Communication
Includes speaking, listening, writing, and public speaking
Personal Computers
Desktops and laptops.
What is a code block?
A lexical structure grouping declarations and statements
What personal information should I not share online?
Avoid sharing your full name, home address, phone number, and passwords.
What is digital cyber law?
Digital cyber law is the legal framework that regulates and governs activities in cyberspace.
Teamwork
The ability to collaborate effectively with others.
Mobile Devices
Smartphones, tablets, and e-readers.
What is a function
A function is a named block of reusable code that performs a specific task.
Why should I be careful about my screen name?
A screen name that gives away too much information could allow a criminal to identify you and potentially find out where you live.
What is a cybercrime?
A cybercrime is any criminal activity that either targets or uses a computer, a computer network, or a networked device.
Problem Solving
The capacity to identify issues and find solutions.
Wearable Tech
Smartwatches and fitness trackers.
What is an if statement
An if statement is a control flow statement that executes a block of code only if a specified condition is true.
How can I protect my online identity?
Use an anonymous username, and don't post pictures that could reveal your location or personal details.
What is hacking under cyber law?
Hacking involves unauthorized access or interference with computer systems and data, which is generally illegal under cyber laws.
Work Ethic
Personal attributes like a strong work ethic, time management, and motivation.
Smart Home Security
Cameras, sensors, and smart lighting.
What is a while loop
A while loop is a control flow statement that repeatedly executes a block of code as long as a given condition remains true.
What should I do if someone sends me an uncomfortable message?
End the conversation immediately. Report the incident to a parent, teacher, or other trusted adult.
What is cyber terrorism?
Cyber terrorism involves using computers or networks for politically motivated attacks that cause violence or fear.
Emotional Intelligence
Understanding and managing your own emotions and those of others.
External Storage Devices
Hard drives or flash drives used to back up and transfer files.
How do you format a code block in Markdown?
There are two primary ways to format a code block in Markdown
Is it okay to give my password to an online friend?
No, never share your password with anyone except a parent or guardian.
How are cybercrimes investigated?
Investigations involve specialized units, law enforcement, and digital forensics to collect and analyze electronic evidence.