Project SEARCH Roles
Marvel Universe
Online Safety
Internet Security
Project SEARCH Staff
100

These Richardson ISD Transition Students attend class and work at Texas Health Dallas.

What are Project SEARCH Interns?

100

This guardian of the galaxy has fur.

Who is Rocket?

100

A type of harmful code or program written to change the way a computer operates without the user’s knowledge. 

What is a computer virus?

100

This is all the information about you that appears online. This can mean anything from photos, audio, videos and texts to “likes” and comments you post in response to what other people post. .

What is Digital footprint?

100

This person is the Texas Health Dallas Volunteer Services Coordinator

Who is Amy Roper?

200

This person is the instructor at Texas Health Dallas Project SEARCH.

Who is Marcy?

200

This character flies around in a metal suit.

Who is Iron Man?

200

This is a secret string of letters, symbols, and numbers that you can use to restrict who can access something

What is a password?

200

This is a person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data. 

What is Hacker?

200

This person is someone you will work with monthly to achieve your goals? 

Who is your mentor?

300

This person is the boss of a department.

What is a manager?

300

He is known as the "God of Thunder".

Who is Thor?

300

This is information that can be used to identify you because it is unique to you (e.g., your full name, your address, your social security number, etc.)

What is Private information?

300

This is a dishonest attempt to make money by tricking people into sharing their login, personal information, contacts, etc. or tricking people out of their money or digital property

What is a Internet scam?

300

This staff person is employed by Quest Employment Services.

Who is Melody?

400

This is the role of Renee.

What is a skills trainer?

400

This villain made half the universe disappear in a snap.

Who is Thanos?

400

This is (also called two-factor verification and two-step authentication) - security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.

What is a Two-step verification?

400

This is making of someone’s personal information public online without their permission

What is Doxing?

400

This person is your Texas Workforce Counselor.

Who is Valeria?

500

These people work for Texas Health Dallas and will work with you and guide you in your internship.

What is a lead?

500

This character was a surgeon before he became a super hero. 

Who is Dr. Strange?

500

This is a type of crime in which your private information is stolen, usually in order to get money in your name.

What is the Identity theft?

500

This is an attempt to scam you or trick you into sharing your login or other personal information online. Phishing is done through email, social media, texts, ads or web pages that look similar to the ones you’re already used to but that are actually fake.

What is a Phishing?

500

This staff person is a skills trainer who works for Richardson ISD

Who is Renee?

M
e
n
u