Media
What is communication, including television, radio, and newspaper, that often reaches and impacts a large audience
Effective
What is achieving a desired goal or result
Scam
What is an attempt to trick someone for their money
Someone who sees cyberbullying happening but does nothing to help
What is Bystander
Creative Work
What is any idea or artistic creation that is recorded in some form
Simile
What is a literary device for comparing two unlike things
Efficient
What is doing something in a way that saves you time and energy
Vulnerable
What is in a position that makes it easier for you to be harmed or attacked
Someone who helps when they see cyberbullying occur
What is a upstander
license
What is a clear way to define copyright to your creative work so people know how it can be used
What are digital media
What is Internet, Video games
A coarse of action designed to help you reach a goal or result
What is a Strategy
A type of crime in which your private information is stolen and used for criminal activity
What is identity theft
What is an upstander
What is someone who takes action and stands up up for someone who is being bullied
The word Plagiarize means
What is Downloading material illegally from the internet
This type of media is available 24 hours 7 days a week
What is 24/7 digital media
What is the first step you should take when you want to conduct an online search
What is select research questions
Sara finds a message on her phone that she thinks might be a scam what should she do
What is delete the message
What are some things a bystander can do to become an upstander
What is put themselves in the person who is getting bullied shoes and think how if they were getting bullied
A_________is a law that helps protect your control over your creative work
What is Piracy
Communication can be two way. People make friends on the Internet
What is digital media described as being interactive
What are the five steps of a search plan?
What is First you select your research questions, Second Extract keywords and terms, Third Apply search strategies, Fourth you run your search, Last chart your search
What kinds of information do identify thieves look for
What is Addresses, Passwords, Emails
What kinds of online behaviors could be considered cyberbullying
What is mean words, Threatening, and making fun of someones name
Why can't you directly copy information from an online source such as Wikipedia
What is people can change it and put in false information