Copy
Command - C
A security process in which a user provides two different authentication factors to verify their identity, typically something they know (password) and something they have (a smartphone or token).
Two-Factor Authentication (2FA)
What is our principal's name?
Mr. James McNeany
What book follows the character Anne Shirley?
Anne of Green Gables
What was the name of the first Pilgrims' ship?
The Mayflower
Command - P
The trail of data and information individuals leave behind as they use digital devices and the internet, which can impact their privacy and security.
Digital Footprint
What is our deacon's name?
Dcn. Rick Wagner
Who wrote The Little Mermaid?
Hans Christian Andersen
Who was the second president?
John Adams
Open new tab.
Command - T
A type of malware that attaches itself to legitimate programs and spreads by infecting other files or computer systems.
Virus
Name of mascot:
Gizmo
What is the name of Odysseus’ son from the Odyssey?
Telemachus
What years were World War II?
1939-1945
Screenshot a certain section of your screen.
Shift - Command - 5
The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read it.
Encryption
What year did GC open?
2004
Who wrote the To Kill a Mockingbird?
Harper Lee
What tribe was Pocahontas from?
Powhatan
Adjust the volume in thirds.
Shift - Option - Volume
A fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by posing as a trustworthy entity in an electronic communication, typically an email.
Phishing
What is our vision statement?
Lead with Humility, Serve with Love, Trust in Providence
Who declined the 1964 Nobel Prize for literature?
Jean-Paul Sartre
Who was the first president to declare war?
James Madison