Toggle Navigation
Games
Blog
Class PIN
Join for Free
Sign in
Toggle Navigation
Games
PIN
Join for Free
Blog
Pricing
Contact us
Help center
Sign in
Study
Review Game M1
0
%
0
0
0
Back
Restart
It is a software that is installed to safely use computers (desktops, laptops, tablets and smartphones)
Anti virus
Oops!
Okay!
_____ is the protection of computer systems and networks from information thieves (hackers)
Cyber Security
Oops!
Okay!
What are the two types of content online?
Public and private
Oops!
Okay!
01 10 00 1 2 3 4 5 What types of data are these?
Numeric data
Oops!
Okay!
A _____ is a person who breaks into computer and steal information
Hacker
Oops!
Okay!
_____ is data that has been processed into a form that is meaningful.
information
Oops!
Okay!
Collection Preparation Input Processing Output Storage Theses are the stages of the _____ _____ _____
Data processing cycle
Oops!
Okay!
___ ____ is the proper use of computers and online etiquette.
Computer Ethics
Oops!
Okay!
What online content are parents worried about?
sex and violence
Oops!
Okay!
INFORMATION SYSTEM has _____ components
5
Oops!
Okay!
_____ are the laws that protect tangible material like books.
Copyright
Oops!
Okay!
CPU, mouse, keyboards and monitor are examples of _____ ______
Computer hardware
Oops!
Okay!
Pictures Charts Maps What types of data are these?
Character Data
Oops!
Okay!
Is it OK to share your information (name, email, password, and ID number) on Facebook?
false
Oops!
Okay!
Who is responsible for cyber security?
all internet users
Oops!
Okay!
Your experience on this site will be improved by allowing cookies.
Allow cookies