Computer Components Overview
40 Questions
1 Views

Computer Components Overview

Created by
@IdolizedOphicleide

Questions and Answers

What is the first strategy recommended for dealing with cyber bullying?

  • Screenshot and save evidence of the bullying.
  • Talk to someone you trust. (correct)
  • Ignore the bully and stay away from social media.
  • Block the cyber bully immediately.
  • Which of the following is NOT recommended to avoid being cyber bullied?

  • Use the internet carefully.
  • Think before you click.
  • Share your personal details with friends. (correct)
  • Keep social media privacy settings high.
  • How should you react when faced with a cyber bully?

  • Report the incident to the police.
  • Respond with equal hostility.
  • Retaliate by sharing embarrassing information.
  • Talk to a teacher about it. (correct)
  • What risk is associated with online anonymity?

    <p>Ability for scammers to deceive victims.</p> Signup and view all the answers

    What is one of the primary responsibilities of a good computer user?

    <p>To respect the privacy of other users</p> Signup and view all the answers

    What does the Philippine Copyright Law protect?

    <p>Creations of the mind including literary and artistic works</p> Signup and view all the answers

    What is an appropriate action to maintain privacy on social media?

    <p>Only share information with people you know in person.</p> Signup and view all the answers

    Which of the following statements is true regarding online communication?

    <p>It facilitates easy communication with potential dangers.</p> Signup and view all the answers

    What is the duration of exclusive rights given to a creator under copyright?

    <p>For a specific time period</p> Signup and view all the answers

    What should you do if you receive threatening messages from a cyber bully?

    <p>Report the behavior and seek help from authorities.</p> Signup and view all the answers

    Which of the following is NOT a factor in determining fair use of copyrighted material?

    <p>The reputation of the creator</p> Signup and view all the answers

    Which scenario qualifies as an example of cyberbullying?

    <p>Sending mean text messages to someone</p> Signup and view all the answers

    Why is it important to learn how to block instant messages?

    <p>To prevent unwanted communications from bullies.</p> Signup and view all the answers

    What is the main purpose of malware?

    <p>To steal information or spy on users</p> Signup and view all the answers

    Which of the following is a key element of Intellectual Property Rights Policy?

    <p>To address allegations of infringing material</p> Signup and view all the answers

    What is a potential risk associated with online communications?

    <p>Data theft from phishing scams</p> Signup and view all the answers

    What is one of the purposes for which fair use can be applied?

    <p>Teaching or scholarly research</p> Signup and view all the answers

    Which of the following actions undermines respect for privacy in computer usage?

    <p>Reading someone else's documents without permission</p> Signup and view all the answers

    Which component of the System Unit is known as the central Printed Circuit Board?

    <p>Motherboard</p> Signup and view all the answers

    How can individuals protect themselves from online harassment?

    <p>Block or report unwanted users</p> Signup and view all the answers

    What type of materials can expose children to inappropriate content?

    <p>Disturbing or explicit information</p> Signup and view all the answers

    What is a primary concern regarding social networking sites?

    <p>They may lead to cyber bullying and predators.</p> Signup and view all the answers

    What is the function of a power supply in a computer system?

    <p>To supply power to the other components</p> Signup and view all the answers

    Why is it important to be cautious when clicking links online?

    <p>They could redirect to a malicious website.</p> Signup and view all the answers

    What does the microprocessor primarily do in a computer?

    <p>Processes instructions and communicates with devices</p> Signup and view all the answers

    Which component is responsible for improving the images displayed on a computer screen?

    <p>Video Card</p> Signup and view all the answers

    What is a primary function of RAM?

    <p>Loads programs for random access</p> Signup and view all the answers

    How does Read-Only Memory (ROM) differ from Random-Access Memory (RAM)?

    <p>ROM is used for booting and diagnostics, while RAM is for temporary storage</p> Signup and view all the answers

    What is the primary role of a Sound Card in a computer system?

    <p>Facilitates input and output of audio signals</p> Signup and view all the answers

    What is the function of ports on a computer's system unit?

    <p>Provide interfaces for connecting external devices</p> Signup and view all the answers

    Which of the following accurately describes a Hard Disk Drive (HDD)?

    <p>A non-volatile storage device using rotating platters</p> Signup and view all the answers

    What do microprocessors typically have attached to them to manage heat?

    <p>Heat sink</p> Signup and view all the answers

    What is a risk of opening personal emails from unfamiliar senders?

    <p>The email attachment could have a virus.</p> Signup and view all the answers

    Why should personal information not be shared on the internet?

    <p>Scammers may use it for illegal purposes.</p> Signup and view all the answers

    What is the purpose of using an anti-spam program?

    <p>To filter out junk email from your inbox.</p> Signup and view all the answers

    What is a recommended practice when you encounter suspicious online activity?

    <p>Seek guidance from an adult.</p> Signup and view all the answers

    Why is it important to have an anti-virus program?

    <p>To detect suspicious websites and viruses.</p> Signup and view all the answers

    How should you handle spam emails?

    <p>Delete them without interaction.</p> Signup and view all the answers

    What should be avoided when browsing questionable websites?

    <p>Downloading attractive items like wallpapers.</p> Signup and view all the answers

    What is a responsible action to take regarding documents owned by others?

    <p>Always ask for permission first.</p> Signup and view all the answers

    Study Notes

    Responsible Internet Use

    • Responsible internet use is essential to avoid negative consequences from careless behavior.
    • Be cautious when opening emails from unknown senders; they may contain viruses.
    • Avoid visiting inappropriate websites and protect personal information, including full name and credit card details.
    • Safeguard your email address; use complex passwords to thwart scammers.
    • Report suspicious online activities to a trusted adult to prevent malware attacks.
    • Utilize anti-spam programs to filter out junk emails from your inbox.
    • Run antivirus scans regularly to detect and eliminate potential threats.

    Responsible Computer Use

    • Respect others’ intellectual property by not using their work without permission.
    • Protect others' privacy by not accessing their documents or emails without consent.
    • Follow household rules regarding computer and internet usage that are set by parents or guardians.
    • Intellectual Property (IP) includes creations like inventions, artistic works, and designs; it's protected under the Philippine Copyright Law.
    • Copyright grants creators exclusive rights for a specified time, after which their work enters the public domain.
    • Intellectual Property Rights Policy addresses issues related to copyright infringement on online platforms.
    • Fair Use permits limited use of copyrighted material for criticism, teaching, or research without permission.

    Cyberbullying and Online Risks

    • Cyberbullying utilizes electronic means, including social media and text messages, to intimidate or harass individuals.
    • Avoid cyberbullying by using mobile devices responsibly, thinking before posting, and maintaining privacy settings.
    • To deal with cyberbullying, consult trusted adults, save evidence, and block/report the bully.
    • Online risks include anonymity making scams easier, privacy concerns from data collection, malware threats from downloading, and exposure to inappropriate content.

    System Unit Components

    • The System Unit is the main part of a computer, housing critical components like the motherboard, power supply, and memory modules.
    • The motherboard serves as the central printed circuit board connecting all components.
    • The power supply converts AC power to low-voltage DC power for internal components.
    • The microprocessor processes instructions, playing a crucial role in the computer's operations.
    • Hard Disk Drives (HDD) store data on rotating platters using magnetic surfaces.
    • Video Cards enhance graphical output on screens, while Sound Cards facilitate audio input and output for multimedia applications.
    • Computer memory consists of RAM (temporary storage for active data and programs) and ROM (permanent storage for system instructions).
    • Ports on the system unit allow connections to external devices.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the basic components of a computer, including power supplies, microprocessors, and hard disk drives. Understand how these parts work together to enable computing operations. Test your knowledge on essential hardware functionalities.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser