Information Literacy
Cyber Safety
Cyber Safety -2
Computer Basics
Computer Basics
100

Chrome, Safari, Internet Explorer, Opera

What are popular Internet Browsers?

Chrome

100

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening manner.

What is Cyber Bulling?


100

One who lures victims using emails and websites that seem harmless or secure.

What is Phisher?

100

Part of the computer that has a physical structure, like Mouse or Keyboard.

What is Hardware?

100

A high-level programming language developed by Sun Microsystems in 1995.

What is Java?

200

Use of ALL CAPS, too many exclamation marks, or misleading Emojis.

What are the examples of Online Miscommunication?

200

Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.

What is Impersonation?


200

Wrongful appropriation and publication of another author's work.

What is Plagiarism?

200

Set of instructions or program that tells the hardware what to do and how to do it, like web browsers or games.

What is Software?

200

A template or blueprint that describes the behavior or state that the object of its type supports.

What is a Class?

300

A setting that prevents Internet Browsing history/cookies/images from being stored.

What is a Private/Incognito Mode?

300

Publishing a false statement/image about a person to damage or tarnish their reputation.

What is Defamation?

300

Computer program that can replicate itself and spread from one computer to another to harm the system.

What is a Computer Virus?

300

Long-Term storage, the data is still saved even if you turn the computer off or unplug it.

What is Hard Drive?


300

A program structure where the logics are written, data is manipulated and all the actions are executed.

What us a Method?

400

A law that permits limited use of copyright material without having to first acquire permission from the copyright holder.

What is a Fair Use Doctrine?


400

Block them, report them, or tell a trusted adult.

How to action against a Cyber Bully?

400

Open a backdoor entry to your computer, which gives malicious users/programs access to your system.

What is a Trojan Horse?

400

System's short-term memory, it temporarily stores the data until needed.

What is RAM/Random Access Memory?


400

Unique user-defined names used for classes, variables, and methods.

What are Identifiers?

500

Messages that web servers pass to your web browser when you visit Internet sites.

What is a Cookie?

500

A form of stealing someone's identity in which someone pretends to be someone else by assuming that persons's identity.

What is Identity Theft?

500

Method of flooding the Internet with copies of the same message, postings.

What is Spamming?

500

Also called the brain of the computer, and it's job is to carry out commands.

What is CPU/ Central Processing Unit?


500

Reserved memory locations to store values for various identifiers.

What are variables?

M
e
n
u