Posting embarrassing photos, spreading rumors, or harassing someone online is an example of this harmful behavior.
Whats is cyberbullying?
Malicious software designed to damage, steal, or gain unauthorized access to devices or networks.
What is malware?
This is a step-by-step set of instructions used to solve a problem.
What is an algorithm?
You must do this in order for style to apply to your webpage.
What is linking your stylesheet?
This type of device allows a user to enter data into a computer.
What is an input device?
A student copies text from a website and submits it as their own work without giving credit. This is called this.
What is plagiarism?
This process changes readable data into coded data to protect sensitive information.
What is encryption?
This statement allows a python program to make decisions.
What is an if statement?
This list has bullets instead of numbers.
What is an unordered list?
What numbers do computers use to represent data?
0 and 1s
Using someone else’s music, images, or code without permission may violate this law.
What is copyright/copyright laws?
A hacker sends an email pretending to be your bank and asks you to verify your password. This type of cyber attack is called this.
What is phishing?
This process involves finding and fixing errors in code.
What is debugging?
This heading size is the largest in web design.
What is H1?
This is an example of an output device.
What is a monitor, printer, speaker, or projector?
This legal concept allows limited use of copyrighted materials for educational purposes.
What is fair use?
This malicious software records every key pressed on a keyboard.
What is keylogging?
This programming structure repeats code until a condition changes.
What is a loop/while loop?
This language is used to structure content on a webpage.
What is HTML?
This computing discipline focuses on designing computer hardware and software systems.
What is Computer Engineering?
This social issue occurs when some groups have less access to computers, internet, or technology resources than others.
What is the digital divide?
These three principles make up the CIA triad in cybersecurity.
What are confidentiality, integrity, and availability?
This data type can only be true or false.
What is boolean?
What does CSS do in web design?
What is adding style to a webpage?
This is what RAM stands for.
What is random access memory?