Lesson 1: Protecting Your Identity
Lesson 2: Safety Risks in Online Activities
Lesson 3: Legal and Ethical Issues of Internet Content
Lesson 4: Protecting Your Device from Security Threats
Review ALL Lessons
100

Bullying that takes place using electronic technology.

 

What is Cyberbullying?

100

URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware are called...

What is Pharming?

100

The ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody.

What is Fair Use?

100

Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer, spreads by human action, such as sharing infected files.

What is Virus?

100

Downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.

What is Copyright Infringement?

200

The safe and responsible use of information and communication of technology is...

What is CyberSafety?


200

Someone who intentionally targets people for harm using online chat rooms or social media.

What is Online Predator?

200

Electronic game playing over a computer network, particularly over the Internet.

What is Online Gaming?

200

A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.

What is Social Networking?

200

When you update your status, check-in to a location or post a photo, these things are being saved and tracked both by the companies that provide the service.

What is Digital Footprint?

300

Stand up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult

What is Upstanders?

300

Includes works that are not copyrighted for any of a number of reasons.

What is Public Domain?

300

Malicious code that secretly watches your computer activity and sends the information over the Internet

What is Spyware?

300

Any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device

What is a Malware?

300

What browsers remember your favorites and your previous searches and can fill in fields for you?

What is Cookies?


400

Rules for interacting politely online; short for internet etiquette.

What is Netiquette?

400

Formal ways of giving credit to people for their work.

What is Citations?

400

The action of subjecting someone to aggressive pressure or intimidation.

What is Harassing?

400

The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be left alone.

What is Privacy?

400

Using someone else's work and passing it off as your own

What is Plagiarism?

500

Fake e-mail message appearing to be from a trusted business, social network and, asks for personal information or requests a user to click on link or download a file to verify personal information.

What is Phishing?

500

The settings on social network that allows users to control who see what they post, and they can either be adjusted post by post, or set to a default setting.

What is Privacy Settings?

500

A person present but not involved; chance spectator; onlooker.

What is a Bystander?

500

The exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.

What is Copyright?

500

Special types of viruses that self-replicates and can travel from computer to computer without human action.

What is Worm?

M
e
n
u