Cyberbullying
Network Topologies
Evolutions of computers
Types of malware
Parts of A Computer
100
What is a bystander?

One who is present but not taking part in the situation or event.

100
Which topology is rarely used today?

Ring topology.

100

How did technology affect ?

 

100

What is Virus Malware?

A harmful computer program that can copy itself and infect a computer.

100

What are the 5 main parts of a computer?

The motherboard, Central processing Unit (CPU), Graphics Processing Unit (GPU), Random Access Memory (RAM), and Hard Disk Drive (HDD)

200

What is an upstander?

Someone who sees what happens and intervenes, interrupts, or speaks up to stop the bullying.

200

Which topology is commonly used today?

Mesh topology.

200

Why is malware so dangerous?

It may cause a device to crash and allow cybercriminals to steal or destroy data.

200
What is Worm Malware?

A malicious computer program that sends copies of itself to other computers via a network.

200

What is the motherboard?

The main printed circuit board in general-purpose computers.

300

What is an empathizer?

A person who makes sure someone is okay.
300

What is star topology?

A topology where all the devices are connected to a single hub through a cable.

300

What is the purpose of malware?

To intrude on a machine.

300

What is Spyware Malware?

Malware that collects information and data from people without them knowing.

300

What is the graphics card?

A hardware component responsible for rendering and displaying images, videos, and animations on your computer monitor.

400
What is a victim?

The person that is being bullied.

400
What is mesh topology?

A topology where every device is connected to another device via a particular channel.

400

What is one way to prevent malware?

Think twice before installing things, clicking links, or downloading anything.

400

What is Adware Malware?

Software that automatically plays, displays, or downloads advertisements on a computer.

400

What is the sound card?

A computer component that translates digital audio signals to analog ones, and analog audio signals to digital ones.

500

Does cyberbullying always happen online?

Yes.

500
What is a network topology?

The physical and logical arrangement of the elements of a communication network.

500

What is malware analysis?

Malware analysis is the study of determining the functionality, origin and potential impact of a given malware sample.

500

What is Trojan Horse Malware?

A destructive program that pretends to be a useful application, but harms your computer or steals your information after it's installed.

500

What is the computer data storage?

A technology consisting of computer components and recording media that are used to retain digital data.

M
e
n
u