1 / 62

Jeopardy

Jeopardy. Computer Knights Taylor Kennedy George Cain Ravin Partlow Sultan Flucas David Owens Diamond Thomas. BINARY NUMBERS. Binary numbers are the two numbers that a computer uses The two numbers used are 1 and 0. BINARY NUMBERS.

ghalib
Download Presentation

Jeopardy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Jeopardy Computer Knights Taylor Kennedy George Cain Ravin Partlow Sultan Flucas David Owens Diamond Thomas

  2. BINARY NUMBERS • Binary numbers are the two numbers that a computer uses • The two numbers used are 1 and 0

  3. BINARY NUMBERS • The binary number chart are the same numbers every time and is read from left to right • 128, 64, 32, 16, 8, 4, 2, and 1

  4. BINARY NUMBERS • Under the binary number chart you will see ones and zeros telling you the value of the numbers you add the values that have a one under them and your sum is the decimal number. For example…. • 128 64 32 16 8 4 2 1 • 0 0 1 1 0 1 1 0 • 32+16+4+2= 54 • So the decimal number is 54

  5. BINARY NUMBERS • In order to convert a decimal number into a binary number you do the exact opposite. For example….Decimal number is 78 78 is not bigger than 128 so there will be a 0 and you continue to go through the numbers on the chart 128 64 32 16 8 4 2 1 0 1 0 0 1 1 1 0 So the binary number will be 01001110

  6. SPYWARE • Spyware is designed to track internet habits and internet history. Spyware also hogs up memory space and detects.

  7. SPYWARE • The main mission of spyware is to advertise. Piggy backed spyware comes from applications and pop ups.

  8. SPYWARE • Some easy ways to protect yourself from getting spyware are to download fire wall, spyware scanner, pop up blocker and disable active x.

  9. INPUT AND OUTPUT DEVICES • Input devices allow us to put information into the computer. They include Keyboards, mouse’s, touchpad's, and scanners. We are able to feed the computer information. Output devices allow us to receive information. They include printers, speakers and projectors.

  10. STORAGE DEVICES • These hold our information. These include flash drives and floppy disks. They are handheld and can be taken anywhere.

  11. COMMUNICATION DEVICES • There is only one communication device an that is a modem. • Communication devices help computers communicate with one another.

  12. Parts inside the computer CPU or Central Processing Unit is the Computer that processes data The Hard Drive is a component inside the computer that stores information The motherboard is the main control of the computer

  13. Parts inside the computer RAM is an acronym for random-access memory, meaning that the computer can write to the memory and later read from it.

  14. Parts inside the computer There are 7 main components of a computer. The peripherals Hard drive RAM memory CPU Motherboard Cooling fan Power supply

  15. VIRUSES • A virus is a small piece of software that piggybacks on real programs. • The most common form of a virus infection is e-mail viruses.

  16. VIRUSES • E-mail virus is created from a word document. • A way to protect your computer from viruses is to get a virus protection software on your computer.

  17. VIRUSES • Worms are a small piece of software that uses computer networks and security holes to replicate itself.

  18. VIDEO GAME ADDICTION Video Game Addiction result in having no time for socializing, or getting any exercise playing sports. Compulsive gaming Adults can Jeopardize there jobs and or relationships.

  19. VIDEO GAME ADDICTION To over come game addiction is to show gamers they are powerless over their addiction and teach them real life excitement.

  20. VIDEO GAME ADDICTION Most video game addicts are males under 30 years of age. Most warning Signs include lying to friends and family to conceal gaming. Mmorpg massive multiplayer online role playing game

  21. CORRECT Go back to the back board

  22. INCORRECT Go back and study

  23. INCORRECT Go back and study

  24. INCORRECT Go back and study

  25. INCORRECT • Go back and study

  26. INCORRECT GO BACK AND STUDY

  27. INCORRECT GO BACK AND STUDY

  28. Binary Numbers for 100 How many numbers does the computer use? • A) two • B) one • C) three • D) six

  29. What are the two numbers binary numbers use? Binary Numbers for 200 • A) ones and twos • B) ones and zeros • C) twos and zeros • D) twos and threes

  30. Binary numbers for 300 What is the highest number on the binary number chart? A)128 B) 64 C) 500 D) 612

  31. Binary numbers for 400 What is the decimal number for 00110100? • A) 52 • B) 110 • C) 87 • D) 54

  32. Binary numbers for 500 What is the binary number for 205? • A) 11001101 • B) 00110001 • C) 11100010 • D) 01100100

  33. Spyware for 100 Why was spyware designed? A)Challenge your Brain B)Delete internet history C)Delete internet habits D)Track internet habits and internet history

  34. Spyware for 200 What is the main mission of spyware? A)Advertise B)Make children want spyware on there computer C)Fix all computer problems D)All of the above

  35. Spyware for 300 What is a Drive by download? A) Pop up window that gets rid of spyware B) Pop up window that installs spyware C) Pop up window D) Both a and b

  36. Spyware for 400 What does spyware hog up? A)Spyware hogs up applications B)Spyware hogs up memory space C)Spyware hogs up computer internet data D)None of the above

  37. Spyware for 500 What are two ways to protect yourself from getting spyware? A)Fire wall and spyware scanner B)Anti-spyware and anti-virus C)Security lock code and spyware scanner D)None of the above

  38. Input/ Output/ Storage/ Communication Devices for 100 What do Output devices allow us to do? A.) allow us to hold information B.) allow us to receive information C.) give us a visual of the person D.) give us movement

  39. Input/ Output/ Storage/ Communication Devices for 200 What type of Device is this? A) Storage B) Input C) Communication D) Output

  40. Input/ Output/ Storage/ Communication Devices for 300 What is an example of a Output Device? A.) Microphone B.) Flash Drive C.) Keyboard D.) Speakers

  41. Input Devices allow us to… Input/ Output/ Storage/ Communication Devices for 400 A.) Receive Information B.) Communicate with people C.) Put Information into the computer D.) Hear others

  42. What type of device is this? Input/ Output/ Storage/ Communication Devices for 500 A.) Storage Device B.) Output Device C.) Input Device D.) Communication Device

  43. What does CPU stand for? Central processing utilities Central processing unit Cosmic protection unit Central protection utilities

  44. What does the Hard Drive hold ? A) information such as files, pictures, and music B) different types of cars C) the CPU and other components like the motherboard D) A small disk that plays music

  45. What is RAM an acronym for? • A) rational accessible memory • B) random access memory • C) random accessible microchip • D) none of the above

  46. What is the motherboard? • A) a microprocessor chip • B) the brains of the computer • C) the storage place of the computer • D) none of the above

  47. What are 2 of the 7 main components of the computer? • A) peripherals • B)cooling fan and power supply • C) motherboard and microprocessor chip • D) CPU and flash drive

  48. WHAT IS A VIRUS? A)A virus is something that makes you sick. B) A virus is a small piece of software that piggybacks on real programs. C)A virus D)A Infection on the computer

  49. What is the most common virus infection? A)The most common form of a virus infection are e-mail viruses. B)A computer infection virus C)A document infection virus D)A virus

More Related