SuperTeacherTools SuperTeacherTools Help
Jeopardy Home Create a New Game Create a New Game
How to Use Instant Jeopardy Review:

Instant Jeopardy Review is designed for live play with up to ten individuals or teams. Teams choose a question, then try to give the best answer. Scoring is built in for each team. You can post a link to this review game using the orange game information button below. If you are the creator of this game, you can edit the game with the red edit button. Have fun!


Seconds To Answer Each Question
Set to 0 to hide the timer

CS111_SR

UNIT4 UNIT5 UNIT6 UNIT7 UNIT8
10 10 10 10 10
20 20 20 20 20
30 30 30 30 30
40 40 40 40 40
50 50 50 50 50
Final Question
Edit Game
Many Internet security concerns today can be categorized as computer wars
View Answer
Many Internet security concerns today can be categorized as computer wars
False
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
View Answer
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
True
Computer crime is sometimes referred to as ____.
View Answer
Computer crime is sometimes referred to as ____.
Cybercrime
A password like the one in the accompanying figure should have at least ____ characters.
View Answer
A password like the one in the accompanying figure should have at least ____ characters.
Eight
____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
View Answer
____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
Encryption
System failure can occur because of a hardware problem, software problem, or computer virus
View Answer
System failure can occur because of a hardware problem, software problem, or computer virus
True
Electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
View Answer
Electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
True
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
View Answer
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
Recovery
____ are used for sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
View Answer
____ are used for sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
Marketing databases
Computer tracking software is sometimes called ____________________.
View Answer
Computer tracking software is sometimes called ____________________.
Stealth tracking software
Pirated copies of movies are often created today by videotaping them with a camcorder during a prerelease screening or on the opening day of a movie.
View Answer
Pirated copies of movies are often created today by videotaping them with a camcorder during a prerelease screening or on the opening day of a movie.
True
Vaporware is a term sometimes used to designate software and hardware products that have been announced and advertised, but are not yet—and may never be—available.
View Answer
Vaporware is a term sometimes used to designate software and hardware products that have been announced and advertised, but are not yet—and may never be—available.
True
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.
View Answer
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.
Cybersquatting
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of ____ financial data.
View Answer
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of ____ financial data.
corporate
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing ____________________.
View Answer
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing ____________________.
Plagiarism
Currently, the most common form of addictive behavior is e-mailing.
View Answer
Currently, the most common form of addictive behavior is e-mailing.
False
In the United States, studies show that the digital divide may be lessening, as people of every income, education, race, ethnicity, and gender continue to go online at increased rates.
View Answer
In the United States, studies show that the digital divide may be lessening, as people of every income, education, race, ethnicity, and gender continue to go online at increased rates.
True
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____a state of fatigue or frustration brought about by overwork.
View Answer
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____a state of fatigue or frustration brought about by overwork.
Burnout
The average CRT monitor alone contains about eight pounds of ____.
View Answer
The average CRT monitor alone contains about eight pounds of ____.
Lead
____________________ is a type of flat panel display device that attempts to mimic the look of ordinary printed paper.
View Answer
____________________ is a type of flat panel display device that attempts to mimic the look of ordinary printed paper.
E-paper
Intelligent Agents called entertainment bots provide entertainment, such as a virtual pet to take care of or an animated character to play games with.
View Answer
Intelligent Agents called entertainment bots provide entertainment, such as a virtual pet to take care of or an animated character to play games with.
True
Holographic data storage systems are particularly suited to applications in which large amounts of data need to be stored, retrieved quickly, and are often changed.
View Answer
Holographic data storage systems are particularly suited to applications in which large amounts of data need to be stored, retrieved quickly, and are often changed.
False
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
View Answer
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
Optical
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations--for example, the systems that check products for defects at manufacturing plants.
View Answer
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations--for example, the systems that check products for defects at manufacturing plants.
Vision
____________________ is the science of creating tiny computers and components by working at the individual atomic and molecular levels.
View Answer
____________________ is the science of creating tiny computers and components by working at the individual atomic and molecular levels.
Nanotechnology
____________________ are devices, controlled by a person or a computer, that can move and react to sensory input.
View Answer
____________________ are devices, controlled by a person or a computer, that can move and react to sensory input.
Robots




Scoreboard
Scoreboard
Team 1
Lose Point
Add Point
Team 2
Lose Point
Add Point
Team 3
Lose Point
Add Point
Team 4
Lose Point
Add Point
Team 5
Lose Point
Add Point
Team 6
Lose Point
Add Point
Team 7
Lose Point
Add Point
Team 8
Lose Point
Add Point
Team 9
Lose Point
Add Point
Team 10
Lose Point
Add Point


What Would You Like To Risk?

Scoreboard
Team 1
Minus 1
Plus 1
Team 2
Minus 1
Plus 1
Team 3
Minus 1
Plus 1
Team 4
Minus 1
Plus 1
Team 5
Minus 1
Plus 1
Team 6
Minus 1
Plus 1
Team 7
Minus 1
Plus 1
Team 8
Minus 1
Plus 1
Team 9
Minus 1
Plus 1
Team 10
Minus 1
Plus 1


Go To The Final Question
Final Score:
Scoreboard
Team 1
Lose Point
Add Point
Team 2
Lose Point
Add Point
Team 3
Lose Point
Add Point
Team 4
Lose Point
Add Point
Team 5
Lose Point
Add Point
Team 6
Lose Point
Add Point
Team 7
Lose Point
Add Point
Team 8
Lose Point
Add Point
Team 9
Lose Point
Add Point
Team 10
Lose Point
Add Point


Create a New Game Create a New Game