes.
Software. Application Software performs useful work on general-purpose tasks such as word processing and data analysis. The user interacts with the application.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
I Information Systems Technology Ross Malaga 3 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 3-1 SOFTWARE.
1.00 Describe the purpose, components, and use of a computer system.
Computer for Health Sciences
Lesson 4 Computer Software
Video Following is a video of what can happen if you don’t update your security settings! security.
1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.
Hardware vs. Software Computer systems consist of both hardware and software. Hardware refers to anything you can physically touch. Keyboards, mice, monitors,
Hardware vs. Software Computer systems consist of both hardware and software. Hardware refers to anything you can physically touch. Keyboards, mice, monitors,
Parts of the Computer. Three Components of an Information System 1.Hardware The physical components that make up the computer and other devices connected.
Essential Computer Concepts
1.1 How Does a Computer Work?
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Overview of Windows and Microsoft Word. Operating System Performs 3 functions –Controls the hardware of the computer Screen, keyboard, disk drives, etc.
Computer System Game 6511 Keyboarding
Computer Software Computer Technology Day 5. Software  Provides step-by-step instructions that tell the computer how to perform  Categories  System.
Computer Fundamentals
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
Section 2 Software.
The Computer System Review Game Directions: 1.Read each of the following questions and corresponding answer choices. 2.Click on the answer that you think.
Computer Basics.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Unit R005: Understanding Computer Systems Introduction System Software Software (i.e., programs) used to control the hardware directly Used to run the.
GRAP 3175 Computer Applications for Drafting Unit II.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Input Output Excel Internet/ Etc.Grab Bag
Types of Electronic Infection
The Computer System Review Game. Allison turned her computer on, but nothing happened. What is Allison’s computer most likely missing? A. Application.
Intro to Computers Computer Applications. What is a Computer? Initially the term computer referred to an individual whose job it was to perform mathematical.
Chapter 3: Personal Computers in the Learning Environment Annette Arnold ETEC 562 September 14, 2005.
Foundation year Lec.3: Computer SoftwareLec.3: Computer Software Lecturer: Dalia Mirghani Year: 2014/2015.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
MIND MAPS FOR THE ICT STUDENTS V.S.R.RANASIRI R / KURUWITA M.M.V.
1 THE COMPUTER. 2 Input Processing Output Storage 4 basic functions.
Three Jobs of a Computer 1. Input 2. Processing 3. Output.
VIRUS.
Computer Basics SystemsViruses Alternative Input Speech.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Course Title: Introduction to Computer Course Instructor: ILTAF MEHDI Chapter No: 04 1BY ILTAF MEHDI (MCS, MCSE, CCNA)
Software Rashedul Hasan. Software Instructions and associated data, stored in electronic format, that direct the computer to accomplish a task. Instructions.
Parts of the Computer.
Types of Software Chapter 2.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
Computer Organization & Assembly Language Chapter _ 04 Ghazanfer Mirza.
Chapter 1 Describe the purpose, components, and use of a computer system.
Computer Fundamentals
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Booting Process Chapter 4: System Software Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems Design and Development Security Precautions Computing Science.
Identify internal hardware devices (e. g
Unit A: Exploring Computer Systems
Related to data, hardware, and software
02.00 Understand Computer Fundamentals
Basic Hardware and Software
Materials prepared by Dhimas Ruswanto, BMm
Computer Electronic device Accepts data - input
Overview of Computer system
Prepared by: Eng\ahmed gaber eng\mahmoud kamel
Presentation transcript:

Stole it Straight from Wilkes County

Questions from 1.01

Question 1  Software packages used to create financial statements using mathematical calculations are: Word processing. Electronic Spreadsheet. Database Computer graphics.

Question 2  Information that leaves the computer is called: Programs. Input. Graphics. Output.

Question 3  What equipment is used like a copy machine to allow information to be input into the computer? Light pen Keyboard Scanner Mouse

Question 4  Data that appears on the monitor is called: Language. Softcopy. Hardcopy. Programs.

Question 5  The components that make up a computer system are: Programs. Language. Hardware. Software.

Question 6  Which device is used to enter data into a computer? Input device Output device Microprocessor Storage

Question 7  The physical parts of a computer system are called: Hardware. Languages. Applications. Programs.

Objective 1.02

Question 8  What system software controls the computer operations? Formatting Language Program System

Question 9  The operating system capability that permits more than one program to run simultaneously is called: Multi-cycle. Multi-purpose. Multi-string. Multitasking.

Question 10  The operating system functions do NOT include: Managing input and output. Providing user with a password. Supervising other components. Providing software and hardware management.

Question 11  Which utility is used to locate and disinfect a virus? Antiviral Data compression Data recover Translator

Question 12  The acronym MS-DOS stands for: Macintosh Disk Operating System. Microsoft Disk Operating System. Microsoft Operating System. Microsoft Output System.

Questions for 1.03

Question 13  Which is NOT a characteristic of copyrighted software? An individual or a business copyrights it. It is given freely and it can be copied by anyone. Permission is needed in order to copy software. Programs are accompanied by supporting documents.

Question 14  The technology used to scramble information so that only the sender and receiver can read the data is called: Encryption. Password. Public domain. Virus.

Question 15  To protect the computer from detecting a virus the user should install a/an: Database program. Spreadsheet program. User password. Anti-virus program.

Question 16  Which is a destructive computer code or virus that is designed to activate at a specific time? Bomb Hoax Trojan horse Worm

Question 17  Which is NOT a virus known to destroy or cause damage to computer files? Bomb Hacker Trojan Horse Worm

Question 18  Which software allows the user to pay a small fee after the trial period? Copyrighted Freeware Public domain Shareware

Question 19  Which is NOT considered a security measure? Backing up data regularly Giving your password to your friends Protecting data with an anti-viral program Protecting files with a password