Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology

Similar presentations


Presentation on theme: "Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology"— Presentation transcript:

1 Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Safeguards Theft Q $100 Q $100 Q $100 Q $100 Q $100 Q $200 Q $200 Q $200 Q $200 Q $200 Q $300 Q $300 Q $300 Q $300 Q $300 Q $400 Q $400 Q $400 Q $400 Q $400 Q $500 Q $500 Q $500 Q $500 Q $500 Final Jeopardy

2 $100 Question from H1 any event or action that could cause loss of, or damage to computer equipment, software, data and information or processing capability

3 Computer Security Risk
$100 Answer from H1 Computer Security Risk

4 $200 Question from H1 replaces the program that is used to start the computer system with a modified, infected version of the startup program

5 $200 Answer from H1 Boot sector virus

6 $300 Question from H1 virus that hides within or is designed to look like a legitimate program

7 $300 Answer from H1 Trojan Horse

8 $400 Question from H1 Copies itself repeatedly, using up resources and shutting down the computer and/or network

9 $400 Answer from H1 Worm

10 Well-known time bomb virus
$500 Question from H1 Well-known time bomb virus

11 $500 Answer from H1 Michelangelo Virus March 6

12 $100 Question from H2 These programs detect viruses and inoculate against them as well as repair infected programs and files

13 $100 Answer from H2 Antivirus Programs Norton’s McAfee AVG

14 $200 Question from H2 Any item that you must carry to gain access to a computer or computer facility

15 $200 Answer from H2 Possessed object Badges, cards, keys,etc

16 $300 Question from H2 A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network

17 $300 Answer from H2 Firewall

18 $400 Question from H2 Duplicate of a file, program, or disk that can be used if the original is lost

19 $400 Answer from H2 Backup

20 $500 Question from H2 the use of a computer or data for unapproved or possibly illegal activities

21 $500 Answer from H2 Unauthorized use

22 The most common type of software theft
$100 Question from H3 The most common type of software theft

23 $100 Answer from H3 Piracy

24 $200 Question from H3 antipiracy technology designed to verify that software products have been legitimately licensed

25 $200 Answer from H3 Product Activation

26 Software that is distributed free for a trial use period
$300 Question from H3 Software that is distributed free for a trial use period

27 $300 Answer from H3 Shareware

28 $400 Question from H3 a scam in which a perpetrator sends an official-looking that attempts to obtain personal and financial information from the recipient

29 $400 Answer from H3 Phishing

30 allows network users to share a single copy of the software
$500 Question from H3 allows network users to share a single copy of the software

31 $500 Answer from H3 Site License

32 $100 Question from H4 Moral guidelines that govern the use of computers, networks and information systems

33 $100 Answer from H4 Computer ethics

34 $200 Question from H4 protect original materials created by students and teachers posted on the Web , apply to all creative works , are contained in the Copyright Act of 1976 and its numerous amendments

35 $200 Answer from H4 Copyright Laws

36 $300 Question from H4 Allow educators to use certain copyrighted works for nonprofit educational purposes

37 $300 Answer from H4 Fair use Guidelines

38 $400 Question from H4 set of rules that govern the use of school and school district computers, networks, and the Internet

39 $400 Answer from H4 AUP Acceptable Use Policy

40 $500 Question from H4 Passed by Congress in 2000 to protect children from obscene, pornographic, and other harmful information

41 Children’s Internet Protection Act
$500 Answer from H4 CIPA Children’s Internet Protection Act

42 $100 Question from H5 technology that will significantly impact education during the next five years

43 $100 Answer from H5 DVD Based Technology

44 $200 Question from H5 As all areas of education begin to use these, the traditional textbooks used in K-12 schools will disappear

45 Web and video enhanced textbooks
$200 Answer from H5 Web and video enhanced textbooks

46 Technologies that help special needs students have equal access
$300 Question from H5 Technologies that help special needs students have equal access

47 $300 Answer from H5 Assistive Technology

48 $400 Question from H5 Revolution that is dominating the first decade of the 21st century in technology

49 $400 Answer from H5 Wireless revolution

50 $500 Question from H5 These instructional strategies offer creative solutions for teacher shortages, homebound, challenged and at risk students

51 Web based instructional strategies
$500 Answer from H5 Web based instructional strategies

52 Final Jeopardy An applied science devoted to incorporating comfort, efficiency and safety into the design of items in the workplace

53 Final Jeopardy Answer Ergonomics


Download ppt "Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology"

Similar presentations


Ads by Google