Information Literacy
Cyber Safety
Cyber Safety
Computer Basics
OOP Basics
100

What are popular Internet Browsers?

Chrome, Safari, Internet Explorer, Opera

100

What is Cyber Bulling?

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening manner. 

100

What is Phisher?

One who lures victims using emails and websites that seem harmless or secure.

100

What is Hardware?

Part of the computer that has a physical structure, like Mouse or Keyboard.

100
What is Java?

A high-level programming language developed by Sun Microsystems in 1995.

200

What are the examples of Online Miscommunication?

Use of ALL CAPS, too many exclamation marks, or misleading Emojis.

200

What is Impersonation?

Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.

200

What is Plagiarism?

Wrongful appropriation and publication of another author's work.

200

What is Software?

Set of instructions or program that tells the hardware what to do and how to do it, like web browsers or games. 

200

What is a Class?

A template or blueprint that describes the behavior or state that the object of its type supports.

300

What is a Private/Incognito Mode?

A setting that prevents Internet Browsing history/cookies/images from being stored.

300

What is Defamation?

Publishing a false statement/image about a person to damage or tarnish their reputation. 

300

What is a Computer Virus?

Computer program that can replicate itself and spread from one computer to another to harm the system. 

300

What is Hard Drive?

Long-Term storage, the data is still saved even if you turn the computer off or unplug it. 

300

What us a Method?

A program structure where the logics are written, data is manipulated and all the actions are executed. 

400

What is a Fair Use Doctrine?

A law that permits limited use of copyright material without having to first acquire permission from the copyright holder. 

400

How to action against a Cyber Bully?

Block them, report them, or tell a trusted adult.

400

What is a Trojan Horse?

Open a backdoor entry to your computer, which gives malicious users/programs access to your system. 

400

What is RAM/Random Access Memory?

System's short-term memory, it temporarily stores the data until needed. 

400
What are Identifiers?

Unique user-defined names used for classes, variables, and methods. 

500

What is a Cookie?

Messages that web servers pass to your web browser when you visit Internet sites. 

500

What is Identity Theft?

A form of stealing someone's identity in which someone pretends to be someone else by assuming that persons's identity.

500

What is Spamming?

Method of flooding the Internet with copies of the same message, postings.

500

What is CPU/ Central Processing Unit?

Also called the brain of the computer, and it's job is to carry out commands.
500

What are variables?

Reserved memory locations to store values for various identifiers. 

M
e
n
u