Cyberbullying is especially harmful due to specific characteristics: Which of these is because devices have constant communication with no respite for victims.
Persistent
Oops!
Check
Okay!
Check
15
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
Oops!
Check
Okay!
Check
15
What should you do if you are being bullied?
report the bully
Oops!
Check
Okay!
Check
15
Which role of cyberbullying is described here: someone aware of cyberbullying and trying to break the cycle
upstander
Oops!
Check
Okay!
Check
15
Which role of cyberbullying is described here: someone aware of cyberbullying but not intervening
bystander
Oops!
Check
Okay!
Check
15
A piece of code that copies itself is called a ____________________.
Virus
Oops!
Check
Okay!
Check
15
A programmer that breaks into someone else's computer system without permission is called a ?
hacker
Oops!
Check
Okay!
Check
15
A collection of remotely controlled bots that launch attacks are called:
Bot Network
Oops!
Check
Okay!
Check
boom
Lose 50 points!
Oops!
rocket
Go to first place!
Okay!
fairy
Take points!
5
10
15
20
25
banana
Go to last place!
Oops!
thief
Give points!
5
10
15
20
25
star
Double points!
Okay!
rocket
Go to first place!
Okay!
thief
Give points!
5
10
15
20
25
15
A flaw in a computer program that makes it vulnerable is called a ___________?
Security Hole
Oops!
Check
Okay!
Check
15
A software program that monitors your computer usage without your knowledge:
spyware
Oops!
Check
Okay!
Check
15
Which of these is a secured site?
https
Oops!
Check
Okay!
Check
15
A fix applied to a program which are known to solve security issues and are routinely released by programmers is called a _________________.