Definitions
Computer Systems
Caesar Ciphers
Coding Review
100

The practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose

What is "Hacking"

100

Software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

What is "an Operating System (OS)"

100

Key: 4

Qw Glerhpiv mw qc jezsvmxi gpyf xiegliv

Ms Chandler is my favorite club teacher

100

What would you make a button that says CLICK ME?

<button>CLICK ME </button>

200

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is "Phishing"

200

This is hardware that monitors internet traffic, and lets some things through and blocks others. It views things as data packets and needs to be able to examine them to decide if they’re safe or dangerous

What is a "Firewall"

200

Key: 3

Lp vdg wrgdb lv wkh odvw gdb ri foxev


Im sad today is the last day of clubs

200

How do you code a paragraph?

<p> Text here </p>

300

Any information related to an identifiable person such as credit card numbers, social security numbers and address.

What is "Personal data or information"

300

An organized system that stores all the files on a computer. Can be accessed by applications and operating systems. Malicious actors can try to rewrite or read files. They are usually not executables,  although scripts and executables can act on them.

What is a" File System"

300

Key: 5

N bnqq mfaj kzs ymnx xzrrjw


I will have fun this summer

300

What language did we mainly use in this class?

What is "HTML"

400

A situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

What is "Spoofing"

400

This object scans file systems and active applications to look for viruses, worms, and other forms of malware. It actively removes/quarantines suspicious or dangerous files and applications. It is a software, not hardware.

What is an "Anti-virus"

400

Key: 19

B pbee ghm nlx Atvdbgz yhk tgrmabgz ftebvbhnl


I will not use Hacking for anything malicious

400

How do you input a picture?

<image> image address here </image>

500

Local data that individuals need to complete their specific tasks. This data is to be kept in the /home file system or in file systems that are created specifically for this

What is "User Data"

500

What are these called?

What are "Peripherals" 

500

Key: 16

Mxqj mqi oek vqlehyju jxydw qrekj Mxyjuxqj xqsaydw qdt soruhiuskhyjo sbkr?


What was you favorite thing about Whitehat hacking and cybersecurity club?

500

Computers that exist only to provide things to others

What are "servers"

M
e
n
u