Team 1
0
Team 2
0
Teams
Name
Score
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Loading
5
×
Pictures Charts Maps What types of data are these?
Character Data
Oops!
Check
Okay!
Check
5
×
INFORMATION SYSTEM has _____ components
5
Oops!
Check
Okay!
Check
5
×
Collection Preparation Input Processing Output Storage Theses are the stages of the _____ _____ _____
Data processing cycle
Oops!
Check
Okay!
Check
5
×
_____ is data that has been processed into a form that is meaningful.
information
Oops!
Check
Okay!
Check
5
×
_____ is the protection of computer systems and networks from information thieves (hackers)
Cyber Security
Oops!
Check
Okay!
Check
5
×
Is it OK to share your information (name, email, password, and ID number) on Facebook?
false
Oops!
Check
Okay!
Check
5
×
What are the two types of content online?
Public and private
Oops!
Check
Okay!
Check
5
×
___ ____ is the proper use of computers and online etiquette.
Computer Ethics
Oops!
Check
Okay!
Check
×
boom
Lose 50 points!
Oops!
×
gift
Win 10 points!
Okay!
×
rocket
Go to first place!
Okay!
×
lifesaver
Give 25 points!
Oops!
5
×
_____ are the laws that protect tangible material like books.
Copyright
Oops!
Check
Okay!
Check
×
seesaw
Swap points!
Oops!
×
gold
Win 50 points!
Okay!
×
rocket
Go to first place!
Okay!
×
thief
Give points!
5
10
15
20
25
5
×
A _____ is a person who breaks into computer and steal information
Hacker
Oops!
Check
Okay!
Check
×
thief
Give points!
5
10
15
20
25
×
star
Double points!
Okay!
×
shark
Other team loses 20 points!
Okay!
×
thief
Give points!
5
10
15
20
25
5
×
CPU, mouse, keyboards and monitor are examples of _____ ______
Computer hardware
Oops!
Check
Okay!
Check
5
×
01 10 00 1 2 3 4 5 What types of data are these?
Numeric data
Oops!
Check
Okay!
Check
5
×
Who is responsible for cyber security?
all internet users
Oops!
Check
Okay!
Check
×
Restart
Review
Join for Free
;
Your experience on this site will be improved by allowing cookies.
Allow cookies