Internet
Email
Phishing
Parts of a computer
Random :)
100

This program allows you to surf the internet.

Ex: Google chrome-Safari

Web Browser/Search Engine

100

This symbol is required in every email address.

@

100

This is a common tactic of phishing.

EX: Your account will be closed immediately.

Urgency

100

This device displays images and text from your computer.

Monitor

100

This 1993 film features a giant them park filled with dinosaurs.

Jurassic Park

200

A fake email designed to trick people into giving personal information is called what?

Phishing

200

This folder stores emails you have started but not sent yet.

Drafts Folder

200

These 5 letters let you know a website is secure.

HTTPS

200

This flat surface below many laptop keyboards moves the cursor when you slide your finger.

Touchpad

200

This country is shaped like a boot.

Italy

300

This device provides internet access wirelessly in your home.

Router

300

This is what you call a file, photo, or document added to an email.

Attachment

300

You should take this action when coming across phishing or scam emails.

Report it!

300

This internal hardware is often called the "brain" of the computer.

CPU "Central Processing Unit"

300

This is the largest ocean on earth.

Pacific Ocean

400

This port allows you to access the internet through a wired connection.

Ethernet

400

This action sends an email you received to another person.

Forward

400

Something you should never give out in a phishing email.

Password/Personal Information

400

This part of a computer connects all of the components and allows them to communicate with each other.

Motherboard

400

This athlete has played for 3 franchises and is known as the "King".

Lebron James

500

This term describes storing files on a remote server that can be accessed from any device with internet access.

Cloud storage

500

This email feature allows you to send a copy of a message to someone without other recipients seeing their address.

BCC (Blind Carbon Copy)

500

This is a strong security method that can protect your account if your password is stolen. 

Two Factor Authentication- 2FA

500

This computer port is often used to connect a monitor to a desktop computer.

HDMI

500

What is the largest organ in the human body?

Skin

M
e
n
u