Email
Cyber bully
Predators
Identity Theft
Internet
100
When someone spreads a story that isn't true about a news event that is usually scary.
What is a hoax?
100
When bullying goes from in person to the internet.
What is cyber bullying?
100
These two things should not be part of your screen name.
What are your real name and your age or where you live or your phone number. (guess 2)?
100
When someone poses as a business and sends you an email that they hope will trick you into giving them personal information.
What is phishing?
100
What you loose when you send photos to friends with your cell phone camera.
Control over who sees them.
200
When you get an email that tells you to send it to 10 friends.
What is chain letter hoax?
200
Why is it easier to bully online than in person.
What is not having to look at the face of the person?
200
When someone follows a series of steps that include treating you nice in order to get personal information from you and meet you.
What is the grooming process.
200
This is the fastest growing crime in America.
What is identity theft.
200
When you install a program or tool bar that keeps track of where you have gone.
What is spyware?
300
This is how viruses are usually spread.
What are email attachments?
300
This person who isn't directly involved in bullying could, but often fails to stop bullying.
Who is the bystander?
300
You age, your name, where you live, what grade you are in, what school you go to, local groups you belong too.
What things should you not give away in chat rooms?
300
This should be changed frequently so you do not get it stolen.
What is your password?
300
You should never post pictures on the Internet that you wouldn't want this person to get a hold of.
Who is your worst enemy.
400
You should never send an email when you are feeling this emotion.
What is anger?
400
In many places bullying is protected by law because it is considered a form of this.
What is harrassment?
400
These people can appear to be any age, and have similar interests to you and they always tell you not to tell anyone you have met them.
What is an internet predator.
400
Made up of random numbers, letters, and punctuation.
A good password.
400
This image prevents predators from being able to recognize you.
What is an avatar?
500
When someone intends to steal money from you by selling your something or tricking you out of it.
What is a scam?
500
What you should do when you are being bullied or cyber bullied.
What is tell an adult?
500
The four steps to dealing with a cyber predator.
What are Recognize (that it is a predator) Refuse (to communicate), Respond (by shutting it off), Report (them to an adult)
500
By things, take out loans, get credit cards, send out emails in your name asking for money, and ruin your credit.
What are things that an identity thief does?
500
What you should not do while using the internet on an unprotected wireless network.
What is banking, emailing, or personal business?
M
e
n
u