Name 3 types of operating systems.
What is an algorithm?
A step by step process to solve something.
What is cybersecurity?
Protecting devices from digital attacks, damage, and unauthorized users.
What is privacy?
Privacy is the way that your data is being used.
What is a digital footprint?
Information that exists on the internet about a person based on online activity.
Why do we need an operating system?
Helps the user communicate with the computer; Manages hardware and software.
What is the largest type of network?
WAN.
This type of cyber attack demands users pay a certain amount of money in order to decrypt their files.
Ransomware.
Why is it important to read privacy policies?
To understand how your data is being used.
Comments, things you post, things you search, etc.
What is an operating system?
Collection of software that manages hardware and applications.
Connecting your phone to Bluetooth headphones is an example of which network?
PAN
Name one sign of phishing.
Misspellings, urgency, wrong email, etc.
What is security?
The confidentiality and integrity of your data.
Who can potentially look at your digital footprint?
Employers, colleges, scholarship committees, acquaintances.
Which scheduling algorithm allows the most important process to go first?
Priority Scheduling
What does a router do?
Help direct data across networks.
What happens during keylogging?
It records everything the user types on the infected computer.
What are 3 characteristics of a strong password?
8-20 characters, numbers, lower and uppercase letters, special characters.
True or false, checking the post you are tagged in helps maintain a positive digital footprint.
True.
Name a function of the OS.
Process Management, Security, File Management, etc.
True or false, the internet is made up of cables that run underground and underwater.
True.
What is encryption?
Process of converting data into an unreadable, scrambled format.
How can your digital footprint affect your privacy and security?
Posting certain information can help hackers figure out passwords and security questions.
Give an example of a social media guideline(How should you behave on social media?)
Don't be a bully, don't post inappropriate things, don't vent about people online.