Protect Thyself
How Rude
100
Last name, Adress, School name
What is things not okay to share over the internet?
100
E-mail, Cell phones, Myspace, Facebook, IM, and Online Games.
What are some of the technologies cyber-bullying starts?
200
copy a work word-for-word.
What is plagerism?
200
Stop, Block and Tell
What is the steps you should take when you are targeted by a cyber bully?
300
people who bully others online.
What is Cyberbullying?
300
some one makes a facebook, or myspace page with some one elses name and sends inappropriate messages and pictures to other people
What is one type of cyber-bullying?
400
E-mail and Password
What is things you should never give out to another website, or person?
400
15-20 charaters, no sell phone numbers.
What is one rule you have to follow when choosing a password?
500
Antivirus.
What is software that protects your computer from viruses?
500
One is where both victim and instigator are under-age, the other is when adults are involved.
What is the difference between cyber-bullying and cyber-harassment?
Continue
ESC
Reveal Correct Response
Spacebar
M
e
n
u
Team 1
0
+
-
Digital Citizenship Cynthia Hoffman
No teams
1 team
2 teams
3 teams
4 teams
5 teams
6 teams
7 teams
8 teams
9 teams
10 teams
Custom
Press
F11
Select menu option
View > Enter Fullscreen
for full-screen mode
Edit
•
Print
•
Download
•
Embed
•
Share
JeopardyLabs