Data Storage Evolution
Physical Computer Parts
History Of Cell Phones
Threat Awareness
Online Safety Information
100

The smallest unit of data a computer can read

What is a Bit

100

The main board of a computer. It's fundamental job is to connect all other hardware and communicate them with each other.

What is Motherboard 

100

Costing nearly $4000, weighing 1.1KG, offering a stunning 30m of talk time and taking over 10 hours to charge. This is the first commercially available mobile phone. Affectionately named "The Brick"

What is Dynatec 8000x

100

This is the term for a cyberattack that pretends to be a message from a trusted source to steal your personal info.
 

What is Phishing

100

Everything we do online leaves a data trail that can be easily traced.

Digital Footprint 

200

in 1956 this computer manufacturer created the FIRST Harddrive and it weight about a ton. it stored up to 5BM of data.

What is IBM

200

The "Brain" of the computer

What is CPU or Processor

200

Sent in 1992, for the first time ever, this groundbreaking communication simply wished someone a "Merry Christmas."

What is a Text or SMS

200

This type of MALWARE encrypts your data on your computer or network. Holding the device for "Ransom"

What is Ransomeware

200

This process turns your data into a "secret code" that only the right person can read. It scrambles the information during transmission and unscrambles after provided the key

What is Encryption

300

In 1995,  Sony, Philips, Panasonic, and Toshiba introduced this digital optical disc format, set to replace VHS.

hint: stores 4.79GB of data.

What is DVD

300

This computer component uses a disk that is read by a mechanical arm and needle just like a record player. It is the slowest form of modern storage currently compared to the alternatives 

What is a HDD

300

Released in 1994, this IBM device is widely recognized as the first true smartphone, combining a mobile phone with PDA features like email and a touchscreen

What is: Simon Personal Communicator 

300

This type of cyber threat involves manipulating people by using time pressure, emotional motivation, and clear expectations to trick them into revealing sensitive information.

What is social engineering?

300

This tool safely manages your complex and strong passwords will be readily available so you wont have to remember them.

What is Password Manager

400

Freeing users from physical hard drives and USB sticks, this method of data preservation gained significant traction starting in 2006 when amazon launched this service.

Cloud Storage

400

This type of graphics are built into the processor and share the processors memory, trading cost for efficiency.

what is integrated graphics 

400

Debuting in 2017, this device was the first flagship Apple phone to ditch the home button in favor of a new biometric security system called Face ID.

What is iPhone 10

400

This term describes a weakness in a system that could be exploited by a threat actor to gain unauthorized access or cause harm. 


What is Vulnerability 

400

Never provide sensitive information over an unsecured network, this makes it easy for criminals to steal from you , unless you have one of these

What is VPN

500

This method of inputting data from punch cards or documents uses light to detect marks or holes.

What is Photoelectric Scanning 

500

 ___ is Volatile memory that is erased each time the computer is restarted. The more ____ you have the more tasks your computer can preform at one time.

What is RAM

500

The Pantech GI100 in 2004 was among the first cellphones to incorporate this biometric feature, allowing users to unlock their device with a touch of their digit.

Fingerprint Scanning function 

500

A  ___ Phishing attack
is when the message is specially crafted that would make sense to you. It is specific to you and your environment.

What is Spear

500

The "Gold" Standard of Authentication.

hint: Having a safe that requires more than one key to open the vault. If a person steals one key, they cannot get in without the second.

Multifactor Authentication

M
e
n
u