The practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose
What is "Hacking"
Software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
What is "an Operating System (OS)"
Key: 4
Qw Glerhpiv mw qc jezsvmxi gpyf xiegliv
Ms Chandler is my favorite club teacher
What would you make a button that says CLICK ME?
<button>CLICK ME </button>
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is "Phishing"
This is hardware that monitors internet traffic, and lets some things through and blocks others. It views things as data packets and needs to be able to examine them to decide if they’re safe or dangerous
What is a "Firewall"
Key: 3
Lp vdg wrgdb lv wkh odvw gdb ri foxev
Im sad today is the last day of clubs
How do you code a paragraph?
<p> Text here </p>
Any information related to an identifiable person such as credit card numbers, social security numbers and address.
What is "Personal data or information"
An organized system that stores all the files on a computer. Can be accessed by applications and operating systems. Malicious actors can try to rewrite or read files. They are usually not executables, although scripts and executables can act on them.
What is a" File System"
Key: 5
N bnqq mfaj kzs ymnx xzrrjw
I will have fun this summer
What language did we mainly use in this class?
What is "HTML"
A situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
What is "Spoofing"
This object scans file systems and active applications to look for viruses, worms, and other forms of malware. It actively removes/quarantines suspicious or dangerous files and applications. It is a software, not hardware.
What is an "Anti-virus"
Key: 19
B pbee ghm nlx Atvdbgz yhk tgrmabgz ftebvbhnl
I will not use Hacking for anything malicious
How do you input a picture?
<image> image address here </image>
Local data that individuals need to complete their specific tasks. This data is to be kept in the /home file system or in file systems that are created specifically for this
What is "User Data"
What are these called?

What are "Peripherals"
Key: 16
Mxqj mqi oek vqlehyju jxydw qrekj Mxyjuxqj xqsaydw qdt soruhiuskhyjo sbkr?
What was you favorite thing about Whitehat hacking and cybersecurity club?
Computers that exist only to provide things to others
What are "servers"