Information
Networking
Social Media
The Enemy
Internet
100

The quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.

What is Data?

100

A group of interconnected (via cable and/or wireless) computers and peripherals that is capable of sharing software and hardware resources between many users. 

What is a Network?
100

Is bullying that takes place over digital devices. It can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. It also includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. 


What is Cyberbullying?
100
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.


Who are hackers?
100
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox, and Safari are examples of these.

What is a browser? (or web browser)
200

The enciphering and deciphering of messages in secret code or cipher. The computerized encoding and decoding of information. Is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). 

What is Cryptography or Encryption?

200
Computers dedicated to managing shared resources.

What is a Server?
200

The use of personality, knowledge of human nature and social skills to steal passwords, keys, tokens or other credentials to gain access to systems.

What is Social Engineering? 
200

Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.

What is Phishing?
200
Internet users can be assured that a website encrypts its traffic by this symbol in a URL.


What is a lock symbol?
300

Connecting with family and friends online can be fun and exciting, but it also comes with some risks.  Please provide a risk to staying online?

What is / are ____?

Privacy, Permanency, Predators, Identity fraud, Trolling & Catfishing just to name a few.

300

Controls traffic within a network.

What is a Switch?

300

Are pieces of information that can be attached to a tweet, status, or photo on a social networking site that shows the physical location of where something had been posted.

What is geotagging?

300
Hackers wreak havoc across the globe for various reasons. Some of those reasons include_____.

What is to make discoveries?

What is to steal information?

What is to expose corruption?

What is to protect information? 

300

Use at least 3 of the following with at least 8 characters denotes:

 Numbers

 Lower case letters

 Upper case letters

 Symbols (% # * & ! : { “ > |)

What is Password Complexity?
400

Is an environment, such as a program or operating system that does not physically exist, but is created within another environment. Does not have hardware, a power supply, or other resources that would allow it to run on its own. Essentially allows you to run a computer within your computer.

What is a Virtual Machine (VM)?

400
Controls traffic between networks.


What is a Router?
400

Your digital footprint is the mark that you leave behind when using the internet and can shape your online reputation. Your digital footprints can be positive or negative and shape how people see you now or in the future. These are ways to safeguard your digital citizenship.



What is / are _____?

Search yourself online, check privacy settings, think critically before you post, deactivate and delete old accounts, and make a positive footprint to name a few. 

400

Is a previously unknown computer virus or other malware for which specific antivirus software signatures are not yet available. Traditionally, antivirus software relies upon signatures to identify malware.

What is a Zero-Day Attack/Virus?
400

The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. 

What is the Internet of Things?

500

Coordinates a system’s resources so things perform and respond predictably for users. Allows users to configure the computer’s resources without making permanent changes to them. Manages the hardware/software resources so they are used efficiently by applications.

What are Operating Systems?
500

Software designed to block malware from entering protected networks. Screen incoming and outgoing traffic for anomalies and potential threats.

What is a Firewall?
500

This should be standard security practice for everyone online today. This type of authentication forces anyone logging into an account to supply a code sent to an external device or use other 3rd party software.

What is multi-factor authentication?

500

A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.

What is ransomware?
500

A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.

What is Software Patch?
M
e
n
u