Chapter 8
Chapter 9
Mixed
Mixed
Mixed
100

A massive public online ledger that keeps track of transactions made in a digital currency.

What is blockchain

100

A computer controlled by a hacker who uses it to launch attacks on other computer systems

What is a zombie

100

Application of computer systems to gather potential legal evidence

What is computer forensics

100

Waves that illustrate the loudness of a sound at a given moment in a time

What is analog

100

Electronic sensors used to capture images on digital cameras

What is charge-coupled device (CCD) arrays

200

A system of access control that allows only limited use of material that has been legally purchased

What is Digital Rights Management (DRM)

200

A small text file that is stored on a hard drive when user visits a web site

What is a cookie

200

Any part of Internet you cannot find by using a search engine

What is Deep Web

200

Software and/or hardware designed to prevent unauthorized access to computers

What is a firewall

200

A creator's exclusive rights to use a work of intellectual property such as making copies of it

What is copyright

300

Anything designed to deceive another person either as a personal joke or financial gain

What is a hoax

300

Doing anything with a computer that is not related to a job when you are supposed to be working

What is cyberloafing

300

A computer virus that runs when a program is launched a specific number of times

What is a logic bomb

300

A rule which squeezes a given amount of audio or video information into less space

What is a codec

300

Computer hardware or software program which detects and records information being transmitted over a network

What is a packet analyzer (sniffer)

400

Websites that sell pre-written papers to students

What are paper mills

400

Sending email messages to lure users into revealing personal information 

What is phishing

400

An unwanted piggyback program that downloads with software and runs in the background 

What is spyware

400

Computer program that appears to be useful but is doing something malicious in the background

What is a Trojan horse

400

Use of a single unifying device to handle multiple needs

What is digital convergence

500

Electronically identifying someone in a post or photo

What is a tag

500

A hacker who breaks into a system and does not want to steal or cause problems

What is a white-hat hacker

500

When hoaxes become incorporated into society as true events even though they are false

What are urban legends

500

A hacker who uses knowledge to destroy information or for illegal gain

What is a black-hat hacker

500

Microphone feeds sound waves into this chip which then digitizes the waves

What is analog-to-digital converter (ADC) 

M
e
n
u