Text messages, QR codes, telephone, and emails are common tools cyber attackers use to trick individuals into sharing sensitive information (e.g., passwords, credentials , social security number) which is called "Phishing" True False
Which component is included in the VEX GO Classroom Bundle?Select the best answer. Pin Tools Carrying bags Charging hub All of these
How would you access VEXcode GO on an Android Tablet? Download from the VEX GO Activities page Download the VEXcode GO app from the app store for your device Download the VEX Classroom app from the app store for your device Navigate to the VEX GO STEM Lab page
How do you connect the 123 Robot to your device in VEXcode 123? Select the Robot button in the Toolbar, then select Connect Select the File in the Toolbar, then select Open Examples Plug the 123 Robot directly into your device Push the 123 Robot along a surface while it's charging
Which action will stop your Coder project? Pressing the Stop button on the 123 Robot Pressing the Stop button on the Coder Pressing the Step button on the Coder Press the Sound button on the 123 Robot
Which statement about teaching computer science to young students is correct? Select the best answer. It disconnects students from the technology in their everyday lives It enables them to be creative and bring their digital creations to life It does not allow for collaboration between students All of the above
Making mistakes iteration, and __ are key components to learning computer science. succeeding on the first try troubleshooting component design typing
How can physical robots help when teaching Computer Science to young students? Robots create passive learning experiences Robots are inauthentic and rarely seen in real life Robots are motivating and engaging to students Robots make concepts very abstract for students
Which benefit comes from teaching computer science to young students? Select the best answer. Students can explore the high tech world around them Students can develop 21st century job skills Students can bring their own digital creations to life All of the above
A __ is a specific action performed by a robot. 123 Activity behavior program sequence
2. You have problem with your c omputer The Aloric za End User Suppo rt person assisting you asks for your password.problem Give it to them but chang e it once your computer is fixed. Refuse and instead ask them to provide your User Security PIN Question it but provide the basswor d tô them anyway. Give it t them they're in IT so they'r authorized.
3. What are the four most common types of cyber attacks launched against K-12 school districts? See pages $3-11$ then identify each one and briefly describe it. __ 1. 2. 3 __ . Go to the incident map located at this website: https://www.h (12six.org/map. Find 3 incidents on the map located near your school or at least in your state and briefly __ ours MART CYBERTHREATS STUDENT WORKBOOK
What is Al bias? When an Al tool makes an incorrect or problematic decision due to flawed training data. When an Al works faster on some computers than on others. When an Alls biased against other Al programs. When an Al has a favorite color.
Adding a field to a blank form places __ control(s) in a stacked layout. two three four only one
Which step in the Cyber Attack Cycle involves delivering the malware to the target? Delivery Reconnaissance Exploitation Malicious Actions
Which of the following is true regarding a heap? Select all that apply It is typically implemented using an array There is a relationship between a node's value and the values of its children There is no relationship between a node's value and the values of its children It is a complete binary tree
Which of the following BEST describes the purpose of Locator Apps and Remote Wipe features on mobile devices? To locate a lost or stolen device and remotely erase sensitive data. To monitor app usage and restrict access to specific applications or mobile devices. To enforce password policies and ensure compliance with organizational security standards. To enhance the speed and performance of mobile devices by clearing unnecessary data.
What creates a trusted infrastructure for issuing and managing digita lidentities? CSR Firewall CA VPN
Which of these is not an advantage of star topology? Easy to add or remove devices Easy to troubleshoot Scalable If central hub fails , the network fails In which topology does a signal travel the entire network even if the recipient is found early? Ring Mesh Bus Star
When troubleshooting an app that frequently crashes on an Android device, you decide to clear the app cache. What is the primary purpose of clearing the app cache in this scenario? To permanently delete the app's data, including user settings and login information. To disable the app temporarily, preventing it from consuming system resources. To uninstall and reinstal the app to ensure compatibility with the operating system. To remove temporary files that may be causing the app to malfunction.