A software program that monitors your computer usage without your knowledge:
spyware
A collection of remotely controlled bots that launch attacks are called:
Bot Network
A programmer that breaks into someone else's computer system without permission is called a ?
hacker
The network of devices with the ability to connect and exchange data is known as ?
The internet of things
Which role of cyberbullying is described here: someone aware of cyberbullying but not intervening
bystander
What does PuP stand for?
potentially unwanted programs
Which role of cyberbullying is described here: someone aware of cyberbullying and trying to break the cycle
upstander
A flaw in a computer program that makes it vulnerable is called a ___________?
Security Hole
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it contributes to the digital footprint of the victim and the bully.
Permanent
What should you do if you are being bullied?
report the bully
A standalone malware program that copies itself across computer networks is called a _____________?
Worm
Victims of Cyberbullying often experience all but which of these ?
financial strain
A fix applied to a program which are known to solve security issues and are routinely released by programmers is called a _________________.
Security patch
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
What is the term for a "Citizen of Cyberspace".
Netizen
A piece of code that copies itself is called a ____________________.
Virus
What is the generic term for a piece of malicious code?
Malware
What does CIA stand for?
confidentially integrity availability
Security experts that hack systems professionally (and legally) are known as:
white hats
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it can't be easily seen or overheard by teachers and parents.
Discreet
A piece of malware that holds your computer hostage until something is done is called ?
Ransomware
Using general knowledge of human behavior to trick users into breaking security rules is known as ?
Social Engineering
Cyberbullying is especially harmful due to specific characteristics: Which of these is because devices have constant communication with no respite for victims.
Persistent
Your experience on this site will be improved by allowing cookies.