Cybersafety
Scams
Digital foot print
Copyright
Digital citizenship
100

Something used to sign in to a device that is kept private

Password

100

When would you share personal information online with strangers

Never

100

What is a digital footprint

Your public online presence 

100

What is copyright infringement

Using someone else's work without credit or permission

100

Organising documents into folders

File management

200

What is the name of the Tawa College agreement relating to device usuage

Cybersafety Use Agreement

200
The name given to emails that are trying to get money or your account information illegally 

Phishing

200

What should you do before you post something online

Think before you post

200

What should you do when using someone else's work online?

Credit them or ask permission

200

What does it mean to be a digital citizen

Using devices and digital tools responsibly

300

What should you do before sharing images of friends and whanau online?

Ask permission

300

How do you know if a link is unsafe

Unusual letters or numbers in the URL
300

What might a future employer check before hiring you

Your social media (if public)

300

Something that you don't have to pay for to use online (think of the king)

Royalty Free

300

What should you do at the end of a lesson in a computer lab

Sign out, organise and tidy desk, push chair in

400

What is the purpose of Cybersafety 

To protect you and your personal information

400

If you received an email saying you have won $10million, how do you know to question it?

It seems too good to be true
400

What can you do to protect your personal information

Check your privacy settings

400

Free to use content such as images and video

Creative Commons

400

What are the three rings of responsibility 

Yourself, Your community/Friends and Whanau, wider world

500

What is the difference between Cybersafety and Cybersecurity

Cyber safety is about safe and responsible use of the internet. Example: not talking to strangers online. Cybersecurity means keeping computers, mobile phones, and the internet safe from misuse, theft, and damage.

500

The term for when someone uses your personal information 

Identity theft 

500

what are the two types of digital footprint

Active (such as social media posts, public comments) AND Passive (browsing history, location data)

500

What should you do before believing something is real online

Check whether the site is trustworthy 
500

What should you put around words to get a specific result when searching on google

"quotation marks"

M
e
n
u