Cyber attacks
Net Neutrality
Encryption
Digital Divide
import random
100

Software meant to damage or take control of a computing system.

What is Malware?

100

a term for the rules and regulations put on large internet providers that prevent them from favoring their own services and discriminating against rivals.

What is Net Neutrality?

100

What is commonly used today, paired with a public key, to encrypt private communication between devices?

What is a Private Key? (also accept large prime P)

100

What is the importance of intellectual property? Description accepted.

Good enough.

100

PHISHING

What is the attack that Ms. Macek fell for?

200

This form of cyberattack is often used to steal passwords when you type them in.

What is Keylogging?

200

This country notably overturned Net Neutrality legislation in 2025.

What is the United States?

200

This method uses one key for both encryption and decryption.

What is Symmetric Key Encryption?

200

This license allows anybody to use this content without permission if they credit the creator.

What is Creative Commons?

200

Taking advantage of random people’s computing power to advance research.

What is Citizen Science?

300

This type of cyber attack poses as a real email or other communication to deceive people, specifically CS teachers like Ms. Macek.

What is Phishing?

300
Net Neutrality is better for this party. (consumer or internet provider)

What is the consumer?

300

A technique for encryption that shifts the alphabet by some number of characters.

What is Caesar's Cipher?

300

Programs that are made freely available and may be redistributed and modified.

What is Open Source?

300

A digital/computer related technology that can have both beneficial and harmful effects on everything. Very broad term.

What is Computing Innovation?

400

A type of malware that disguises itself as legitimate software to deceive users into installing it.

What is a Trojan Horse?

400

Net Neutrality prevents these from restricting internet access.

What are Internet Service Providers (ISPs)?

400

The generic term for a technique (or algorithm) that performs encryption

What is a Cipher?

400

Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions.

What is Open Access?

400

A reflection of human prejudice in AI and other innovations caused by imbalances in the data used by the AI or innovation.

What is Computing Bias?

500

If you connect to a public network, a hacker could gain access to your computer using this.

What is a Rogue Access Point?

500

Net Neutrality is often criticized for being an example of this.

What is Regulation?

500

The process of decoding encrypted data.

What is Decryption?

500

The use of material created by someone else without permission and presented as one’s own; AI images do this accidentally a lot.

What is Plagiarism?

500

Differing access to computing devices and the Internet between socioeconomic, geographic, and demographic characteristics, as well as between countries.

What is Digital Divide?