What is a software designed to detect and remove malware?
antivirus
What malware locks users out of their system until a ransom is paid?
Ransomware
What is the term for bullying that occurs online?
Cyberbullying
What virtual assistant is an example of AI in smartphones?
Siri
What should be enabled on all devices to help track them when lost?
GPS
What is the act of trying to guess someone's password called?
Hacking
What is an attack that tricks users into revealing sensitive information?
Phishing
What is a common emotional effect of cyberbullying?
Depression
What AI technology is used for recognizing faces in photos?
image recognition
What method involves verifying a login attempt through two forms of identification?
2FA (Two-factor authentication)
What type of network connection is often more secure: wired or wireless?
Wired
What is the malicious software that replicates itself to spread?
Worm
What popular social media platform is often used for cyberbullying?
What kind of AI device can you talk to at home to control your smart lights?
Alexa
What is the term for unsolicited email, often used in phishing attacks?
Spam
What is a program that protects your computer from unauthorized access?
Firewall
What is the exploitation of a previously unknown vulnerability in software?
Zero-day
What is the action of sending threatening messages repeatedly?
Harassment
What AI-based service can translate speech into another language?
Translator
What is the term for a combination of letters, numbers, and symbols to secure accounts?
strong password
What is it called when someone uses your personal information without permission?
Identity theft
What type of attack floods a network with traffic to crash it?
DDoS
What is the term for spreading rumors online to harm someone's reputation?
Slander
What do we call an AI technology that allows cars to drive themselves?
Autopilot
What is the term for software that automatically updates to fix vulnerabilities?
Patches