The Basics
Vetting Sources
UGC (User-Generated Content)
Digital Security
AP Guidelines
100

These are services that allow the sharing of information and content and the formation of communities through online and mobile networks of people.

What is social media?

100

Sources discovered should be assessed in the same way as those found by any other means.

What is the way to vet sources?

100

The term commonly used in the news industry for content with news or editorial value that has been produced by anyone who isn’t working as a professional journalist.

What is User-Generated Content?

100

123456, 

password, 

qwerty

What is common passwords?

100

Virtually nothing is truly _____ on the internet.

What is private?

200

When deciding on  ________, choose something clear-cut and easy to remember. First name, last name is always a good option.

What is a username?

200

___ the place of business to confirm the identity of the source.

What is call?

200

Citizen Journalism

 What is another word for User-Generated Content?

200

This software creates a “virtual private network” that connects a remote computer to an internal network over an encrypted channel. It is quite secure- as long as you trust the computer you are running it on and don’t forget to log out.

What is VPN?
200

AP staffers must be aware that opinions they express may damage the AP’s reputation as an ______ source of news.

What is unbiased?

300

This professional ______ should be used on all platforms to visually identify yourself.

What is a profile photo?

300

You must never simply lift ____, _____ or _____ from social networking sites and attribute them to the name on the profile or feed where you found on material.

What is quotes, photos or video?

300

On social media or given to a reporter on the scene of a news event.

What is where User-Generated Content can be found?

300

The practice of tricking someone into revealing their password. Common tactics include emails requesting password re-entry (for “security reasons”) and bad links.

What is “phishing?”

300

A ______ with no comment of your own can easily be seen as a sign of approval of what you’re relaying.

What is a retweet?

400

This section of your profile accurately describes who you are. Feel free to include a personal tidbit or two, but remember that you are always representing your employer. You may want to include your email address so people can easily get in touch with you privately.

What is a bio?

400

Most social media sites offer a way to send a  ____ ____ to users to establish contact.

What is a direct message?

400

Journalists should always ____ the source of UGC.

What is verify?

400

_______ has the weakest security of any online communication method.

What is email?

400

Journalists should be ____ participants in social networks.

What is active?

500

It comes through posting regularly. Show you’re active, engaged and committed to the tool.

What is credibility?

500

Many athletes, celebrities and politicians have _____ Twitter and Instagram accounts. This is identified by a white-on-blue check mark.

 What is verified?

500

Always strive to seek the ____.

What is the original source of the media you are seeking to acquire?

500

Copies of sensitive chat logs, photographs or private messages can all be found here.

What is the cloud?

500

Staffers should always refrain from spreading ______ ______ online, regardless of whether other journalists or news outlets have shared the reports.

What is unconfirmed rumors?

M
e
n
u