Definitions
Be Safe Online
Internet Safety
Strategies
100

The digital trail you leave behind while online......

What is your digital footprint

100

True or False. Sometimes free games, ring tones or screen savers can hide computer viruses.

What is true

100

2 examples of private information that you should not provide online....

What is:

Date of Birth

Address

Phone number

Your school

Your full name

100

Someone you should tell that you are really close to about being cyberbullied

What is a trusted person?

200

a person who harasses a kid/adult through technology like posts, texts, photos, and etc.


DAILY DOUBLE

What is a Cyberbully?

200

Despite what you think, your digital footprint cannot be......

What is be "erased"

200

What term best describes responsible use of technology by anyone who uses the internet, social media, cell phones etc....

Digital Citizenship

200

What you should do if you receive a text from someone you don't know....


DAILY DOUBLE

Block them

Delete/Ignore

Tell a trusted adult

300

 Is the secret word you use when signing into a computer or social media platform.....

What is a password

300

This is communication sent in real time


DAILY DOUBLE

What is an instant message (text)

300

In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money

What is identity theft

300

 What are 2 responsible ways to use social media?

Limit what I share about yourself

Make sure your friends are all people you personally know

Limit what non friends and followers can see about me.

400

the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you

What are Privacy Settings

400

This is used to protect your identity online....

What is a screen name

400

What is Malware?


DAILY DOUBLE

A computer program that is meant to damage, destroy or corrupt information on a computer.

400

A good password includes these.....

What are:

Lower and upper case letters

Numbers

Symbols

500

What term describes person who uses the Internet to break into a computer network or an individual's computer for malicious purposes?

What is a Hacker

500

You can be a victim of this, both online and in person.....

What is a cyberbullying and "in person" bullying

500

Posting rumors or embarrassing information on social networking sites is called....

What is gossip

500

Save all nasty messages and emails, tell a trusted adult, don’t respond are all examples of....

What you should do if you are being cyberbullied

(e.g., strategies)

M
e
n
u