Cyber safety
Cybersecurity
Protect Your Privacy
Ethics/Copyright
Cyberbullying
100

What is one way to create a strong password?

Use a combination of letters, numbers, and symbols.

100

What is malware?

software or code designed to damage or harm.

100

What does it mean to have privacy online?

  •  Keeping personal information safe and not sharing it unnecessarily.

100

What is copyright?

A law that protects the use of creative works like music and art.

100

What could happen to victims of cyberbullying?

Depression and isolation

200

Why is it important to log out of your accounts when using public computers?

To prevent others from accessing your personal information.

200

What does antivirus software do?

It detects and removes malware from your computer.

200

How do you clean up your digital footprint?

Review all posts about you and remove videos and posts that are negative.

200

What is copying someone else's work called?

Plagiarism

200

What is someone who stands up to bullies?

Upstander

300

What should you do if you receive a suspicious email?
 

Do not open it and report it to an adult or your IT department.

300

What is ransomware?

Software that holds a device or files hostage until a ransom is paid.

300

What is being responsible and respectful online called?

Netiquette

300

What is the permitted use of copyrighted materials without permission under certain circumstances called?

Fair Use

400

What can you do about unfavorable posts on your social media?

 Clean up your digital footprint.

400

What is two-factor authentication?

Two pieces of data needed to prove your identity.

400

What is an example of PII (Personal Identifiable Information)?

Name, Address, Email, Social Security Number, School ID, or Photo

400

What should you include if you want to use a direct quote in a research assignment?

A citation

500

If you don't like being being tracked when you are on the internet, what technology should you be concerned with?

Cookies

500

Making sure the right people have access to data is what part of the CIA Triad?

Availability

500

What is a digital footprint?

The trail or trace of everywhere you go online.

500

Using 10% or 30 seconds of a music or video recording and 250 words or less of a poem is covered under what?

Fair use

M
e
n
u