Bad guys who try to break into computers.
Who are hackers?
The safest kind of password is long and has letters, numbers, and these.
What are symbols (like @, $, &)?
This term describes someone who pretends to be someone else online, often in dating apps or social media.
What is catfishing?
The most commonly used password in the world (that you should never use).
What is "123456" or "password"?
What year did Wicys become an organization at North Carolina A&T?
What is "2023".
This type of software detects and removes malicious software from a device.
What is antivirus software?
You're in a coffee shop using public Wi-Fi and need to log into your bank. The safest way is...
What is "Use a VPN or wait until you're on a private network"?
This hidden part of the internet is only accessible via special browsers
What is the Dark Web?
This 1999 movie features hackers dodging agents in a simulated reality.
What is The Matrix?
What year was WiCyS founded as an organization?
What is "2013".
This popular retailer suffered a massive data breach in 2013, exposing 40 million credit card numbers.
What is Target?
Your professor just sent you a file named “Exam_Answers.exe”—what should you do?
What is "Do not open it because executable files can contain malware!"?
If a website looks weird and too good to be true, it might be a ____.
what is a scam?
This type of artificial intelligence-based media manipulation creates highly realistic but entirely fake videos or images, often used for misinformation, scams, and impersonation.
What is a deepfake?
What is the first name of the WiCyS secretary?
Amanda
An attack that floods a website with too much traffic and makes it crash
What is a DDoS attack
A VPN helps protect your internet traffic by doing this.
What is encrypting your connection and masking your IP address?
The internet address of a website is called a ____.
What is a URL?
Your laptop is running super slow, random pop-ups appear, and files are missing. You might have...
What is malware?
Name of the current WiCys President?
Danyelle P.
A secret attack that stays hidden in your computer for a long time.
What is a trojan or spyware?
This is the process of converting data into a secret code to prevent unauthorized access.
What is encryption?
This type of attack tricks you into downloading fake software.
What is malware?
The thing you should always do to apps and software to keep them safe.
What is update them?
what are the colors of WiCys colors?
Purple and Green