Edit Game
CSI Week 2 Review
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   23  Close
Additional information provided as input to a block to customize its functionality
 
parameters
 
variables
 
input
 
Output
What button do you hit if you want to go back when programming in Game Lab?
Version history
A label for a piece of information used in a program
Variable
Name two of the three rules for labeling Variables.
1. No spaces 2. You cannot start with a number 3. Spelling and capitalization need to be perfect.
What type of computer did my father code early in his career during the late 1960's and early 1970's?
Mainframe computers
What percentage of your grade comes from formative assessments; the everyday classwork we do?
70%
When during my life did the internet and email become commonly used?
 
After I graduated from college
 
When I was in middle school
 
When I was in high school
 
When I was in college
The name of the first educational game I was allowed to play in school?
Oregon Trail
The name of the first video game consul and game I had at home as a kid.
PONG
The name of the program and website that we will be using to learn to code this semester.
CODE.ORG
Sharing personal feelings, info, or experiences that you later make the sharer feel uncomfortable or regretful
oversharing
When something happens that makes you feel uncomfortable, worried, sad or anxious
red flag feelings
A type of web address that has been condensed and that could potentially mislead a user into going into risky website
shortened URL
When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Phishing
An attempt to trick someone online, usually with the intention of stealing money or private information
Internet Scam
Describe two ways thieves can use others stolen online information.
cyperbully, creating false doc., buying thing with others $, getting loans, jobs, or driver's licence
A type of crime in which your private information is stolen and used for criminal activity
Identity theft
Which is NOT a tip for protecting your privacy?
 
Creating content of social media like sharing feeling or pic
 
Turn off cookies in your browser settings
 
Review the app's privacy setting and opt out
 
Review the privacy policy and the terms of service
A legal document that an app or website must provide and that describes what user information they collect and how they use it
Privacy Policy
To choose to not participate in something
Opt out
Choices a website or app might give you about what information is visible to other users and third parties
Privacy settings
Small text files placed on your device by the sites you visit that collect information about your device and your activity.
Cookies
Protection from being observed or tracked by others, including the government, companies, the public, individuals or groups.
Privacy