Yes or No: I'm online and I meet someone in a chat room. Is it OK to give that person my address or phone number?
NO!
How long should a password be to be considered secure?
What is sixteen characters or more.
Cybersecurity is the protection of _______ systems and networks.
What is computer.
Their sole purpose is to label and store data in memory.
What is a variable.
The freedom from interference or intrusion.
What is privacy.
TRUE or FALSE? Information on the Internet can always be trusted to be factual. It wouldn’t be online if it wasn’t true.
What is FALSE.
What is FALSE.
What does the CIA Triad stand for?
What are confidentiality, integrity, and availability.
List 4 of the 5 common data types in Python.
What are integer, float, character, string, boolean.
A collection of facts, numbers, words, measurements, or observations.
What is data.
What percentage of teens respond to strangers (via email, SMS, instant message) online?
a. 25% b. 63% c. 88%
What is B.
Passwords should include the following: (name 3)
What are uppercase and lowercase letters, special characters, and numbers.
Software that is designed to intentionally cause damage to a computer, server, or network.
What is Malware.
What does this code output?
for (i = 1; i <= 10; i++)
{
printf("%d", i);
}
What is 1-10.
Text files with small pieces of data. (ex. username and password)
What are cookies.
How old do you have to be to have a Facebook, Instagram, Twitter and Snapchat account?
What is 13.
I can replace letters that look like specific ______ to make my password stronger.
What is numbers.
The team referenced by this color works on both the offensive and defensive side of cybersecurity.
What is Purple?
This kind of statement is used to check a condition once.
What is an if-else statement.
What is the private browsing mode called in Chrome?
What is Incognito.
To get to an Incognito browser press Ctrl + Shift + n.
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
What is cyberbullying.
The attacker tries a list of known or commonly used passwords. This is called a ______ Attack.
What is Dictionary Attack.
Name one cyber attack and explain it.
What is Malware, Phishing, Denial of Service, XSS attack, etc.
Modules of code that accomplish a specific task.
What is functions.
This creates an encrypted tunnel for data and protects your online identity by hiding your IP address.
What is a VPN.
Virtual Private Network