Published on

a jeopardy-stlye game with quetstions to do with digital security.....

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 2. Odds and Ends Spyware Hacking $600 $400 $200 Viruses Malware $1000 $800 $1000 $1000 $1000 $1000 $800 $800 $800 $800 $600 $600 $600 $600 $400 $400 $400 $400 $200 $200 $200 $200
  2. 3. <ul><li>In computers, a &quot;vaccine&quot; is a program that seeks out & destroys these. </li></ul>
  3. 4. <ul><li>The &quot;app&quot; in &quot;killer app&quot; stands for this. </li></ul>
  4. 5. <ul><li>Crafted by Robert Morris, the first known one of these viruses wriggles into computers. </li></ul>
  5. 6. <ul><li>I always update the antivirus definitions for this Symantec Corp. program. </li></ul>
  6. 7. <ul><li>Millions of spam messages are generated by &quot;rogue software programs&quot; called these, a 4-letter word. </li></ul>
  7. 8. <ul><li>Software designed to infiltrate and damage a computer system without the owner's knowledge are called this. </li></ul>
  8. 9. <ul><li>Malware can let these into the system unchecked. </li></ul>
  9. 10. <ul><li>Malware can lead to the destruction of these on a hard disk. </li></ul>
  10. 11. <ul><li>You are safe from malware thanks to this type of software. </li></ul>
  11. 12. <ul><li>You can take several pre-cautions to protect yourself from malware; this particular step is carried out when you are online. </li></ul>
  12. 13. <ul><li>The product &quot;McAfee Anti-_______&quot; this 7-letter mashed-up word keeps prying eyes out of your computer. </li></ul>
  13. 14. <ul><li>This application blocks those pesky spontaneous ads while surfing the net. </li></ul>
  14. 15. <ul><li>Software that has been designed to monitor users' web browsing and/or display unwanted advertisements are called this. </li></ul>
  15. 16. <ul><li>Spyware can install this application that records your key strokes, and sends them back to the hacker. </li></ul>
  16. 17. <ul><li>Key Loggers help hackers find out who you are and general information about you; including this financially critical number. </li></ul>
  17. 18. <ul><li>Teens are the most expert at this activity, illegally entering computer systems. </li></ul>
  18. 19. <ul><li>Among computer professionals, a hack refers to this sort of solution to a problem. </li></ul>
  19. 20. <ul><li>In a nutshell, this is what a hacker does. </li></ul>
  20. 21. <ul><li>If he or she is very good, hackers can steal money from these accounts. </li></ul>
  21. 22. <ul><li>A hacker can do something bad, but make it look like you did it. Give an example. </li></ul>
  22. 23. <ul><li>Online sites that involve passwords have placed a small box of jumbled characters, and ask you to type them in a box below to make sure you are not this. </li></ul>
  23. 24. <ul><li>The digits 0-9 & the letters A-Z are collectively known as this type of characters. </li></ul>
  24. 25. <ul><li>A new type of security is beginning to replace passwords, and is most spread out now on laptops. It is the most secure password, and you don’t even have to make it up, or remember it. It scans this, located at the ends of your fingers. </li></ul>
  25. 26. <ul><li>Like fingerprints, this part of the eye is exclusive to the person, everybody around the world has a different fingerprint, and a different ‘this part of the eye’, for which a scanner has been developed, but is used only for very sensitive material. </li></ul>
  26. 27. <ul><li>EULA stands for this, and it is a window with lots, and lots of text in it, that comes out when installing software, that asks you at the end if you agree, or disagree with the terms. </li></ul>