The Hardware StoreQuestion: This device allows the computer user to input "values" such as text and numerical characters into software such as a word processor or give commands to the operating system.
Question: This type of input device is a pointing device that allows the user to interact with programs by controlling a cursor and issuing commands through "clicking." The development of touch screens is moving this hardware towards being obsolete.
Question: Typically the primary storage device for the operating system in a computer, this piece of hardware is capable of storing large amounts of data used by the computer. This device will also retain (remember) the stored data without power.
Answer: Hard Drive
Question: This hardware is known for its ability to quickly access and store temporary data. This allows the computer to quickly accomplish tasks without needed to wait for the data to be written to or read from more permanent storage, however this storage will typically forget all stored data when power is lost.
Answer: Random Access Memory (RAM)
Question: The brains of the computer that carries out the instructions given by a program. This hardware typically follows a four part sequence in its operation: fetch (get it), decode (read it), execute (do it), and writeback (report results). The speed this hardware can perform instructions is called the clock rate that is measured in "hertz."
Answer: Central Processing Unit (CPU)
Digital CitizenshipQuestion: This is the practice of taking someone else's words or ideas and using them as your own words or ideas without giving any credit to the origin.
Question: This legal concept protects the work of people who create new things (such as writings, images, and products) from unauthorized reproduction and distribution of their work.
Question: The ability to use a range of technologies to effectively find information, critically evaluate and understand the information, and use the information to create and/or communicate new information.
Answer: Digital Literacy
Question: The agreement between a service provider and user that defines the rules and restrictions the user must agree to in order to use the service. These rules allow the provider the ability to restrict access or even bring legal action against users who violate them.
Question: The way the user behaves and conducts themselves while interacting with the Internet and communicating with other people on the Internet.
Answer: Digital Etiquette (Netiquette)
Take CareQuestion: Because of its ability to penetrate and cause damage to electrical components inside various parts of your computer, this state of matter should not be exposed to computer parts.
Question: Because of the danger of high voltage passing into the body, this practice should always be done before opening or touching any part inside of a computer or electrical device.
Answer: Unplug the power cord (remove from power)
Question: Because of their influence on electrical currents, these commonly found household items, or items that contain these, should be kept away from storage devices (such as USB flash drives) and other computer components.
Question: This product stores a liquid compound that quickly changes to gas in the atmosphere to create pressure used to remove dust from electrical components that are difficult to reach and clean. Due to the chemical nature of this product, it should be used carefully in a well-ventilated area.
Answer: Compressed Air (Gas Duster, Canned Air)
Question: This build up of electrical charge within the body's interaction with various surfaces will discharge on a weaker or opposite electrical charge. Because of this, computer technicians will "discharge" or wear a protective bracelet before working with sensitive electrical components.
Answer: Static Electricy (Static)
Safe and SecureQuestion: A combination of characters (letters, numbers, symbols) that is used to allow access various computer resources.
Question: A type of computer software that is designed to unknowingly harm your computer, collect personal information, or access private computer systems.
Question: This type of information should be protected and shared carefully and sparingly if necessary. Children should always request permission from parents/guardians before sharing this type of information.
Answer: Personal Information (Name, Address, Contact Information)
Question: Software designed to detect and prevent forms of destructive and malicious softwares from installing and running on a computer.
Answer: Anti-Virus (Anti-Malware, Security Software)
Question: A type of hardware or software that acts as a protective layer of security between the client computer or network and Internet by monitoring incoming and outgoing traffic and determining what is permissable based upon a set of rules.
Answer: Firewall (Internet Filter)
AcronymsQuestion: This acronym describes a type of hardware interface (connection) that is the most widely used for attaching peripheral devices to a computer.
Answer: USB (Universal Serial Bus)
Question: This acronym is used for the address of an online resource, such as a webpage.
Answer: URL (Uniform Resource Locator)
Question: This acronym describes a computer language that is commonly used to create webpages.
Answer: HTML (Hyper-Text Markup Language)
Question: This acronym represents a type of document file that was developed by Adobe and ensures that a document will be displayed consistently between applications.
Answer: PDF (Portable Document Format)
Question: This acronym is used to describe a method of storing data on multiple hard drives to provide efficiency by allowing a computer to utilize more than one hard drive at one time.
Answer: RAID (Redundant Array of Independent Disks)