What do you do to avoid phishing?
Block Them, Report them, Delete the Message, Tell a Trusted adult, and etc...
How many Tabs are in a powerpoint?
8.
True or False:
The Rows are Numbered
True
What are Hackers?
People who steal your information.
Text Message Notification:
HEy gyal my mom died and i NEED some money to survive can you send me 500 BUCKS. PLEASE I NEED IT!! Here's the link to my zelle. WWW.https//.zelle.com
What should you do?
A. Block her
B. Ask what happened
C. Tell someone
D. Click the Link
A. Block her
Should You Click on a Link someone sends you?
No.
Where is the Shapes option found?
A. Transitions
B. Animations
C. Home
D. Insert
D. Insert
What are the single boxes called?
Cells.
What are black hat hackers?
The stereotype hackers who hack illegally.
Dunkin Notification:
New deal! Buy one get one free. Buy one donut and you will get one free. You can choose any donut of your choice!!
Which Link is with Dunkin?
A. htps:/ww.dunki.com
B. https://www.dunkindonuts.com/en
C. HTps://www.DUNkinD)nuts.com
D. https:/www.dunkindonuts.com/en
Fill In The Blank:
When someone poses as an institution, like a bank or a
school, and sends you a _______________ asking
you to provide private information.
A. Own Message
B. Phone call
C. Personalized Message
D. A Text
C. Personalized Message
True or False:
Powerpoint automatically saves
False
How do you merge cells?
Right click and then drag. Then press merge & center.
True or False:
Hackers can be only harmful
False, it can also be useful
Is it okay to share to share your password?
No.
How can you identify a phishing scam?
A. Spelling professionally
B. Sense of Urgency
C. Exclamation Points
D. Quotations
B. Sense of Urgency
What does PowerPoint provide?
A. Templates
B. Images
C. Visual Appeal
D. All of the Above
D. All of the Above.
Where do you add another sheet?
On the bottom next to Sheet1.
What do White hackers do?
A. Spy on victim activities
B. Often hack into their targets' networks to look for vulnerabilities in a system without the owner's' permission or knowledge
C. Use their powers for good rather than evil
C. Use their power for good rather than evil
What do scammers ask for the most?
A. Personal Information
B. Social Apps passwords
C. Money
D. Social Security
C. Money
What is the percentage of getting phished with emails?
A. 20%
B. 1.2%
C. 5.3%
D. 10%
B. 1.2%
Who Created Powerpoint?
A. James Watson and Peter Jackson
B. Robert Gaskins and Dennis Austin
C. Liam Andrews and Jason Easton
D. Carter Davis and James Watson
B. Robert Gaskins and Dennis Austin
What do you do when there's to many words in the cell?
Right click and then choose wrap text.
Define Firewall
A firewall is a device that enables or stops traffic based on a set of rules.
What are Scammers?
People who try to steal your money.