Soft Skills
Devices
Code Blocks
Digital Saftey
Cyber Law
100

Communication

Includes speaking, listening, writing, and public speaking

100

Personal Computers

 Desktops and laptops.

100

What is a code block?

A lexical structure grouping declarations and statements

100

What personal information should I not share online?

Avoid sharing your full name, home address, phone number, and passwords.

100

What is digital cyber law?

 Digital cyber law is the legal framework that regulates and governs activities in cyberspace.

200

Teamwork

 The ability to collaborate effectively with others.

200

Mobile Devices

 Smartphones, tablets, and e-readers.

200

What is a function

A function is a named block of reusable code that performs a specific task.

200

Why should I be careful about my screen name?

A screen name that gives away too much information could allow a criminal to identify you and potentially find out where you live.

200

What is a cybercrime?

A cybercrime is any criminal activity that either targets or uses a computer, a computer network, or a networked device.

300

Problem Solving

The capacity to identify issues and find solutions.

300

Wearable Tech

Smartwatches and fitness trackers.

300

What is an if statement

An if statement is a control flow statement that executes a block of code only if a specified condition is true.

300

How can I protect my online identity?

Use an anonymous username, and don't post pictures that could reveal your location or personal details.

300

What is hacking under cyber law?

Hacking involves unauthorized access or interference with computer systems and data, which is generally illegal under cyber laws.

400

Work Ethic

Personal attributes like a strong work ethic, time management, and motivation.

400

Smart Home Security

 Cameras, sensors, and smart lighting.

400

What is a while loop

A while loop is a control flow statement that repeatedly executes a block of code as long as a given condition remains true.

400

What should I do if someone sends me an uncomfortable message?

End the conversation immediately. Report the incident to a parent, teacher, or other trusted adult.

400

What is cyber terrorism?

 Cyber terrorism involves using computers or networks for politically motivated attacks that cause violence or fear.

500

Emotional Intelligence 

Understanding and managing your own emotions and those of others.

500

External Storage Devices

Hard drives or flash drives used to back up and transfer files.

500

How do you format a code block in Markdown?

There are two primary ways to format a code block in Markdown

500

 Is it okay to give my password to an online friend?

 No, never share your password with anyone except a parent or guardian.

500

How are cybercrimes investigated?

 Investigations involve specialized units, law enforcement, and digital forensics to collect and analyze electronic evidence.

M
e
n
u