- •1. The role of icTs in key sectors of society
- •Technologies that provide access to information through telecommunications
- •Technologies that provide access to information through telecommunications
- •None of the above
- •2. Introduction to computer systems. Computer systems architecture
- •3. Software & Operating Systems
- •All of the above
- •All of the above
- •System software
- •System software
- •System software
- •4. Human-Computer Interaction
- •Usable systems do not need to recover from errors because they never crash
- •5. Database systems
- •Collection of related data and its metadata organized in a structured format
- •Many-to-one
- •Many-to-many
- •None of the above
- •None of the above
- •None of the above
- •6. Data analysis and Data management
- •None of the above
- •All of the above
- •Blue hair
- •Student
- •7. Networks and Telecommunications
- •8. Cybersecurity
- •None of the above
- •None of the above
- •None of the above
- •None of the above
- •All of the above
- •9. Internet Technologies
- •Peer-to-peer
- •Client-server
- •None of the above
- •10. Cloud and Mobile Technologies
- •11. Multimedia Technologies
8. Cybersecurity
Cybercrime refers to anything done with criminal intent using ______.
A smartphone
The internet
A computer
An internet connected device
A computer connected to the internet
What do hackers and cybercriminals do for a living?
Work regular jobs and hack on the weekends
Are plumbers or electricians with nothing better to do
Hack and steal for a living
Unemployed people with IT skills just trying to put food on the table as they look for a job
Steal from the rich to give to the poor
What describes the cybercrimes category of “Computer as a Tool”?
Using a computer to target an individual
Targeting a computer or system to commit a crime
Using a computer to sell illegal goods
Hate speech or Harassing someone through cyberspace
None of the above
What describes the cybercrimes category of “Computer as a Target”?
Using a computer to target an individual
Targeting a computer or system to commit a crime
Using a computer to sell illegal goods
Hate speech or Harassing someone through cyberspace
What describes the cybercrimes category of “Selling Illicit Goods”?
Using a computer to target an individual
Targeting a computer or system to commit a crime
Using a computer to sell illegal goods
Hate speech or Harassing someone through cyberspace
None of the above
What describes the cybercrimes category of “Offensive Content or harassment”?
Using a computer to target an individual
Targeting a computer or system to commit a crime
Using a computer to sell illicit goods
Hate speech or online stalking
None of the above
Spam, phishing scams, and identity theft are examples of which type of cybercrime.
Computer as a Tool
Computer as the Target
Selling Illicit Goods
Offensive content or Harassment
None of the above
What does malware stand for?
nothing special, just malware
malfunctioning software
malicious software
malfunctioning hardware
malice-ware
What is not a risk of pirated software?
likely contains malware
a cybercriminal can use your computer to commit cyber crimes
might contain undetected keylogging software
none of the above are risks
All are risks of using pirated software
How does malware infect your computer?
untrusted websites
email attachments
pirated software
infected flash drives
All of the above
This list contains a passphrases and passwords. Which is the passphrase?
I want 2 smile more :)
(?fFeT!I#7TVJK?
gDR4qLEB7g
KN%6hGYgEqdVvAt7#W
sd3WPYJZCs
What do difficult targets do?
Use weak passwords
Use Two-Factor Authentication (2FA)
Respond to spam
Click links in emails
Visit shady internet sites
Run pirated software
What do easy targets do?
Are security conscious
Understand the dangers and risks
Use encryption
Click links in emails
Use strong passwords