Device security & Digital Positives
Harmful and Annoying On the Internet
Cyber crimes/Cyber criminals
Scams and Online Tracking
Internet benefits and support
100

A unique data trace of a user's activities, actions, communications or transactions online?

What is Digital footprint?

100

Irrelevant messages sent on the Internet to a large number of recipients. Also known as, “Electronic junk mail”.

What is SPAM?

100

someone who can gain unauthorized access to other computers.

Who is a HACKER?

100

Scams sent by email to try to get a user's private information

What is PHISHING?

100

The people you should always seek help from if an internet issue or situation arises?

Who are TRUSTED ADULTS (or law enforcement)?

200

 a type of software that is designed to detect and remove unwanted spyware programs from a user's device.

What is ANTI-SPYWARE?

200

People on the Internet who intentionally starting arguments on message boards

Who are TROLLS? (or what is TROLLING?)

200

criminal activities carried out by means of computers or the Internet that are punishable by law.

What are CYBER CRIMES?

200

small pieces of data sent from a website used for online tracking and stored on a user's computer by the user's web browser while the user is browsing. There are TWO TYPES: 1st Party (helpful) and 3rd Party (negative)

What are INTERNET COOKIES?

200

a software application that runs automated, simple, and repetitive tasks on the Internet at a much higher rate than would be possible for a human alone. These can cut down on cost, instead of employing people to communicate with consumers, companies have developed these. 

What are BOTS?

300

Software used to maintain the security of a private or personal network by being a barrier to prevent hacking, viruses, identity theft, etc...

What is FIREWALL?

300

 “Malicious software;” An "umbrella term" that refers to any program designed to infiltrate or damage a computer or network

What is MALWARE?

300

 the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or purchases.

What is IDENTITY THEFT?

300

Scams sent by text messages to try to get a user's private information

What is SMISHING?

300

Extra copies of computer files that can be used to restore files that are lost, stolen, or damaged.

What are BACK UP FILES?

400

The rights,responsibilities, and manners of being a responsible online citizen

What is DIGITAL ETIQUETTE (Netiquette)

400

a type of online advertising that use sensationalized headlines or content to trick people into clicking on a link

What is CLICKBAIT?

400

A type of identity theft that is a secretive and illegal action of recording the keys struck on a keyboard to get a user's private information.


What is KEYSTROKE LOGGING?

400

Every device connected to the Internet is assigned a unique one of these. This term is what allows information to be sent and received by the correct users' computers, which means this can also be used to track down the physical location of any computer.

What is IP ADDRESS?

400

Skills required to understand, evaluate, use, share, and create content online

What is MEDIA LITERACY?

500

computer program step-by-step process that search engines use to determine which pages show up in search results.

What is SEARCH ALGORITHM?

500

A type of malicious software designed to block access to a computer system until a sum of money is paid.

 

What is RANSOMWARE?

500

a piece of code which is capable of copying itself and illegally corrupting a user's computer system,network, or destroying data.

What is a COMPUTER VIRUS?

500

a global navigation satellite system that provides location, velocity, and time synchronization in smart phones and other electronic devices.

What is GPS?

500

the use of specialized techniques for recovery, authentication, and analysis of electronic data when a case involves issues relating to cyber crimes. 



What is COMPUTER FORENSICS?