What is hardware?
This term refers to the physical components of a computer system, including the monitor, keyboard, and processor
What is a digital identity?
This term refers to the online persona or profile you create and maintain across various digital platforms.
What are search criteria?
This practice involves using specific words or phrases to narrow down search results when looking for information online
What is instant messaging?
This popular form of digital communication allows users to send short, instant messages to individuals or groups.
What is ransomware?
This type of malicious software is designed to block access to a computer system until a sum of money is paid.
What is an Operating System?
This software manages a computer's hardware and provides common services for computer programs
What is managing your digital reputation?
This practice involves being mindful of how your online actions and content can affect your reputation and opportunities in the real world.
What is copyright?
This term refers to the legal protection given to original works of authorship, including literary, dramatic, musical, and artistic works
Name 2 types of video conference software used in a professional setting.
Zoom
Teams
Meets
What is two-factor authentication?
This cybersecurity practice involves using two different components to verify a user's identity before granting access to an account or system.
What does NIC stand for?
Network Interface Card
What is cyberbullying?
This type of digital behavior includes harassment, threats, or sharing private information about others online without their consent.
What is autosave?
This feature in word processing software allows you to automatically store previous versions of a document as you work on it
What is online collaboration?
This term refers to the practice of working with others towards a common goal using digital tools and platforms.
What is phishing?
This term refers to a deceptive practice where attackers impersonate legitimate entities to trick individuals into revealing sensitive information.
What is the PS/2 on a desktop computer?
A PS/2 on a desktop refers to a 6-pin mini-DIN connector used for connecting keyboards and mice to a computer.
What is digital etiquette?
These are the unwritten rules and expectations for appropriate behavior in digital environments, including social media and online forums.
True or False: When creating a presentation, this principle suggests using no more than 6 lines of text with 6 words per line on each slide
True
What is BCC (Blind Carbon Copy)?
This feature in email applications allows you to send a copy of an email to additional recipients without the primary recipient knowing
Why should I trust HTTPS over HTTP?
HTTPS is recommended over HTTP because it provides enhanced security through data encryption, authentication, and integrity, protecting sensitive information from interception and ensuring user trust.
How does LAN network work?
A LAN is a network that connects devices within a small area, enabling them to share resources and communicate.
What is digital literacy?
This skill involves the ability to recognize, evaluate, and respond to digital content that may be misleading, biased, or false.
What is attribution?
This ethical practice involves giving credit to the original source when using someone else's ideas, words, or work in your own content
Name 3 professional team collaboration platforms software programs.
Teams
Gmail
Microsoft Outlook
Zoom
etc.
Tell me a scenario of a Cyber Security Threat.
(scenario)