Cyber | Computer | Office | Icons | Random |
---|---|---|---|---|
What is a hacker
A person who gains unauthorized access through a computer to another person's computer
|
What is a laptop
A mobile computer
|
What is a margin
The area around the outside of a document that is left blank when printing
|
What is Google Chrome
What icon is circular with the colors green, red, yellow, and blue creating the design?
|
What is red, white, and blue
What are the three colors of the US flag?
|
What is spyware
An illicit program that can self-replicate and causes harm to a computer
|
What is a tablet
A mobile device that is not as powerful as a laptop
|
What is Calibri
The default font setting for Word documents
|
What is Internet Explorer
What icon is a big blue e with a yellow streak?
|
What is red, white, yellow, and black
What are the four colors of the Maryland flag?
|
What is the internet
The world wide web
|
What is an all-in-one
Essentially a desktop with all the components packed into one monitor
|
What is 12
The standard font size setting for Word documents
|
What is Thunderbird
What icon is a blue bird holding an envelope in its wings?
|
What is red, white, and blue
What are the three colors of the Hawaiian flag?
|
What is phishing
A scam involving a fake website that looks real in order to steal personal information
|
What is a mouse and keyborad
Two computer instruments that are for user input
|
What is Prezi
Free online alternative to PowerPoint
|
What is green
What color is the Microsoft Excel icon?
|
What is blue and yellow
What are the two colors of the Alaskan flag?
|
What is spam
Email messages sent to a large number of accounts that contain useless information
|
What is a tower
Contains all of the computing components
|
What is Excel
Microsoft's spreadsheet software
|
What is a compass
What is the icon for Safari?
|
What is a maple leaf
What type of leaf is on the Canadian flag?
|