Information Literacy/Digital Citizenship
Cyber Safety-1
Cyber Safety-2
Computer Basics
OOP Basics
100

Chrome,Safari,Firefox,Internet Explorer,Opera

What are popular Internet browsers?

100

The use of electronic communication to bully a person, typically sending messages of an intimidating or threatening nature

What is Cyber Bullying?

100

One who lures victims using emails and websites that seem harmless or secure

What is Phishing?
100

Part of the computer that has a physical structure, like Mouse or keyboard

What is Hardware?

100

A high-level programming language developed by Sun Microsystems in 1995

What is Java?

200
Use of ALL CAPS, too many exclamations(!)misleading Smileys/Emojis.

What are examples of Online Miscommunication?

200

Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships

What is Impersonation 

200

Wrongful appropriation and publication of another author's work 

What is Plagiarism?

200

Set of instructions/ program that tells the hardware what to do and how to do it, like web browsers or games

What is Software?


200

A template/blueprint that describes the behavior/state that the object of its type supports

What is a Class?

300

Setting that prevents Internet browsing history/cookies/images from being stored

What is Private/Incognito Mode?

300

Publishing a false statement/image about a person or damage to tarnish their reputation

What is Defamation?

300

Computer program that can replicate itself and spread form one computer to another to harm the system

What is a Computer Virus?

300

Long-term storage, the data is still saved even if you turn off the computer or unplug it

What is Hard drive?

300

A program structure where the logics are written, data is manipulated and all actions are executed

What is a Method?

400

A law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder 

What is Fair Use Doctrine?

400

Block them, Report them, Tell someone you trust

How to take action against a Cyber Bully?

400

Open a backdoor entry to your computer, which gives malicious users/programs access to your system

What is a Trojan horse?

400

System's short term memory, it temporarily stores the data if needed

What is RAM/Random Access Memory?

400

Unique user-defined names used for classes, variables, and methods.

What are Identifiers?

500

Messages that web servers pass to your web browser when you visit Internet sites

What is a Cookie?

500

A form of stealing someone's identity in which someones pretends to be someone else by assuming that person's identity

What is Identity Theft?

500
Method of flooding the Internet with copies of the same message/postings

What is Spamming?

500

Also called the brain of the computer, and its job is to carry out commands

What is CPU/Central Processing Unit?

500

Reserved memory locations to store values for various identifiers

What are variables?