SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Review	
  for	
  6	
  Week	
  Assessment	
  
                            Lessons	
  1-­‐6,	
  Word	
  11-­‐15,	
  and	
  Internet	
  Safety	
  
	
  
Study	
  the	
  review	
  sheet	
  for	
  Lesson	
  3,	
  4,	
  and	
  5	
  

Understand	
  the	
  differences	
  between:	
  

           Hackers	
  

           Viruses	
  

           Scams	
  

           Trojans	
  

           Cookies	
  

           Phishing	
  

           	
  

What	
  steps	
  can	
  you	
  take	
  to	
  maintain	
  your	
  computer?	
  	
  	
  

	
  

Understand	
  the	
  difference	
  between	
  input,	
  output,	
  and	
  storage	
  devices	
  and	
  how	
  they	
  connect	
  to	
  the	
  

computer.	
  	
  Understand	
  how	
  these	
  are	
  ready	
  for	
  your	
  use.	
  	
  	
  

	
  

Troubleshooting	
  a	
  computer	
  involves	
  the	
  following	
  steps:	
  

           Step	
  1:	
  

           Step	
  2:	
  

           Step	
  3:	
  

           Step	
  4:	
  

           Step	
  5:	
  

           Step	
  6:	
  

           Step	
  7:	
  

           Step	
  8:	
  

	
  
What	
  kind	
  of	
  devices	
  can	
  you	
  use	
  to	
  protect	
  your	
  computer?	
  

	
  

Be	
  able	
  to	
  explain	
  the	
  difference	
  between	
  hardware	
  and	
  software	
  

	
  

Know	
  the	
  difference	
  between	
  serial,	
  parallel,	
  SCSI,	
  and	
  MIDI	
  ports	
  

	
  

Know	
  the	
  difference	
  between	
  upgrade	
  and	
  update	
  

	
  

Know	
  the	
  difference	
  between	
  user	
  interface	
  and	
  command-­‐line	
  interface	
  

	
  

Know	
  the	
  best	
  way	
  to	
  start	
  and	
  shut	
  down	
  your	
  computer	
  

	
  

How	
  do	
  you	
  organize	
  files?	
  

	
  

Understand	
  the	
  process	
  of	
  installing	
  software	
  

	
  

Know	
  what	
  information	
  is	
  safe	
  to	
  give	
  out	
  on	
  the	
  Internet	
  and	
  which	
  is	
  not	
  

	
  

Know	
  the	
  different	
  types	
  of	
  computers	
  and	
  how	
  much	
  it	
  would	
  be	
  to	
  buy:	
  

           See	
  chapter	
  1	
  vocabulary	
  

           	
  

           	
  

           	
  

           	
  

Why	
  was	
  the	
  Internet	
  create	
  and	
  by	
  who.	
  	
  Who	
  uses	
  it	
  know	
  and	
  why.	
  

	
  
Know	
  the	
  four	
  parts	
  are	
  of	
  data	
  communication	
  

           1.	
  

           2.	
  

           3.	
  

           4.	
  

           	
  

Understand	
  the	
  difference	
  between	
  LAN	
  and	
  WAN	
  

	
  

How	
  are	
  computers	
  classified?	
  

           1.	
  

           2.	
  

           3.	
  

           	
  

Know	
  what	
  makes	
  up	
  a	
  computer	
  system	
  

	
  

What	
  is	
  the	
  difference	
  between	
  a	
  bit,	
  nibble,	
  and	
  byte?	
  

	
  

Describe	
  the	
  different	
  types	
  of	
  printers	
  

           Laser	
  

           Ink-­‐jet	
  

           Dot	
  matrix	
  

           	
  

Where	
  would	
  you	
  find	
  magnetic	
  scanners?	
  Bar	
  code	
  scanners?	
  QR	
  codes?	
  

	
  

Know	
  the	
  different	
  type	
  of	
  monitors	
  and	
  the	
  names:	
  

           Digital	
  display	
  
Multi-­‐color	
  

           Single-­‐color	
  

           	
  

Know	
  the	
  difference	
  between	
  RAM	
  and	
  ROM	
  

	
  

What	
  is	
  the	
  standardized	
  coding	
  system	
  in	
  computers?	
  

	
  

What	
  is	
  on	
  the	
  motherboard?	
  	
  	
  

	
  

	
  

	
  

	
  

	
  

	
  

Weitere ähnliche Inhalte

Andere mochten auch

Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...
Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...
Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...cesarncruz
 
Digital без силикона: Андрей Чернышев Adwatch
Digital без силикона: Андрей Чернышев AdwatchDigital без силикона: Андрей Чернышев Adwatch
Digital без силикона: Андрей Чернышев AdwatchCossa
 
Latihan 2.1 sel haiwan dan sel tumbuhan[1]
Latihan 2.1 sel haiwan dan sel tumbuhan[1]Latihan 2.1 sel haiwan dan sel tumbuhan[1]
Latihan 2.1 sel haiwan dan sel tumbuhan[1]ISMALIZA ISHAK
 
Sfo 2007 Rafael Alemany Cremades
Sfo 2007 Rafael Alemany CremadesSfo 2007 Rafael Alemany Cremades
Sfo 2007 Rafael Alemany Cremadesdrsimon
 

Andere mochten auch (8)

Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...
Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...
Recsumen Ejecutivo: Informe “Consecuencias legales y económicas de la Ley de ...
 
KXForum pictures
KXForum picturesKXForum pictures
KXForum pictures
 
Group 3
Group 3Group 3
Group 3
 
2º trimestre cpi uxio novoneira
2º trimestre cpi uxio novoneira2º trimestre cpi uxio novoneira
2º trimestre cpi uxio novoneira
 
Digital без силикона: Андрей Чернышев Adwatch
Digital без силикона: Андрей Чернышев AdwatchDigital без силикона: Андрей Чернышев Adwatch
Digital без силикона: Андрей Чернышев Adwatch
 
Latihan 2.1 sel haiwan dan sel tumbuhan[1]
Latihan 2.1 sel haiwan dan sel tumbuhan[1]Latihan 2.1 sel haiwan dan sel tumbuhan[1]
Latihan 2.1 sel haiwan dan sel tumbuhan[1]
 
Huelga estudiantes
Huelga estudiantesHuelga estudiantes
Huelga estudiantes
 
Sfo 2007 Rafael Alemany Cremades
Sfo 2007 Rafael Alemany CremadesSfo 2007 Rafael Alemany Cremades
Sfo 2007 Rafael Alemany Cremades
 

Ähnlich wie Review for 6 week assessment

Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Computer assignment on virus and memory and printer
Computer assignment on virus and memory and printerComputer assignment on virus and memory and printer
Computer assignment on virus and memory and printerShamzayAli
 
A short course on computer viruses
A short course on computer virusesA short course on computer viruses
A short course on computer virusesUltraUploader
 
Ist264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalIst264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalHarold Sowards
 
IT for IT recruiters
IT for IT recruiters IT for IT recruiters
IT for IT recruiters Yakob Yakov
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applicationsMirza Ćutuk
 
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMINGCOMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMINGInfinity Tech Solutions
 

Ähnlich wie Review for 6 week assessment (20)

Unit 1 introduction to computers
Unit 1  introduction to computersUnit 1  introduction to computers
Unit 1 introduction to computers
 
Cis100 outline
Cis100 outlineCis100 outline
Cis100 outline
 
Linux
LinuxLinux
Linux
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Ch1 intro comp
Ch1 intro compCh1 intro comp
Ch1 intro comp
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Computer assignment on virus and memory and printer
Computer assignment on virus and memory and printerComputer assignment on virus and memory and printer
Computer assignment on virus and memory and printer
 
A short course on computer viruses
A short course on computer virusesA short course on computer viruses
A short course on computer viruses
 
Ist264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalIst264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournal
 
IT for IT recruiters
IT for IT recruiters IT for IT recruiters
IT for IT recruiters
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
anh.docx
anh.docxanh.docx
anh.docx
 
Cisel1 d
Cisel1 dCisel1 d
Cisel1 d
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applications
 
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMINGCOMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
COMPUTER CONCEPTS AND FUNDAMENTALS OF PROGRAMMING
 

Mehr von heidirobison

L26 communication services
L26   communication servicesL26   communication services
L26 communication servicesheidirobison
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Lesson 8 vocabulary
Lesson 8 vocabularyLesson 8 vocabulary
Lesson 8 vocabularyheidirobison
 
Power point lesson 08
Power point lesson 08Power point lesson 08
Power point lesson 08heidirobison
 
Lesson 7 vocabulary
Lesson 7 vocabularyLesson 7 vocabulary
Lesson 7 vocabularyheidirobison
 
L7 operating system
L7   operating systemL7   operating system
L7 operating systemheidirobison
 
Questions for interviewers worksheet
Questions for interviewers worksheetQuestions for interviewers worksheet
Questions for interviewers worksheetheidirobison
 
Starting the career search
Starting the career searchStarting the career search
Starting the career searchheidirobison
 
Labor laws questions
Labor laws questionsLabor laws questions
Labor laws questionsheidirobison
 
Work place readiness (student instructions)
Work place readiness (student instructions)Work place readiness (student instructions)
Work place readiness (student instructions)heidirobison
 
Candy bar presentation
Candy bar presentationCandy bar presentation
Candy bar presentationheidirobison
 
Power point lesson 20
Power point lesson 20Power point lesson 20
Power point lesson 20heidirobison
 
Power point lesson 19
Power point lesson 19Power point lesson 19
Power point lesson 19heidirobison
 
Review for quiz lesson 3 5
Review for quiz lesson 3 5Review for quiz lesson 3 5
Review for quiz lesson 3 5heidirobison
 
Lesson 5 vocabulary
Lesson 5 vocabularyLesson 5 vocabulary
Lesson 5 vocabularyheidirobison
 
Power point lesson 05
Power point lesson 05Power point lesson 05
Power point lesson 05heidirobison
 

Mehr von heidirobison (20)

L26 communication services
L26   communication servicesL26   communication services
L26 communication services
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Lesson 8 vocabulary
Lesson 8 vocabularyLesson 8 vocabulary
Lesson 8 vocabulary
 
Power point lesson 08
Power point lesson 08Power point lesson 08
Power point lesson 08
 
Lesson 7 vocabulary
Lesson 7 vocabularyLesson 7 vocabulary
Lesson 7 vocabulary
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
Questions for interviewers worksheet
Questions for interviewers worksheetQuestions for interviewers worksheet
Questions for interviewers worksheet
 
Starting the career search
Starting the career searchStarting the career search
Starting the career search
 
Osha rules
Osha rulesOsha rules
Osha rules
 
Labor laws questions
Labor laws questionsLabor laws questions
Labor laws questions
 
Work place readiness (student instructions)
Work place readiness (student instructions)Work place readiness (student instructions)
Work place readiness (student instructions)
 
Wpr career search
Wpr   career searchWpr   career search
Wpr career search
 
Candy bar presentation
Candy bar presentationCandy bar presentation
Candy bar presentation
 
Power point lesson 20
Power point lesson 20Power point lesson 20
Power point lesson 20
 
Power point lesson 19
Power point lesson 19Power point lesson 19
Power point lesson 19
 
Week 8 october 22
Week 8 october 22Week 8 october 22
Week 8 october 22
 
Week 7 october 15
Week 7 october 15Week 7 october 15
Week 7 october 15
 
Review for quiz lesson 3 5
Review for quiz lesson 3 5Review for quiz lesson 3 5
Review for quiz lesson 3 5
 
Lesson 5 vocabulary
Lesson 5 vocabularyLesson 5 vocabulary
Lesson 5 vocabulary
 
Power point lesson 05
Power point lesson 05Power point lesson 05
Power point lesson 05
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Review for 6 week assessment

  • 1. Review  for  6  Week  Assessment   Lessons  1-­‐6,  Word  11-­‐15,  and  Internet  Safety     Study  the  review  sheet  for  Lesson  3,  4,  and  5   Understand  the  differences  between:   Hackers   Viruses   Scams   Trojans   Cookies   Phishing     What  steps  can  you  take  to  maintain  your  computer?         Understand  the  difference  between  input,  output,  and  storage  devices  and  how  they  connect  to  the   computer.    Understand  how  these  are  ready  for  your  use.         Troubleshooting  a  computer  involves  the  following  steps:   Step  1:   Step  2:   Step  3:   Step  4:   Step  5:   Step  6:   Step  7:   Step  8:    
  • 2. What  kind  of  devices  can  you  use  to  protect  your  computer?     Be  able  to  explain  the  difference  between  hardware  and  software     Know  the  difference  between  serial,  parallel,  SCSI,  and  MIDI  ports     Know  the  difference  between  upgrade  and  update     Know  the  difference  between  user  interface  and  command-­‐line  interface     Know  the  best  way  to  start  and  shut  down  your  computer     How  do  you  organize  files?     Understand  the  process  of  installing  software     Know  what  information  is  safe  to  give  out  on  the  Internet  and  which  is  not     Know  the  different  types  of  computers  and  how  much  it  would  be  to  buy:   See  chapter  1  vocabulary           Why  was  the  Internet  create  and  by  who.    Who  uses  it  know  and  why.    
  • 3. Know  the  four  parts  are  of  data  communication   1.   2.   3.   4.     Understand  the  difference  between  LAN  and  WAN     How  are  computers  classified?   1.   2.   3.     Know  what  makes  up  a  computer  system     What  is  the  difference  between  a  bit,  nibble,  and  byte?     Describe  the  different  types  of  printers   Laser   Ink-­‐jet   Dot  matrix     Where  would  you  find  magnetic  scanners?  Bar  code  scanners?  QR  codes?     Know  the  different  type  of  monitors  and  the  names:   Digital  display  
  • 4. Multi-­‐color   Single-­‐color     Know  the  difference  between  RAM  and  ROM     What  is  the  standardized  coding  system  in  computers?     What  is  on  the  motherboard?