Malicious Code
Online Predators
Scenarios
Prevention Tips
Cool Category
100
A computer program code is written with the intent to harm, destroy, or annoy.
What is Malicious Code
100
Favorite movie, favorite color, favorite subject, etc...This TYPE of information is called...
What is indirect information?
100
You should do this when you receive an e-mail with the attachment fun.exe
What is delete the message?
100
This program prevents information from entering your computer without your permission.
What is a firewall?
100
To write a formula is Excel you always have to start with...
What is an equal sign?
200
A computer program that can copy itself and infect a computer without permission or knowledge of the user.
What is a virus?
200
We know what about this person...Darthvader12: Hey what’s everyone up to?
What is their age?
200
You should you do this when your best friend told you he was sending you an attachment.
What is download the message?
200
You should ___________ your operating system?
What is update?
200
This shortcut key allows you to COPY the text.
What is CTRL + C?
300
This malicious code travels through shared files and programs and can bring down an entire system.
What is a worm?
300
What do we know about this person... DianaKleary: Ok, POS gone! DK@yahoo.com - so simple
What is first name, last name and email address?
300
You should do this when a company sends you an irritating e-mail every day—you take the following action?
What is mark it as Spam or contact your ISP?
300
You should install what kind of software to keep your computer secure?
What is anti-virus software?
300
You create these files using Google Documents.
What is documents, forms, presentation, spreadsheets?
400
These are programs that claim to do one thing but actually do another when downloaded.
What is a trojan horse?
400
Online predators use this process to take valid, safe online relationships to dangerous levels, and to break down barriers.
What is a "grooming process"?
400
When a friend sent you a movie file he just downloaded from a Person 2 Person network. Before you open the file you should...
What is Scan for Viruses?
400
This software blocks your pop-ups.
What is anti-spyware software?
400
This shortcut key allows you to Undo.
What is CTRL + Z
500
This is a program that runs in the background to monitor your computer activities
What is a spyware?
500
List three parts of grooming process.
What is similar interest, trust, secrecy, break down barriers,make threats, they will always want to meet you?
500
What should you do when you are out browsing Web sites, and one person’s PERSONAL webpage has a simple game available to download.
What is keep looking or do not open it?
500
The .exe stands for.......
What is executable?
500
This shortcut key allows you to view the internet browser in full screen.
What is F11
M
e
n
u