What functions as the brains of the computer?
DAILY DOUBLE
The CPU: Central Processing Unit.
What is the CIA Triad? (What does CIA stand for?)
DAILY DOUBLE
Confidentiality, Integrity, and Availability.
Passwords should can 3 things, what are they?
Letters, Numbers, and Symbols.
When it comes to social media etiquette, be sure to be ________________ at all times.
DAILY DOUBLE
Professional
The Internet is wireless...
False
What gives power to all components of the computer?
The Motherboard.
One way to combat cyberbullying is to...
Anyone of these is acceotable:
Make settings private
Ignore them
Have upstanders as your friends
Tell a trusted adult
An open wifi is an access point that often does not require what?
A password.
When deleting a post, it is gone forever... Why or why not?
False. That information is permanently stored on a server somewhere in the world.
(IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks. What is meant by IoT?
DAILY DOUBLE
Internet of Things
What does RAM stand for and what does it do?
Random Access Memory
It temporarily stores information while the computer is running but disappears once it is turned off.
Name the 3 types of hackers and describe what they do...
DAILY DOUBLE
White hat hackers - hired to help secure systems for companies
Black hat hackers - penetrate systems illegally for personal gain
Grey hat hackers - often penetrate systems and tell the compnay in order to get some type of compensation. It is often illegal.
What you leave behind every single time you are using the Internet...
Digital footprint
Our first amendment right of the freedom of religion and free speech are extremely important. However, our First Amendment rights do not mean that we can ____________ people online.
Threaten, harrass, or bully (anyone one of these)
A network of computers that work together...
Botnets
What does GPU stand for?
Graphics Processing Unit
What is the definition of a bully given in class?
Someone who seeks power or laughter at the expense of another.
What is a phishing attack?
DAILY DOUBLE
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It requires cooperation from the victim to be successful. Clicking alink may download malware or spyware onto your device.
List two DOs and DONT'S of social media...
These are used to capture information from unauthorized intruders that are tricked into accessing them because they appear to be a legitimate part of the network.
Honey Pot
What does the BIOS stand for?
Basic Input/Output System
These types of attacks are on the rise especially for school systems, big corporations, hospitals and energy supply chains.
Ransomware
What is social engineering?
DAILY DOUBLE
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
The process of luring someone into a relationship by means of a fictional online persona.
Catfishing
Who is Tim Berners-Lee?
He is known as the inventor of the World Wide Web.