Password Power
Phishing & Scams
Digital Footprint & Reputation
Cyberbullying & Ethics
Malware & Online Threats
100

What is the difference between a dictionary attack and a brute-force attack on a password?

A dictionary attack tries common words/phrases, while brute-force tries every possible combination of letters, numbers, and symbols.

100

How can you identify a spoofed website?

Check for misspellings in the URL, lack of HTTPS, or unusual design that doesn’t match the official site.

100

Why is “I deleted it, so it’s gone” dangerous?

Deleted posts may be archived, screenshotted, or stored on servers.

100

How is cyberbullying different from traditional bullying?

It can happen anytime, spread quickly to a large audience, and be anonymous.

100

Difference between a virus, worm, and Trojan horse?

Virus = attaches to files, Worm = spreads without files, Trojan = disguised as safe software.

200

Why is “Pa$$w0rd123” still considered weak even though it has symbols and numbers?

It’s predictable because it’s based on a common word and common substitutions hackers expect.

200

Why are HTTPS and the padlock symbol important?

They show the site uses encryption, protecting data as it travels online.

200

How can companies use your digital footprint to target ads?

They track browsing/search history and build profiles to show personalized ads.

200

Why is being a bystander to online bullying harmful?

It allows bullying to continue and makes the victim feel unsupported.

200

Explain how ransomware works.

It locks or encrypts your files and demands payment to unlock them.

300

Why is a password manager safer than writing passwords in a notebook?

It encrypts and stores complex unique passwords securely, reducing the chance of theft or loss.

300

How can a phishing email trick someone even if it looks professional?

It may copy logos and language but usually contains suspicious links, urgent tone, or requests for personal info.

300

What could happen if a university finds offensive posts you made years ago?

It could harm your chances of admission due to poor online reputation.

300

If you screenshot and share a private conversation, what ethical principle are you breaking?

Privacy and confidentiality.

300

What is the role of antivirus software?

Detects, quarantines, and removes malware to protect devices.

400

What does “salting a password” mean in cybersecurity?

Adding random data to a password before hashing it, making it harder for hackers to crack.

400

What’s the difference between phishing, smishing, and vishing?

Phishing = email fraud, smishing = SMS/text fraud, vishing = voice/phone fraud.

400

Difference between active and passive digital footprint?

Active = things you post (comments, photos), Passive = data collected without you posting (cookies, tracking).

400

How can the law get involved in cyberbullying cases?

Cyberbullying can be a crime (harassment, defamation, threats), and victims can report it to authorities.

400

Why might a free Wi-Fi hotspot be risky?

Hackers can intercept data (passwords, messages) on unsecured networks.

500

If a website you use gets hacked, what’s the first thing you should do?

Change your password immediately (and anywhere else you used the same password).

500

You receive an email from your bank asking for your account number. How do you verify it?

Don’t click links — instead, contact the bank directly through official phone numbers or websites.

500

Example of digital footprint affecting job applications?

An employer finds inappropriate photos or rude comments, leading them not to hire you.

500

Should schools monitor students’ social media activity? Argue for/against.

For: To protect students from harm.
Against: It invades privacy and control outside of school.

500

Explain how a keylogger can steal your information.

It secretly records everything you type, like usernames and passwords, and sends it to hackers.