A software program that monitors your computer usage without your knowledge:
spyware
A collection of remotely controlled bots that launch attacks are called:
Bot Network
Victims of Cyberbullying often experience all but which of these ?
financial strain
Measures taken to guard against spying or destructive actions is the meaning of ?
Security
What is the generic term for a piece of malicious code?
Malware
Which role of cyberbullying is described here: someone aware of cyberbullying but not intervening
bystander
The use of electronic communication to harass, intimidate, or threaten a person or group of people is called ?
Cyberbullying
Relating to computers or computer networks is the meaning of ?
cyber
Which of these is not considered an impacted area due to cyber attacks?
Mindset
Which of these is a secured site?
https
A piece of malware that holds your computer hostage until something is done is called ?
ransomeware
What should you do if you are being bullied?
report the bully
Security experts that hack systems professionally (and legally) are known as:
white hats
A fix applied to a program which are known to solve security issues and are routinely released by programmers is called a _________________.
Security patch
What does CIA stand for?
confidentially integrity availability
A flaw in a computer program that makes it vulnerable is called a ___________?
Security Hole
Coding and Computer Science are considered to be the New ?
Literacy
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it contributes to the digital footprint of the victim and the bully.
Permanent
Which of these is not considered to be part of the Internet of Things:
Canvas
A piece of code that copies itself is called a ____________________.
Virus
Which role of cyberbullying is described here: someone aware of cyberbullying and trying to break the cycle
upstander
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
Using general knowledge of human behavior to trick users into breaking security rules is known as ?
Social Engineering
What does PuP stand for?
potentially unwanted programs
A programmer that breaks into someone else's computer system without permission is called a ?
hacker
A standalone malware program that copies itself across computer networks is called a _____________?
Worm
Cyberbullying is especially harmful due to specific characteristics: Which of these is because devices have constant communication with no respite for victims.
Persistent
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it can't be easily seen or overheard by teachers and parents.
Discreet
What is the term for a "Citizen of Cyberspace".
Netizen
The network of devices with the ability to connect and exchange data is known as ?
The internet of things
Your experience on this site will be improved by allowing cookies.