Scams
Computers
Cyber
Information #1
Information #2
100

_______ occurs when scammers send emails or texts that try to trick you into revealing sensitive information.

Phishing
100

Someone who gains unauthorized access to people's computers.

Hacker

100

Any action that's taken to protect computers and prevent online crime.

Cybersecurity

100

A secret combination of words or numbers that allows a user to access an online service.

Password

100

Short form for "World Wide Web".

WWW

200

They can attach ________ files to links.

Corrupt

200

A shorter word for "internet"

Net

200

When someone tracks, lures, or harasses people online.

Cyber stalking 

200

A dishonest scheme to get information or money.

Scam

200

Searching through websites freely.

Surfing

300

E-mails with a Click Here button is a form of what?

Clickbait 

300

A security system used to block malicious threats to your computer.

Firewall

300

Harm inflicted though text, email, or online sites,

Cyber bulling

300

Leaving offensive messages on the internet.

Trolling

300

Unwanted e-mails or junk mail.

Spam

400

Click here links in e-mails are normally for you to verify your __________ and ____________

username and password

400

Self-replicating software program that attacks a computer system.

Virus

400

An internet-related crime.

Cyber crime

400

Software that displays unwanted advertising on your computer.

Addware

400

When creating passwords, it's always a good idea too:

Use special characters

500

Scammers will use a tone of urgency to get you to enter your _________ , ___________ information, and ___________.

account information, credit card information, and password

500

Computer equipment, machines, and parts.

Hardware

500

Online etiquette-being nice and respectful to others onine.

Netiquette

500

Software designed to damage a computer or phone.

Malware

500

Never post anything you don't want your _________ to see.

Grandma