What is a computer program which replicates and spreads itself from one computer to another
Computer Virus
What is Protecting users' personal information and ensuring they are informed about how their data is collected, used, and shared.
Privacy
What is the collection of computers controlled by users other than their owners to perform automated tasks over the Internet
Botnet
What High School did Ms. M attend
Vigor
How long has Ms. M been teaching
5 years
What is implementing measures to safeguard users' data and online interactions from unauthorized access or breaches.
Security
What is Ms. M favorite color
Royal Blue
What is Ms. M favorite chocolate
Hershey with Almonds
What is use of other people’s words, thoughts or ideas without crediting the source
Plagarism
What is a method through which hackers can gain access to a computer
Social Engineering Vector
What is infringement
the action of breaking the terms of a law, agreement, etc.; violation
What does FBLA stand for?
Future Business Leaders of America
What is a crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain
Identity Theft
What is someone who illegally gains access to others’ computer for their own profits
Hacker
What is a device which forwards data packets from one network to another
Router Computer
What is adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
Online Predator
What is network controller which connects network devices and allows effective communication between these devices
Network Switch
What is fraud which involves stealing personal information for financial gain through
Email Scam
What is exception to copyright infringement
Fair Use
What is software designed to protect computers from viruses
Firewall
What is granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production
Copyright
What is use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Cyberbullying