Malicious Code
Online Predators
Identity Theft
Cyber Bullying
Cool Category
100
This program that can copy itself and infect other computers without the knowledge of a user.
What is a virus
100
Favorite movie, favorite color, favorite subject, etc...This TYPE of information is called...
What is indirect information?
100
This is an e-mail that looks exactly like one from your bank or other Web site you do business with.
What is phishing email
100
What is the first thing you should do when you receive a mean or threatening message?
What is tell an adult.
100
What is a shortcut for SELECT ALL
What is Ctrl + A
200
This malicious code monitors your computer activities.
What is a spyware
200
What do we know about this person... AlbanyDude12.
What is age and location.
200
What does P2P stand for?
What is Person to Person
200
Acting properly and being polite online is called a proper...
What is netiquette.
200
List 3 Social Networking sites
What is Facebook, MySpace, Twitter.
300
Name 4 types of Malicious Code.
What is virus, spyware, trojan horse and worm
300
Online predators use this process to take valid, safe online relationships to dangerous levels, and to break down barriers.
What is "grooming process"
300
This symbol tells you that the information you are putting on this website is encrypted.
What is a padlock symbol
300
This type of email is hateful and wrong.
What is a flame email
300
What does RAM stand for?
What is Random Access Memory.
400
What does .exe stand for?
What is executable.
400
When a friend sent you a movie file he just downloaded from a Person 2 Person network. Before you open the file you should...
What is Scan for Viruses?
400
When entering personal information on the website such as name, address, credit card information, SSN, you should look for what 4 clues to make sure the Website is safe?
What is httpS, padlock symbol, spelling of the website, contact us page.
400
When you send gibberish over and over in the chat room is considered...
What is flooding.
400
List 3 Operating Systems.
What is Windows, Mac, Linux.
500
What are the four things that you need to do to protect yourself from Malicious Code?
What is turn the Firewall on, update your OS, install anti-virus and anti-spyware programs, do NOT download email attachments from strangers.
500
List three parts of grooming process.
What is similar interest, trust, secrecy, break down barriers,make threats, they will always want to meet you?
500
What are the 3 nationwide comsumer reporting companies?
What is Equifax, Experian, Transunion.
500
List 3 ways you can avoid cyber bullying?
What is don't share personal information, don't exchange pictures with people you meet online, don't send message when you are angry, delete messages from people you don't know, when something doesn't seem right exit the site.
500
What does IBM stand for?
What is International Business Machine