Chrome, Safari, Firefox, Internet Explorer, and Opera.
What are the popular internet browsers?
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
What is Cyber Bullying?
One who lures victims using emails and websites that seem harmless or secure.
What is a Phisher?
Part of the computer that has a physical structure, like a mouse or keyboard.
What is hardware?
A high level programming language developed by Sun Microsystems in 1995.
What is Java?
Use of ALL CAPS, too many exclamations (!), Misleading Smileys/ Emojis.
What are examples of Online Miscommunication?
Pretending to be someone else and sending or posting material to get that person in trouble, danger, or to damage that persons reputation or friendships
What is impersonation?
Wrongful appropriation and publication of another author's work.
What is Plagiarism?
Set of instructions/ programs that tells the hardware what to do and how to do it, like web browsers or games.
What is software?
A template/ blueprint that describes the behavior/state that the object of its type supports.
What is class?
Setting that prevents internet browsing history, cookies, and images from being stored.
What is a Private/Incognito Mode?
Publishing a false statement or image about a person to damage or tarnish their reputation.
What is Defamation?
Computer program that can replicate itself and spread from one computer to another to harm the system.
What is a computer Virus?
Long-term storage, the data is still saved even if you turn your computer off or unplug it.
What is hard drive
A program structure where the logics are written, data is manipulated, and all the actions are executed.
What is method?
A law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder.
What is Fair Use Doctrine?
Block them, report them, and telling some one you trust.
How to take action against a cyber bully?
This opens a backdoor entry to your computer, which gives malicious users/ programs access to your system.
What is a Trojan horse?
System's short term memory, it temporarily stores the data until needed.
What is RAM/ random access memory?
Unique user-defined names used for classes, variables, and methods
What are identifiers?
Messages that web servers pass to your web browser when you visit Internet sites.
What is a Cookie?
A form of stealing someone's identity in which someone pretends to be someone else by assuming that persons identity.
What is Identity Theift
A method of flooding the internet with copies of the same messages or postings.
What is Spamming?
Also called the brain of the computer and its job is to carry out commands.
What is the CPU/ central processing unit?
What are variables?