I’m working on a Computer Science exercise and need support.
Please use the ppt for information and the activity document to answer the questions as per the lab activity.
Objectives Students will be able to explain computer science terminology related to coding, password protection, social engineering, and network security Students will be able to describe how encryption works to protect privacy Students will be able to describe recent network security breaches and how companies defend against them Students will be able to explain why the term “hacker” is extremely flexible and the variety of roles that hackers play Students will be able to analyze reports of unfolding security breaches and apply their understanding of security networks to them 1 Cyber Security Cyber 101 http://www.pbs.org/wgbh/nova/labs/lab/cy ber/1/1/ Hacking and Privacy http://www.pbs.org/wgbh/nova/labs/lab/cy ber/2/1/ Cyber Codes – http://www.pbs.org/wgbh/nova/labs/lab/cy ber/3/1/ 2 In-Lab Exercise - Cyber Security ◦ http://www.pbs.org/wgbh/nova/labs/lab/cyb er/ ◦ Click on Play Game ◦ Sign In With Google – Use the google account you created in the first lab ◦ Click on Play Game again after log in. ◦ As you advance in the activity, answer the questions in the word document provided for the activity. ◦ LEVEL 1 and 2 are part of Assignment. Level 3 is for quiz(Please look at the quiz document provided on BB). 3 You are the chief technology officer of a start-up social network company. Choose a character and a company name. Whenever we go online—to shop, chat with our friends,