Online Safety
Passwords
Cybersecurity
Programming
Privacy
100

I'm online and I meet someone in a chat room. Is it OK to give that person my address or phone number?

What is NO!

100

How long should a password be to be considered secure?

What is sixteen characters or more.

100

Cybersecurity is the protection of _______ systems and networks. 

What is computer. 

100

Their sole purpose is to label and store data in memory.

What is variable.

100

The freedom from interference or intrusion.

What is privacy. 

200

Information on the Internet can always be trusted to be factual. It wouldn’t be online if it wasn’t true. TRUE or FALSE?

What is FALSE.

200
My password should include personal information about me. (ex. dog's name, hometown, last name) TRUE or FALSE?


What is FALSE.

200
What does the CIA Triad stand for?

What is confidentiality, integrity, and availability. 

200

List the 5 common data types. 

What is integer, float, character, string, boolean.

200

A collection of facts, numbers, words, measurements, or observations.

What is data. 

300

What percentage of teens respond to strangers (via email, SMS, instant message) online? 

a. 25% b. 63% c. 88%

What is B.

300

Passwords should include the following: 

What is uppercase and lowercase letters, special characters, and numbers.

300

Software that is designed to intentionally cause damage to a computer, server, or network.

What is Malware. 

300
for (i = 1; i <= 10; i++)

{

printf("%d", i);

}

What is printed out?

What is 1-10. 
300

Text files with small pieces of data. (ex. username and password)

What is cookies. 

400

How old do you have to be to have a Facebook, Instagram, Twitter and Snapchat account?

What is 13.

400

I can replace letters that look like specific ______ to make my password stronger.

What is numbers. 

400

Name a career in cybersecurity.

What is a Pentester, Network Security Administrator, Cybersecurity Analyst, Security Engineer, Digital Forensics Analyst, etc.

400

An _____ statement is used to check a condition. 

What is if-else statement. 
400

What is the private browsing mode called in Chrome?

What is Incognito.

 To get to an Incognito browser press Ctrl + Shift + n. 

500

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

What is cyberbullying. 

500

 The attacker tries a list of known or commonly used passwords. This is called a ______ Attack. 

What is Dictionary Attack. 

500

Name one cyber attack and explain it.

What is Malware, Phishing, Denial of Service, XSS attack, etc.

500

Modules of code that accomplish a specific task. 

What is functions. 

500

This creates an encrypted tunnel for data and protects your online identity by hiding your IP address. 

What is VPN. 

Virtual Private Network