Odds and Ends Spyware Hacking $600 $400 $200 Viruses Malware $1000 $800 $1000 $1000 $1000 $1000 $800 $800 $800 $800 $600 $600 $600 $600 $400 $400 $400 $400 $200 $200 $200 $200
In computers, a "vaccine" is a program that seeks out & destroys these.
The "app" in "killer app" stands for this.
Crafted by Robert Morris, the first known one of these  viruses  wriggles into computers.
I always update the antivirus definitions for this Symantec Corp. program.
Millions of spam messages are generated by "rogue software programs" called these, a 4-letter word.
Software designed to infiltrate and damage a computer system without the owner's knowledge are called this.
Malware can let these into the system unchecked.
Malware can lead to the destruction of these on a hard disk.
You are safe from malware thanks to this type of software.
You can take several pre-cautions to protect yourself from malware; this particular step is carried out when you are online.
The product "McAfee Anti-_______" this 7-letter mashed-up word keeps prying eyes out of your computer.
This application blocks those pesky spontaneous ads while surfing the net.
Software that has been designed to monitor users' web browsing and/or display unwanted advertisements are called this.
Spyware can install this application that records your key strokes, and sends them back to the hacker.
Key Loggers help hackers find out who you are and general information about you; including this financially critical number.
Teens are the most expert at this activity, illegally entering computer systems.
Among computer professionals, a hack refers to this sort of solution to a problem.
In a nutshell, this is what a hacker does.
If he or she is very good, hackers can steal money from these accounts.
A hacker can do something bad, but make it look like you did it. Give an example.
Online sites that involve passwords have placed a small box of jumbled characters, and ask you to type them in a box below to make sure you are not this.
The digits 0-9 & the letters A-Z are collectively known as this type of characters.
A new type of security is beginning to replace passwords, and is most spread out now on laptops. It is the most secure password, and you don’t even have to make it up, or remember it. It scans this, located at the ends of your fingers.
Like fingerprints, this part of the eye is exclusive to the person, everybody around the world has a different fingerprint, and a different ‘this part of the eye’, for which a scanner has been developed, but is used only for very sensitive material.
EULA stands for this, and it is a window with lots, and lots of text in it, that comes out when installing software, that asks you at the end if you agree, or disagree with the terms.

Jeopardy

  • 1.
  • 2.
    Odds and EndsSpyware Hacking $600 $400 $200 Viruses Malware $1000 $800 $1000 $1000 $1000 $1000 $800 $800 $800 $800 $600 $600 $600 $600 $400 $400 $400 $400 $200 $200 $200 $200
  • 3.
    In computers, a"vaccine" is a program that seeks out & destroys these.
  • 4.
    The "app" in"killer app" stands for this.
  • 5.
    Crafted by RobertMorris, the first known one of these viruses wriggles into computers.
  • 6.
    I always updatethe antivirus definitions for this Symantec Corp. program.
  • 7.
    Millions of spammessages are generated by "rogue software programs" called these, a 4-letter word.
  • 8.
    Software designed toinfiltrate and damage a computer system without the owner's knowledge are called this.
  • 9.
    Malware can letthese into the system unchecked.
  • 10.
    Malware can leadto the destruction of these on a hard disk.
  • 11.
    You are safefrom malware thanks to this type of software.
  • 12.
    You can takeseveral pre-cautions to protect yourself from malware; this particular step is carried out when you are online.
  • 13.
    The product "McAfeeAnti-_______" this 7-letter mashed-up word keeps prying eyes out of your computer.
  • 14.
    This application blocksthose pesky spontaneous ads while surfing the net.
  • 15.
    Software that hasbeen designed to monitor users' web browsing and/or display unwanted advertisements are called this.
  • 16.
    Spyware can installthis application that records your key strokes, and sends them back to the hacker.
  • 17.
    Key Loggers helphackers find out who you are and general information about you; including this financially critical number.
  • 18.
    Teens are themost expert at this activity, illegally entering computer systems.
  • 19.
    Among computer professionals,a hack refers to this sort of solution to a problem.
  • 20.
    In a nutshell,this is what a hacker does.
  • 21.
    If he orshe is very good, hackers can steal money from these accounts.
  • 22.
    A hacker cando something bad, but make it look like you did it. Give an example.
  • 23.
    Online sites thatinvolve passwords have placed a small box of jumbled characters, and ask you to type them in a box below to make sure you are not this.
  • 24.
    The digits 0-9& the letters A-Z are collectively known as this type of characters.
  • 25.
    A new typeof security is beginning to replace passwords, and is most spread out now on laptops. It is the most secure password, and you don’t even have to make it up, or remember it. It scans this, located at the ends of your fingers.
  • 26.
    Like fingerprints, thispart of the eye is exclusive to the person, everybody around the world has a different fingerprint, and a different ‘this part of the eye’, for which a scanner has been developed, but is used only for very sensitive material.
  • 27.
    EULA stands forthis, and it is a window with lots, and lots of text in it, that comes out when installing software, that asks you at the end if you agree, or disagree with the terms.