Operating Systems
Networks
Cybersecurity
Privacy and Security
Cyberbullying and Digital Footprint
100

Name 3 types of operating systems.

iOS, Windows, ChromeOS, etc.
100

What is an algorithm?

A step by step process to solve something.

100

What is cybersecurity?

Protecting devices from digital attacks, damage, and unauthorized users. 

100

What is privacy?

Privacy is the way that your data is being used.

100

What is a digital footprint?

Information that exists on the internet about a person based on online activity.

200

Why do we need an operating system?

Helps the user communicate with the computer; Manages hardware and software.

200

What is the largest type of network?

WAN.

200

This type of cyber attack demands users pay a certain amount of money in order to decrypt their files.

Ransomware.

200

Why is it important to read privacy policies?

To understand how your data is being used.

200
Name something that impacts your digital footprint.

Comments, things you post, things you search, etc.

300

What is an operating system?

Collection of software that manages hardware and applications.

300

Connecting your phone to Bluetooth headphones is an example of which network?

PAN

300

Name one sign of phishing.

Misspellings, urgency, wrong email, etc.

300

What is security?

The confidentiality and integrity of your data.

300

Who can potentially look at your digital footprint?

Employers, colleges, scholarship committees, acquaintances. 

400

Which scheduling algorithm allows the most important process to go first?

Priority Scheduling

400

What does a router do?

Help direct data across networks.

400

What happens during keylogging?

It records everything the user types on the infected computer.

400

What are 3 characteristics of a strong password?

8-20 characters, numbers, lower and uppercase letters, special characters.

400

True or false, checking the post you are tagged in helps maintain a positive digital footprint. 

True.

500

Name a function of the OS. 

Process Management, Security, File Management, etc.

500

True or false, the internet is made up of cables that run underground and underwater. 

True.

500

What is encryption?

Process of converting data into an unreadable, scrambled format. 

500

How can your digital footprint affect your privacy and security?

Posting certain information can help hackers figure out passwords and security questions. 

500

Give an example of a social media guideline(How should you behave on social media?)

Don't be a bully, don't post inappropriate things, don't vent about people online.

M
e
n
u