Podcast
Questions and Answers
What drives cybercrime in computer science?
What drives cybercrime in computer science?
Answer hidden
What does the term 'personal information' mean?
What does the term 'personal information' mean?
Answer hidden
What are some examples of cybercrime scams?
What are some examples of cybercrime scams?
Answer hidden
Verify the identity of senders before opening emails containing attachments or clicking ______ links.
Verify the identity of senders before opening emails containing attachments or clicking ______ links.
Answer hidden
Exercise caution when downloading free software or visiting ______ websites.
Exercise caution when downloading free software or visiting ______ websites.
Answer hidden
How many characters should a strong password have?
How many characters should a strong password have?
Answer hidden
Remember, if something seems too good to be true—such as promises of instant wealth or exclusive offers from ______ sources—it likely isn't.
Remember, if something seems too good to be true—such as promises of instant wealth or exclusive offers from ______ sources—it likely isn't.
Answer hidden
A ________ scam is a type of malicious software designed to deceive users into installing it onto their computers or devices.
A ________ scam is a type of malicious software designed to deceive users into installing it onto their computers or devices.
Answer hidden
Named after Greek mythology's wooden horse used by Greeks to conquer Troy, these scams follow the same principle. What is the name of this scam?
Named after Greek mythology's wooden horse used by Greeks to conquer Troy, these scams follow the same principle. What is the name of this scam?
Answer hidden
What do you call a character in scratch?
What do you call a character in scratch?
Answer hidden
A phishing email is one which:
A phishing email is one which:
Answer hidden
If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:
If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:
Answer hidden
A fraudulent email which is trying to obtain your username and password for a particular site will typically:
A fraudulent email which is trying to obtain your username and password for a particular site will typically:
Answer hidden
You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
Answer hidden
Hacking is illegal under:
Hacking is illegal under:
Answer hidden
what block do we use in scratch to create a loop?
what block do we use in scratch to create a loop?
Answer hidden
what is the difference between BCC and CC in an email?
what is the difference between BCC and CC in an email?
Answer hidden
Justin has create a strong password : 1234. Can you write the 5 key rules to create a strong password for him?
Justin has create a strong password : 1234. Can you write the 5 key rules to create a strong password for him?
Answer hidden
How do we store information in scratch, for example a score.
How do we store information in scratch, for example a score.
Answer hidden
Data harvesting tools allows someone to piece together information about you from all the information you publish online
Data harvesting tools allows someone to piece together information about you from all the information you publish online
Answer hidden
The data protection act states that personal data held by an organisation must be kept up to date
The data protection act states that personal data held by an organisation must be kept up to date
Answer hidden
An organisation such as a school holds personal data about you. The organisation:
An organisation such as a school holds personal data about you. The organisation:
Answer hidden
Which of the following is a "strong" password for someone name Justin Smith?
Which of the following is a "strong" password for someone name Justin Smith?
Answer hidden
Which of the following are signs of a possible malware attack?
Which of the following are signs of a possible malware attack?
Answer hidden
Gaining unauthorised access to someone else's computer files is known as:
Gaining unauthorised access to someone else's computer files is known as:
Answer hidden
Explain how a username and password are used together to long-in to a computer
Explain how a username and password are used together to long-in to a computer
Answer hidden
Why is it important to have a secure password?
Why is it important to have a secure password?
Answer hidden
Explain what a costume is in sprite?
Explain what a costume is in sprite?
Answer hidden
Describe what a stage is in scratch
Describe what a stage is in scratch
Answer hidden
How does Scratch enable sprite animation?
How does Scratch enable sprite animation?
Answer hidden
How can you animate a moving flower sprite to continuously move randomly across the stage in Scratch?
How can you animate a moving flower sprite to continuously move randomly across the stage in Scratch?
Answer hidden
In Scratch, how can you make a player sprite react when colliding with an enemy sprite?
In Scratch, how can you make a player sprite react when colliding with an enemy sprite?
Answer hidden
What is a algorithm?
What is a algorithm?
Answer hidden
A variable is...
A variable is...
Answer hidden
How many pieces of information can a variable hold?
How many pieces of information can a variable hold?
Answer hidden
What keyword means to unethically copy somebody else's work without permission.
What keyword means to unethically copy somebody else's work without permission.
Answer hidden
Give an example of 'creative work'
Give an example of 'creative work'
Answer hidden
What law protects owners of creative work?
What law protects owners of creative work?
Answer hidden
The copyright law protects owners of creative work from having it illegally copied. However an individual/ organisation can still use copyrighted creative work if they ask for specific permission from the author.
The copyright law protects owners of creative work from having it illegally copied. However an individual/ organisation can still use copyrighted creative work if they ask for specific permission from the author.
Answer hidden
How long does copyright last for?
How long does copyright last for?
Answer hidden
What is identity theft?
What is identity theft?
Answer hidden
What is a digital footprint?
What is a digital footprint?
Answer hidden