<snapdata remixID="10879054"><project name="VocabLists" app="Snap! 6, https://snap.berkeley.edu" version="1"><notes></notes><thumbnail>data:image/png;base64,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</thumbnail><stage name="Stage" width="480" height="360" costume="0" color="255,255,255,1" tempo="60" threadsafe="false" penlog="false" volume="100" pan="0" lines="round" ternary="false" hyperops="true" codify="false" inheritance="true" sublistIDs="false" scheduled="false" id="1"><pentrails>data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAeAAAAFoCAYAAACPNyggAAAAAXNSR0IArs4c6QAADoVJREFUeF7t1cEJAAAIxDDdf2m3sJ+4wEEQuuMIECBAgACBd4F9XzRIgAABAgQIjAB7AgIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECAiwHyBAgAABAoGAAAfoJgkQIECAgAD7AQIECBAgEAgIcIBukgABAgQICLAfIECAAAECgYAAB+gmCRAgQICAAPsBAgQIECAQCAhwgG6SAAECBAgIsB8gQIAAAQKBgAAH6CYJECBAgIAA+wECBAgQIBAICHCAbpIAAQIECByxcQFpoRMBzwAAAABJRU5ErkJggg==</pentrails><costumes><list struct="atomic" id="2"></list></costumes><sounds><list struct="atomic" id="3"></list></sounds><variables></variables><blocks></blocks><scripts></scripts><sprites><sprite name="Sprite" idx="1" x="0" y="0" heading="90" scale="1" volume="100" pan="0" rotation="1" draggable="true" costume="0" color="80,80,80,1" pen="tip" id="8"><costumes><list struct="atomic" id="9"></list></costumes><sounds><list struct="atomic" id="10"></list></sounds><blocks></blocks><variables></variables><scripts><script x="77" y="292.66666666666663"><block s="doSetVar"><l>list</l><block s="reportNewList"><list><l>a computer program that attacks users by stealing info, shutting down systems, etc.</l><l>keeping computer systems and info secure from malicious actors</l><l>logging the keys a user clicks on, usually without their knowledge</l><l>software with bad intentions</l><l>online data that can be used to identify you and your habits</l><l>sending communications that dupe you into thinking it was sent by someone that it wasn&apos;t really sent by</l><l>a type of phishing intended to get users to unintentionally hand over data to malicious actors</l><l>marketing that is aimed at specific people based on online data about their habits</l><l>the process of finding and fixing errors in computer code</l><l>an attack against a website where attackers overload systems with too many user requests to handle</l><l>the concept of keeping certain info hidden from others</l><l>the concept of being safe from others</l><l>a variable that  holds multiple items (elements)</l><l>a variable type made up of alphanumeric characters</l><l>a variable that is inputted to a procedure when claling it</l><l>input of data in a program</l><l>repeating steps in a computer program</l><l>a form of abstraction where chunks of  code can be called with a single line</l><l>a variable of true or false</l><l>taking large complex things and packaging them into simpler things</l><l>a symbol that tells a computer to do some operaiton, usually math</l><l>an ID number that identifies where a certain element is in a list</l><l>an item of a list</l><l>a block of code that is only executed if some condition is met</l><l>structure that holds data</l><l>working with other programmers</l><l>the main object used in Snap (an object-oriented language)</l><l>data provided by the user to the program</l><l>what a computer provides the user with in response to input</l><l>inequality of access to computers and Internet</l><l>a variable only usable by one Sprite</l><l>a variable usable by all Sprites in a program</l></list></block></block></script><script x="71" y="50.83333333333334"><block s="doSetVar"><l>list</l><block s="reportNewList"><list><l>Computer Virus</l><l>Cybersecurity</l><l>Keylogging</l><l>Malware</l><l>personally identifiable information</l><l>phishing</l><l>spearing</l><l>targeted marketing</l><l>debugging</l><l>DDoS</l><l>privacy</l><l>security</l><l>lists</l><l>strings</l><l>parameter</l><l>argument</l><l>iteration</l><l>procedure</l><l>boolean</l><l>abstraction</l><l>operators</l><l>index</l><l>element</l><l>conditional</l><l>variables</l><l>collaboration</l><l>sprite</l><l>input</l><l>output</l><l>digital divide</l><l>local variable</l><l>global variable</l></list></block></block></script></scripts></sprite><watcher var="list" style="normal" x="10" y="10" color="243,118,29"/></sprites></stage><hidden></hidden><headers></headers><code></code><blocks><block-definition s="testblocik" type="command" category="other"><header></header><code></code><translations></translations><inputs></inputs><script><block s="doSetVar"><l>list</l><block s="reportNewList"><list><l>Computer Virus</l><l>Cybersecurity</l><l>Keylogging</l><l>Malware</l><l>personally identifiable information</l><l>phishing</l><l>spearing</l><l>targeted marketing</l><l>debugging</l><l>DDoS</l><l>privacy</l><l>security</l><l>lists</l><l>strings</l><l>parameter</l><l>argument</l><l>iteration</l><l>procedure</l><l>boolean</l><l>abstraction</l><l>operators</l><l>index</l><l>element</l><l>conditional</l><l>variables</l><l>collaboration</l><l>sprite</l><l>input</l><l>output</l><l>digital divide</l><l>local variable</l><l>global variable</l></list></block></block><block s="doSetVar"><l>list</l><block s="reportNewList"><list><l>a computer program that attacks users by stealing info, shutting down systems, etc.</l><l>keeping computer systems and info secure from malicious actors</l><l>logging the keys a user clicks on, usually without their knowledge</l><l>software with bad intentions</l><l>online data that can be used to identify you and your habits</l><l>sending communications that dupe you into thinking it was sent by someone that it wasn&apos;t really sent by</l><l>a type of phishing intended to get users to unintentionally hand over data to malicious actors</l><l>marketing that is aimed at specific people based on online data about their habits</l><l>the process of finding and fixing errors in computer code</l><l>an attack against a website where attackers overload systems with too many user requests to handle</l><l>the concept of keeping certain info hidden from others</l><l>the concept of being safe from others</l><l>a variable that  holds multiple items (elements)</l><l>a variable type made up of alphanumeric characters</l><l>a variable that is inputted to a procedure when claling it</l><l>input of data in a program</l><l>repeating steps in a computer program</l><l>a form of abstraction where chunks of  code can be called with a single line</l><l>a variable of true or false</l><l>taking large complex things and packaging them into simpler things</l><l>a symbol that tells a computer to do some operaiton, usually math</l><l>an ID number that identifies where a certain element is in a list</l><l>an item of a list</l><l>a block of code that is only executed if some condition is met</l><l>structure that holds data</l><l>working with other programmers</l><l>the main object used in Snap (an object-oriented language)</l><l>data provided by the user to the program</l><l>what a computer provides the user with in response to input</l><l>inequality of access to computers and Internet</l><l>a variable only usable by one Sprite</l><l>a variable usable by all Sprites in a program</l></list></block></block></script></block-definition></blocks><variables><variable name="list"><l>0</l></variable></variables></project><media name="VocabLists" app="Snap! 6, https://snap.berkeley.edu" version="1"></media></snapdata>