Podcast
Questions and Answers
What drives cybercrime in computer science?
What drives cybercrime in computer science?
What symbol must all email addresses contain?
What symbol must all email addresses contain?
What does the term 'personal information' mean?
What does the term 'personal information' mean?
What are some examples of cybercrime scams?
What are some examples of cybercrime scams?
What does email stand for?
What does email stand for?
Verify the identity of senders before opening emails containing attachments or clicking ______ links.
Verify the identity of senders before opening emails containing attachments or clicking ______ links.
Exercise caution when downloading free software or visiting ______ websites.
Exercise caution when downloading free software or visiting ______ websites.
How many characters should a strong password have?
How many characters should a strong password have?
Remember, if something seems too good to be true—such as promises of instant wealth or exclusive offers from ______ sources—it likely isn't.
Remember, if something seems too good to be true—such as promises of instant wealth or exclusive offers from ______ sources—it likely isn't.
A ________ scam is a type of malicious software designed to deceive users into installing it onto their computers or devices.
A ________ scam is a type of malicious software designed to deceive users into installing it onto their computers or devices.
Named after Greek mythology's wooden horse used by Greeks to conquer Troy, these scams follow the same principle. What is the name of this scam?
Named after Greek mythology's wooden horse used by Greeks to conquer Troy, these scams follow the same principle. What is the name of this scam?
What do you call a character in scratch?
What do you call a character in scratch?
A phishing email is one which:
A phishing email is one which:
If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:
If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:
A fraudulent email which is trying to obtain your username and password for a particular site will typically:
A fraudulent email which is trying to obtain your username and password for a particular site will typically:
You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
Hacking is illegal under:
Hacking is illegal under:
what block do we use in scratch to create a loop?
what block do we use in scratch to create a loop?
what is the difference between BBC and CC in an email?
what is the difference between BBC and CC in an email?
Justin has create a strong password : 1234. Can you write the 5 key rules to create a strong password for him?
Justin has create a strong password : 1234. Can you write the 5 key rules to create a strong password for him?
How do we store information in scratch, for example a score.
How do we store information in scratch, for example a score.
Data harvesting tools allows someone to piece together information about you from all the information you publish online
Data harvesting tools allows someone to piece together information about you from all the information you publish online
The data protection act states that personal data held by an organisation must be kept up to date
The data protection act states that personal data held by an organisation must be kept up to date
An organisation such as a school holds personal data about you. The organisation:
An organisation such as a school holds personal data about you. The organisation:
Which of the following is a "strong" password for someone name Justin Smith?
Which of the following is a "strong" password for someone name Justin Smith?
Which of the following are signs of a possible malware attack?
Which of the following are signs of a possible malware attack?
Gaining unauthorised access to someone else's computer files is known as:
Gaining unauthorised access to someone else's computer files is known as:
Explain how a username and password are used together to long-in to a computer
Explain how a username and password are used together to long-in to a computer
Why is it important to have a secure password?
Why is it important to have a secure password?
Explain what a costume is in sprite?
Explain what a costume is in sprite?
Describe what a stage is in scratch
Describe what a stage is in scratch
How does Scratch enable sprite animation?
How does Scratch enable sprite animation?
How can you animate a moving flower sprite to continuously move randomly across the stage in Scratch?
How can you animate a moving flower sprite to continuously move randomly across the stage in Scratch?
In Scratch, how can you make a player sprite react when colliding with an enemy sprite?
In Scratch, how can you make a player sprite react when colliding with an enemy sprite?
What is a algorithm?
What is a algorithm?
A variable is...
A variable is...
How many pieces of information can a variable hold?
How many pieces of information can a variable hold?
What keyword means to unethically copy somebody else's work without permission.
What keyword means to unethically copy somebody else's work without permission.
Give an example of 'creative work'
Give an example of 'creative work'
What law protects owners of creative work?
What law protects owners of creative work?
The copyright law protects owners of creative work from having it illegally copied. However an individual/ organisation can still use copyrighted creative work if they ask for specific permission from the author.
The copyright law protects owners of creative work from having it illegally copied. However an individual/ organisation can still use copyrighted creative work if they ask for specific permission from the author.
How long does copyright last for?
How long does copyright last for?
What is identity theft?
What is identity theft?
What is a digital footprint?
What is a digital footprint?
Flashcards are hidden until you start studying