What was the first thing purchased on the Internet?
DAILY DOUBLE
Pizza
The trace or trail you leave behind every time you are on the Internet?
DAILY DOUBLE
Digital Footprint
What does ENCODE mean?
To hide or conceal
What does the CIA Triad stand for?
DAILY TRIPLE
Confidentiality
Availability
Integrity
What does IoT stand for?
DAILY DOUBLE
Internet of Things
The Internet of Things (IoT) is a network of devices that can connect and share data with other devices and systems over the internet.
What is the speed of light?
DAILY DOUBLE
Every password should include 3 things...
Letters, numbers and symbols.
What does DECODE mean?
To reveal or make known
Ava, Zoe, Maya and Chloe got into Infinite Campus and could see everyone's grade in the class. What part of the CIA Triad is compromised?
Confidentiality
Software that is designed to damage or steal data from computers.
Malware
What year was the term computer first used and what did it refer to?
DAILY DOUBLE
1613 - a something or someone who does calculations and computations
Finish this sentence: If the product is free then...
You are the product.
Write out the modulus symbol
%
Kendrick, Pryce and Joshua logged into IC and for some reason were able to change all of their grades to an A+. What part of the CIA Triad is compromised?
Integrity
When a person takes information and images, typically from other people, and uses them to create a new identity for themselves.
DAILY DOUBLE
Catfishing
Who invented the Internet?
DAILY DOUBLE
Tim Berners-Lee
A cyberattack that involves tricking people into sharing sensitive information or downloading malware.
DAILY DOUBLE
Phishing Attack
A security process that requires more than just your password to verify your identity.
Two Factor Authenticatio
Andrew, Sam and Elijah couldn't log on to Infinite Campus for some strange reason. What part of the CIA Triad is compromised?
Availability
Software that is designed to damage or steal data from computers.
Ransomware
Computer Science is...
Solving problems faster and easier.
What does VPN stand for and what does it do?
DAILY DOUBLE
Virtual Private Network
It acts as a secure private tunnel over an unsecure public wifi network.
What is the value this binary code?
1101 1011
219
Every secure network should ensure what three things? Explain each one for 300 extra points
Confidentiality - Only authorized people can see it
Availability - It accessible when needed
Integrity - Nothing can be changed or altered
Phishing, tailgating, baiting, and whaling are all examples of _____________.
Social Engineering.
Social engineering is a technique that tricks people into doing something dangerous online or in person.