Computer Basics
Cybersecurity
Digital Health
Social Media
The Internet
100

What functions as the brains of the computer?


DAILY DOUBLE

The CPU: Central Processing Unit.

100

What is the CIA Triad? (What does CIA stand for?)


DAILY DOUBLE

Confidentiality, Integrity, and Availability.

100

Passwords should can 3 things, what are they?

Letters, Numbers, and Symbols.

100

When it comes to social media etiquette, be sure to be ________________ at all times.


DAILY DOUBLE

Professional

100

The Internet is wireless...

False

200

What gives power to all components of the computer?

The Motherboard.

200

One way to combat cyberbullying is to...

Anyone of these is acceotable:

Make settings private

Ignore them

Have upstanders as your friends

Tell a trusted adult



200

An open wifi is an access point that often does not require what?

A password.

200

When deleting a post, it is gone forever... Why or why not?

False. That information is permanently stored on a server somewhere in the world.

200

(IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks. What is meant by IoT?

DAILY DOUBLE

Internet of Things

300

What does RAM stand for and what does it do?

Random Access Memory

It temporarily stores information while the computer is running but disappears once it is turned off.

300

Name the 3 types of hackers and describe what they do...


DAILY DOUBLE

White hat hackers - hired to help secure systems for companies

Black hat hackers - penetrate systems illegally for personal gain

Grey hat hackers - often penetrate systems and tell the compnay in order to get some type of compensation. It is often illegal.

300

What you leave behind every single time you are using the Internet...

Digital footprint

300

Our first amendment right of the freedom of religion and free speech are extremely important. However, our First Amendment rights do not mean that we can ____________ people online.

Threaten, harrass, or bully (anyone one of these)

300

A network of computers that work together...



Botnets

400

What does GPU stand for?

Graphics Processing Unit

400

What is the definition of a bully given in class?

Someone who seeks power or laughter at the expense of another.

400

What is a phishing attack?


DAILY DOUBLE

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It requires cooperation from the victim to be successful. Clicking alink may download malware or spyware onto your device.

400

List two DOs and DONT'S of social media...

  • DO: Separate business and personal...
  • DO: Think before you share...
  • DO: Post regularly...
  • DO: Prioritize your networks...
  • DO: Interact with your audience...
  • DO: Be kind...
  • DON'T: Be needy...
  • DON'T: Be a spammer...
  • DON'T: Share personal information...
  • DON'T: Be negative, a troller, or inflamer...
400

These are used to capture information from unauthorized intruders that are tricked into accessing them because they appear to be a legitimate part of the network.


Honey Pot

500

What does the BIOS stand for?

Basic Input/Output System

500

These types of attacks are on the rise especially for school systems, big corporations, hospitals and energy supply chains.

Ransomware 

500

What is social engineering?


DAILY DOUBLE

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.

500

The process of luring someone into a relationship by means of a fictional online persona.

Catfishing

500

Who is Tim Berners-Lee?

He is known as the inventor of the World Wide Web.

M
e
n
u