online privacy
cyberbullying
malware
Hackers
software
100

How to protect yourself from online privacy invaders?

  1. Use a strong and separate password for your email.
  2. Install the latest software and app updates.
  3. Turn on 2-step verification (2SV)
  4. Password managers: using browsers and apps to safely store your passwords.
  5. Backing up your data.
100

How to get help when cyberbullied?

  • Don’t respond to and don’t forward cyberbullying messages.
  • Keep evidence of cyberbullying. Record the dates, times, and descriptions of instances when cyberbullying has occurred. Save and print screenshots, emails, and text messages. Use this evidence to report cyberbullying to web and cell phone service providers and social media sites.
  • Block the person who is cyberbullying.
100

How to avoid scams?

Real investments don’t just come out of the blue.

Check the source to make sure it’s real.

Get a second opinion before handing over money.

If you don’t understand it, walk away

100

Who is a hacker?

A "hacker" is broadly someone skilled in computer technology, often specializing in cybersecurity. However, the term is often associated with individuals who exploit systems for malicious purposes, such as stealing data or causing disruption.

100

what is freeware?

freeware, software that is typically proprietary and is offered at no cost to users.

200

How to create strong passwords?

At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols. Not a word that can be found in a dictionary or the name of a person, character, product, or organization.

200

what is cyberbullying?

Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content.

200

What is virus?

A computer virus is a malicious software program that can attach itself to other programs, replicate, and spread to other devices

200

what is  red-hat hacker?

A red hat hacker is a hacker who acts as a digital activist or a vigilante and uses their hacking knowledge to convey a message. Their reasons for hacking might be political, social, religious, or ideological

200

What is darkweb?

The dark web is a part of the internet that's hidden from standard search engines and requires special software, like Tor, to access. It offers anonymity and is often associated with illegal activities, but also legitimate uses like whistleblowing and secure communication.

300

What is encryption?

the process of converting information or data into a code, especially to prevent unauthorized access

300

How to report cyberbullying?

Please call your local police force on 101 if you think you are being harassed or threatened online.”

300

What is a worm?

A computer worm is a malicious program, or malware, that can self-replicate and spread across networks and systems without requiring human interaction

300

What is a cracker?

 a "cracker" refers to an individual who attempts to gain unauthorized access to computer systems, networks, or data, often with malicious intent. This is also sometimes referred to as a black hat hacker.

300

what is a share ware?


  1. software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.


M
e
n
u