Online Safety
Passwords
Cybersecurity
Programming
Privacy
100

Yes or No: I'm online and I meet someone in a chat room. Is it OK to give that person my address or phone number?

NO!

100

How long should a password be to be considered secure?

What is sixteen characters or more.

100

Cybersecurity is the protection of _______ systems and networks. 

What is computer. 

100

Their sole purpose is to label and store data in memory.

What is a variable.

100

The freedom from interference or intrusion.

What is privacy. 

200

TRUE or FALSE? Information on the Internet can always be trusted to be factual. It wouldn’t be online if it wasn’t true. 

What is FALSE.

200
My password should include personal information about me. (ex. dog's name, hometown, last name) TRUE or FALSE?


What is FALSE.

200

What does the CIA Triad stand for?

What are confidentiality, integrity, and availability. 

200

List 4 of the 5 common data types in Python.

What are integer, float, character, string, boolean.

200

A collection of facts, numbers, words, measurements, or observations.

What is data. 

300

What percentage of teens respond to strangers (via email, SMS, instant message) online? 

a. 25% b. 63% c. 88%

What is B.

300

Passwords should include the following: (name 3) 

What are uppercase and lowercase letters, special characters, and numbers.

300

Software that is designed to intentionally cause damage to a computer, server, or network.

What is Malware. 

300

What does this code output?

for (i = 1; i <= 10; i++)

{

printf("%d", i);

}

What is 1-10. 

300

Text files with small pieces of data. (ex. username and password)

What are cookies. 

400

How old do you have to be to have a Facebook, Instagram, Twitter and Snapchat account?

What is 13.

400

I can replace letters that look like specific ______ to make my password stronger.

What is numbers. 

400

The team referenced by this color works on both the offensive and defensive side of cybersecurity.

What is Purple?

400

This kind of statement is used to check a condition once.

What is an if-else statement. 

400

What is the private browsing mode called in Chrome?

What is Incognito.

 To get to an Incognito browser press Ctrl + Shift + n. 

500

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

What is cyberbullying. 

500

 The attacker tries a list of known or commonly used passwords. This is called a ______ Attack. 

What is Dictionary Attack. 

500

Name one cyber attack and explain it.

What is Malware, Phishing, Denial of Service, XSS attack, etc.

500

Modules of code that accomplish a specific task. 

What is functions. 

500

This creates an encrypted tunnel for data and protects your online identity by hiding your IP address. 

What is a VPN. 

Virtual Private Network

M
e
n
u