A small piece of information sent by a web browser and stored on a user's device.
Cookies
This word is derived from the Greek word "Ethos" and helps determine how we make our choices
Ethics
What is the name of the self replicating form of malware?
Worm
True or False: Computer files back up automatically so there's no reason to back anything up
False
What is adware?
A form of malware that includes pop-ups, banner ads, banners, annoyware, drive-by downloads and warning boxes
Name one of the three authorities you can go to in order to report a cybercrime.
U.S. Secret Service, Federal Bureau of Investigation, or IC3 Internet Crime Complaint Center
While different, a computer virus and worm can be described as forms of _________.
Malware
Any crime that involves a computer can be describes as a ___________.
Cybercrime
This term is used to describe the illegal stealing, copying or spreading of software, movies and music.
Pirating
You are protected from electronic search and seizure by which amendment?
The fourth
While it was created as a prank, this boot sector virus would later become known as the first virus.
Elk Cloner
What is Microsoft 365 Outlook mainly used for?
Emailing
How could you avoid infringing on somebody else's copyright?
You ask the copyright owner for permission
Fill in the blanks: A _____1_____ alters electronics legally, while a ____2______ illegally alters electronics.
1. Hacker
2. Cracker
In 1988 this worm was the first to be distributed on a network without anybody knowing about it.
Morris Worm
Local Area Network (LAN)
This file sharing method, referred to as P2P, involves files being downloaded from various computers and not just one network, computer, or server.
Peer-to-Peer
How long is an individual production protected under copyright law?
70 years after the death of the creator
This antivirus is recommended for use on both a Mac and Windows system.
Norton Antivirus
What is the decimal representation of this binary number: 1111
15