Choose the correct pronoun:
A hacker is a person ___ breaks into computer systems.
a) which b) who c) whose
b) who
Choose the correct form:
New IoT devices ___ every month.
a) is created b) are created c) create
b) are created
Choose the correct meaning:
You don't have to be a cybersecurity expert.
a) It is forbidden. b) It is not necessary. c) It is a good idea.
b) It is not necessary.
What is malware?
a) A strong password. b) A program that damages or steals data. c) A type of VPN.
b) A program that damages or steals data.
You are applying for a software internship. Which sentence is better for a cover letter?
a) Through my personal projects, I have experience in JavaScript and C++. b) I am a motivated person.
a) — it is specific and shows real evidence.
Correct the sentence:
This is the app which I downloaded it last week.
This is the app which I downloaded last week. (remove "it")
Rewrite in the passive:
Engineers install smart sensors in millions of devices every year.
Smart sensors are installed in millions of devices every year.
Correct the sentence:
You mustn't sharing your password with colleagues.
You mustn't share your password with colleagues.
Name the scam:
You get a text message with a link asking you to confirm your bank details.
Smishing
Is this a good weakness answer? Why / why not?
"I am a perfectionist and I work too hard."
No — it sounds dishonest/clichéd. A good answer names a real weakness and says what you are doing to improve it.
Combine the sentences:
Phishing is a scam. It tricks people into sharing their passwords.
Phishing is a scam which/that tricks people into sharing their passwords.
Fill in the gap and explain your answer.
The security system ___ by the IT department.
1. was installed (if we know when it happened, e.g. last week)
2. has been installed (if we are interested in result, but we do not say when it happened)
3. will be installed (if we talk about future)
Write the correct modal:
___ I click on a suspicious link?
No, you ___. It could be malware.
Should ... shouldn't.
Complete the sentence using a relative clause:
A fake store is a website ___ .
Possible answer:
...where scammers try to steal your money or data.
Correct the cover letter sentence:
"I am a hard-working person with good skills."
Student's own answer.
Must be specific, e.g. mention a real skill with an example.
I am a detail-oriented person. During my studies, I found and fixed over 20 bugs in our team's code before the final submission, which helped us get the highest grade in the group.
Create a sentence using whose.
Student's own answers.
Make two Passive sentences using the words below:
1. message / can
2. safety regulations / mustn't
Possible answers:
1. The message can be decoded using the cipher.
2. The safety regulations mustn’t be ignored.
Create two cybersecurity rules. Use must for one and don't have to for one.
Student's own answers.
Name TWO differences between a personal cybersecurity risk and a corporate one.
Possible answer:
personal — your own data/money; corporate — all colleagues, clients, company finances.
Personal impact = one person; corporate = entire organisation.
Create a short answer using the 10/90 rule. Choose: weakness = time management OR strength = working independently.
Student's own answer. Must include: 10% naming it + 90% example or improvement action.
Weakness — time management: One thing I am working to improve is my time management. I sometimes spend too long on one task and rush the others. To improve, I started using a weekly planner and I now set a time limit for each task. It is already helping me finish my work more consistently.
Strength — working independently: I think my greatest strength is my ability to work independently. Last year, I built a simple task manager app entirely on my own — I had to plan the structure, write the code, and fix the bugs myself. I am confident this skill will help me in any development role.