Manners 1
Scams 2
Digital Terms 3
Health and Safety 4
More Scams!
100

General guidelines for good manners online.

(Hint: blend of two words)

Netiquette

100

An article or link with a misleading or exaggerated title intended to provoke the user will click on it.

Clickbait

100

Someone using digital tools to access other people's devices and accounts.

Hacker

100

True or False: It's fine to share about where you live with an online gaming buddy, especially if you've talked in voice chat before.

False

100

Jan has been messaging Suave McBob for months. He's everything she ever dreamed of in a partner - kind, funny, smart, handsome. Unfortunately Suave McBob lost his passport and wallet while on a mission trip in Africa. He just needs Jan to send him some money and he'll pay her back later - he is rich after all.

This is an example of...

Romance Scam

200

Cindy secretly takes unflattering photos of her classmate and sends them to a group chat with her friends and they talk about the classmate. This is an example of...

Cyberbullying

200

Malicious software.

Malware

200

The physical part of a computer.

Hardware

200

True or False: You can safely go to any website as long as you have antivirus software installed.

False

200

John receives an email from RealMicrosoft.com telling him that his computer is compromised! There is a link that will bring him to tech support.

This is an example of... 

Phishing

300

Posting inflammatory and provocative content online.

Trolling

300

When a scammer pretends to be another person or company in an attempt to get someone to click a link.

Phishing

300

The digital component of a computer that runs programs, apps, etc.

Software

300

A strong password will include... (name three)

numbers, uppercase and lowercase letters, symbols

300

Susan receives a phone call from a company telling her that she still owes money on her credit card. If she doesn't provide her bank account information right away she could be sued and fined for even more money!

This is an example of...

Debt collector scam

400

Using someone else's work without giving credit is called...

Plagiarism

400

Part of a computer system designed to block unauthorized access.

Firewall

400

Software used to retrieve websites from the internet.

Search Engine

400

A strong password will NOT include... (name three)

Letters or numbers in ascending order (123, abc)

Birthday, name, or other personal information available online.


400

Fred receives an email from his brother's friend saying that he needs some financial help. The email provides plenty of information about Fred's brother, so it sounds like someone that really knows him. It's an urgent situation, but it is kind of weird that he wants it all in Walmart gift cards.

This is an example of...

Affinity Fraud

500

When using information found online, such as images, blogs, articles, etc. you can give the author credit by creating a...

Citation

Reference Page is also acceptable

500

When a scammer contacts someone saying they won a prize and they just need to click this link to claim it.

Lottery or Prize Scam

500

Software used to connect with other people online.

Social Media

500

Limiting screen time, using technology in positive ways, and enjoying things away from your phone are all examples of...

Digital Wellness

500

Software that records keystrokes in order to steal passwords and personal information.

Keylogger

M
e
n
u