Tech Careers Beyond Coding
Tech History
Online Safety
Gadgets &Devices
Bonus
100

Someone with a psychology background could work in tech by researching how people interact with apps and websites.

What is a User Experience (UX) Researcher?

100

This man co-founded Microsoft

Who is Bill Gates?

100

The secret word or Phrase you use to protect your accounts

What is a password?

100

This is the most common device used to make phone calls, text, and run apps

What is a smartphone?

100

In this role you would write instructions that tell a computer what to do.

What is a Programmer / Software Developer?

200

A journalism graduate could move into tech by writing online articles, tutorials, or product documentation.

What is a Technical Writer/Content Strategist?

200

This Company created the iPhone

what is apple?

200

This is an email scam where someone pretends to be trustworthy to steal information.

What is Phishing?

200

This device lets you play video games on your TV, like Xbox or PlayStation.

What is a game console?

200

In this role you would help protect people and companies from hackers.

What is a Cybersecurity Specialist?

300

If you study sociology, you could look at data about how people use social media.

What is a Data Analyst (social/behavioral focus)?

300

The company created the first smartphone in 1992.

What is IBM?

300

This type of software protects your computer from viruses

What is antivirus software?

300

This small chip inside smartphones and computers is called the “brain” of the device.

What is a processor/CPU?

300

This role involves testing new phones, tablets, or apps and giving feedback before they are released.

What is a Product Tester / QA Specialist?

400

A finance or accounting student could move into tech by helping companies analyze data with this field of tech.

What is FinTech (Financial Technology)?

400

This company’s search engine became the most widely used on the internet

What is Google?

400

This is what it’s called when someone pretends to be you online to trick others.

What is identity theft?

400

This voice-controlled assistant can answer questions and play music.

What is Alexa (Siri or Google Assistant)?

400

In this role you would focus on rules about hacking, online privacy, and digital rights.

What is a Cyber Lawyer / Cyber Law specialist?

500

If you study business or any major, you could use tech to help companies improve how they work.

What is a business analyst?

500

famous for her groundbreaking work as a NASA mathematician who performed trajectory calculations for crucial early space missions, including the first American human spaceflights and the Apollo 11 Moon landing.

Who is Katherine Johnson?

500

This what you should turn on to keep your accounts safe, it uses both your password and a code.(hint we have to use this to login into myTSU)

What is two-factor authentication?

500

This type of computer memory is temporary and is erased when the device is turned off

What is RAM (Random Access Memory)?

500

In 1989, Tim Berners-Lee invented this system that allowed information to be shared easily across the internet, which also raised new issues of online safety and privacy.

What is the World Wide Web?