What is a Password?
A mixture of letters, numbers and special characters
Passwords are essential for securing accounts and personal information.
What does AUP stand for?
Acceptable Use Policy
AUP outlines the acceptable behaviors and practices for using a service or system.
What is E-Mail?
An electronic way of communication
E-Mail is widely used for personal and professional correspondence.
Define E-Mail Etiquette.
How you type your email — respectful, formal, etc.
Proper etiquette ensures clear and professional communication.
What are E-Mail Attachments?
The files that you or others add to an e-mail
Attachments can include documents, images, and other file types.
What does Folder Structure refer to?
The way and order that you save your files in; it should be organised and easy to find things through
A good folder structure enhances file management.
Define Cyberbullying.
Bullying through online platforms
Cyberbullying can have serious emotional and psychological effects.
What is Trolling?
Leaving insulting messages online
Trolls often seek to provoke or upset others for amusement.
What does Stalking mean in an online context?
Illegally following or watching someone for an excessive amount of time
Online stalking can lead to serious safety concerns.
List some effects of cyberbullying.
These effects can be long-lasting and severe.
What should you do with Online Strangers?
Ignore emails from people you don’t know in real life
This helps protect personal information and safety.
What are Location Settings?
Using GPS, many social media platforms track your real-life location
Proper management of location settings is crucial for privacy.
What are the dangers of location settings?
People you don’t know might stalk you due to your location settings not being properly set
Always review location settings to maintain safety.
Define Malware.
Malicious software, which means harmful files
Malware can cause significant damage to devices and data.
What is a Virus?
Harms your computer in some way, usually by altering, deleting or corrupting files
Viruses can spread through downloads and email attachments.
What is a Trojan?
Starts by posing as a trusted application, but gains unauthorized access when the user runs the application
Trojans can lead to data theft and system compromise.
What are Worms?
Difficult to get rid of; they copy themselves over networks to external devices
Worms can cause widespread damage across networks.
Define Spyware.
Collects information from your computer and sends it to someone else
Spyware can compromise personal privacy and security.
What is Scareware?
Tricks you into thinking it’s vital software that you must buy
Scareware preys on fear to manipulate users into purchasing.
What is Phishing?
A scam that poses as a big company, trying to trick people into thinking that it’s a legit brand
Phishing often involves fake emails or websites.
What is Targeted Advertising?
A way for businesses to try to sell people a specific product which matches what they are interested in
This practice uses data analytics to tailor marketing efforts.
What does SPAM refer to?
Spam emails offer a vast variety of things, from money to deals that are too good to be true
SPAM can clutter inboxes and pose security risks.
What is a Spam filter?
Recognises common spam emails and stops them from getting through to your actual inbox
Spam filters help maintain a clean and safe email environment.
What is Anti-Software Virus?
Stops malware from attacking your digital device
Anti-virus software is essential for protecting devices from threats.