Emerging Tech
Examples
Cyberattacks
Catch a Phish
Cybersecurity
100

What do we call the technology that allows machines to learn from data?

Machine Learning

100

Opening the same file in Google Drive at home on Chromebook and at school on desktop is possible because files are saved on the what?

Cloud

100

An ethical hacker tries to break a computing system with authorization. True or False

True

100

Poor grammar is often a sign of phishing.  True or False

True

100

What do we call unwanted emails that often contain malware?

Spam or Junk

200

This type of technology simulates human intelligence.

AI (Artificial Intelligence)

200

A remote team works from different what?

locations

200

Using words from the dictionary as passwords is a best practice. True or False

False

200

Making phone calls pretending to be someone else in order to get their personal information is known as what?

Vishing

200

This term refers to the act of tricking individuals into revealing personal information via digital messages.

Phishing

300

A system of interconnected devices that can collect and exchange data is known as what?

IoT (Internet of Things)
300

ChatGPT, SIRI, and Alexa are all applications of this?

AI (Artificial Intelligence)

300

Strong passwords include letters, numbers, and what?

Symbols

300

Opening these in an email from unknown senders could cause a virus on your computer

Attachments

300

What type of malicious software locks users out of their files?

Ransomware

400

Machines assembling products at a factory and a vacuum that works automatically are examples of what?

Robots or Robotics

400

A Fitbit watch, refridgerator, and  camera that can connect to WIFI are examples of:

IoT (Internet of Things)
400

A hacker uses creative ________  techniques

problem-solving

400

 Another term for junk email is what?

Spam

400

What term describes a computer program that replicates itself and infects other computers?

Virus

500

Google drive and iCloud are examples of what?

cloud computing

500

Pokemon Go is an example of what emerging technology?

AR (Augmented Reality)
500

An attack that prevents access to files, data, etc unless you pay

Ransomware

500

What age range does COPPA protect

Children under 13

500

This document explains how a company collects, uses, and protects personal data from users

Privacy Policy

M
e
n
u