Careers & Ethics
How Computers Work
Cryptography
Passwords & Privacy
Phishing & Social Media
100

What career in computer science protects systems from hackers?

Cybersecurity analyst

100

What part of the computer is known as the “brain”?

CPU

100

What is the process of turning readable text into unreadable code?

Encryption

100

What makes a password weak: short/simple or long/complex?

Short/simple

100

What is the term for fake emails or messages that try to steal information?

Phishing

200

What career in computer science writes code to create programs?

Software developer

200

What type of memory is temporary and clears when the computer turns off?

RAM

200

What is the process of turning unreadable code back into readable text?

What is Decryption

200

A strong password should be at least how many characters long?

8 (accept 8–12)

200

What is the term for unwanted bulk or junk email?

Spam

300

What career in computer science uses large amounts of information to find patterns?

Data scientist

300

Which is hardware: keyboard or Google Docs?

Keyboard

300

What word describes readable information before encryption?

What is Plaintext

300

Name the four types of characters a strong password should have.

Uppercase, lowercase, numbers, symbols

300

What is one clear sign of a phishing email?

Suspicious link (accept poor grammar, urgent request)

400

What is one major innovation in computer science that changed communication?

The Internet (accept smartphone, cloud computing, AI)

400

Which is software: Microsoft Word or a monitor?

Microsoft Word

400

What word describes information after it has been encrypted?

What is Ciphertext

400

Which of these is the strongest password: dog123, Tigers2025!, 111111, qwerty?

Tigers2025!

400

Name one personal detail you should not share publicly on social media.

Address (accept phone number, other private info)

500

What is one common ethical issue related to personal data?

Privacy

500

What type of storage keeps files even after the computer is shut down?

Hard drive (or SSD)

500

What is the name for the set of rules or system used to encrypt and decrypt?

What is a Cipher

500

Why is reusing the same password on multiple accounts unsafe?

If one is hacked, all accounts can be accessed

500

What does 2FA (two-factor authentication) require in addition to a password?

A second factor such as a code, fingerprint, or app