What career in computer science protects systems from hackers?
Cybersecurity analyst
What part of the computer is known as the “brain”?
CPU
What is the process of turning readable text into unreadable code?
Encryption
What makes a password weak: short/simple or long/complex?
Short/simple
What is the term for fake emails or messages that try to steal information?
Phishing
What career in computer science writes code to create programs?
Software developer
What type of memory is temporary and clears when the computer turns off?
RAM
What is the process of turning unreadable code back into readable text?
What is Decryption
A strong password should be at least how many characters long?
8 (accept 8–12)
What is the term for unwanted bulk or junk email?
Spam
What career in computer science uses large amounts of information to find patterns?
Data scientist
Which is hardware: keyboard or Google Docs?
Keyboard
What word describes readable information before encryption?
What is Plaintext
Name the four types of characters a strong password should have.
Uppercase, lowercase, numbers, symbols
What is one clear sign of a phishing email?
Suspicious link (accept poor grammar, urgent request)
What is one major innovation in computer science that changed communication?
The Internet (accept smartphone, cloud computing, AI)
Which is software: Microsoft Word or a monitor?
Microsoft Word
What word describes information after it has been encrypted?
What is Ciphertext
Which of these is the strongest password: dog123, Tigers2025!, 111111, qwerty?
Tigers2025!
Name one personal detail you should not share publicly on social media.
Address (accept phone number, other private info)
What is one common ethical issue related to personal data?
Privacy
What type of storage keeps files even after the computer is shut down?
Hard drive (or SSD)
What is the name for the set of rules or system used to encrypt and decrypt?
What is a Cipher
Why is reusing the same password on multiple accounts unsafe?
If one is hacked, all accounts can be accessed
What does 2FA (two-factor authentication) require in addition to a password?
A second factor such as a code, fingerprint, or app