jeopardy

27

Upload: zedo07

Post on 21-Jun-2015

4.711 views

Category:

Business


0 download

DESCRIPTION

a jeopardy-stlye game with quetstions to do with digital security.....

TRANSCRIPT

Page 1: Jeopardy
Page 2: Jeopardy

Odds and Ends

Spyware

Hacking

$600

$400

$200

VirusesMalwar

e

$1000

$800

$1000 $1000$1000 $1000

$800 $800 $800$800

$600 $600 $600 $600

$400 $400 $400 $400

$200 $200 $200 $200

Page 3: Jeopardy

In computers, a "vaccine" is a

program that seeks out & destroys these.

Page 4: Jeopardy

The "app" in "killer app" stands for this.

Page 5: Jeopardy

Crafted by Robert Morris, the first known one of these viruses

wriggles into computers.

Page 6: Jeopardy

I always update the antivirus definitions for this Symantec Corp. program.

Page 7: Jeopardy

Millions of spam messages are

generated by "rogue software programs"

called these, a 4-letter word.

Page 8: Jeopardy

Software designed to infiltrate and damage a computer system without the owner's

knowledge are called this.

Page 9: Jeopardy

Malware can let these into the system

unchecked.

Page 10: Jeopardy

Malware can lead to the destruction of these

on a hard disk.

Page 11: Jeopardy

You are safe from malware thanks to

this type of software.

Page 12: Jeopardy

You can take several pre-cautions to

protect yourself from malware; this

particular step is carried out when you

are online.

Page 13: Jeopardy

The product "McAfee Anti-_______" this 7-letter mashed-up word keeps prying eyes out of your

computer.

Page 14: Jeopardy

This application blocks those pesky

spontaneous ads while surfing the net.

Page 15: Jeopardy

Software that has been designed to monitor users' web browsing

and/or display unwanted

advertisements are called this.

Page 16: Jeopardy

Spyware can install this application that records your key

strokes, and sends them back to the

hacker.

Page 17: Jeopardy

Key Loggers help hackers find out who you are and general information about you; including this financially critical

number.

Page 18: Jeopardy

Teens are the most expert at this activity,

illegally entering computer systems.

Page 19: Jeopardy

Among computer professionals, a hack refers to this sort of

solution to a problem.

Page 20: Jeopardy

In a nutshell, this is what a hacker does.

Page 21: Jeopardy

If he or she is very good, hackers can steal money from these accounts.

Page 22: Jeopardy

A hacker can do something bad, but make it look like you

did it. Give an example.

Page 23: Jeopardy

Online sites that involve passwords have

placed a small box of jumbled characters, and ask you to type them in a box below to make sure you are

not this.

Page 24: Jeopardy

The digits 0-9 & the letters A-Z are

collectively known as this type of characters.

Page 25: Jeopardy

A new type of security is beginning to replace

passwords, and is most spread out now on laptops.

It is the most secure password, and you don’t

even have to make it up, or remember it. It scans this, located at the ends of your

fingers.

Page 26: Jeopardy

Like fingerprints, this part of the eye is exclusive to the person, everybody around the world has a different

fingerprint, and a different ‘this part of the eye’, for

which a scanner has been developed, but is used only for very sensitive material.

Page 27: Jeopardy

EULA stands for this, and it is a window with lots,

and lots of text in it, that comes out when

installing software, that asks you at the end if you agree, or disagree

with the terms.