Edit Game
Review Game M1
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public




Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   15  Close
Collection Preparation Input Processing Output Storage Theses are the stages of the _____ _____ _____
Data processing cycle
Pictures Charts Maps What types of data are these?
Character Data
01 10 00 1 2 3 4 5 What types of data are these?
Numeric data
_____ are the laws that protect tangible material like books.
Copyright
What online content are parents worried about?
sex and violence
What are the two types of content online?
Public and private
___ ____ is the proper use of computers and online etiquette.
Computer Ethics
Is it OK to share your information (name, email, password, and ID number) on Facebook?
false
Who is responsible for cyber security?
all internet users
A _____ is a person who breaks into computer and steal information
Hacker
It is a software that is installed to safely use computers (desktops, laptops, tablets and smartphones)
Anti virus
_____ is the protection of computer systems and networks from information thieves (hackers)
Cyber Security
INFORMATION SYSTEM has _____ components
5
CPU, mouse, keyboards and monitor are examples of _____ ______
Computer hardware
_____ is data that has been processed into a form that is meaningful.
information