Netiquette
Copyright and fair use
Plagiarism
Internet Safety
Computer Safety
100
Internet Etiquette
What is Netiquette?
100
The exclusive right to use a product.
What is a copyright?
100
Taking work, usually in the form of words or ideas, that you did not create and claiming those things as your own.
What is plagiarism?
100
Making wise choices with the internet to prevent potential problems. The problems prevalent for students include cyber bullying, inappropriate content exposure, online predators and revealing too much personal information. (http://www.netsmartz.org/InternetSafety)
What is internet safety?
100
A program that is designed to replicate itself by copying into the other programs stored in a computer is a virus. It may have insignificant or negative effects. (http://www.thefreedictionary.com/computer+virus) Avoid downloads, turn off autolaunch so you know when downloads are taking place and buy an anti-virus program to prevent viruses on your computer. (http://sbinfocanada.about.com/cs/management/qt/avoidvirusts.htm)
Explain what a computer virus is and how to avoid it.
200
Anything that you do not want the world to see.
What should you avoid posting online?
200
The exclusive right to use a product versus the right to use copyrighted material for educational purposes.
What is the difference between copyright and fair use?
200
1. Turning in work another student did 2. Copying Wikipedia or another internet source
What are two common forms of plagiarism?
200
Once something is posted to the internet it is there forever. You do not want personal information available to the public for your safety.
Why should some information not be shared online?
200
Phishing is stealing another person's identity by taking personal information online. Do not enter personal information for confirmation emails or pop-ups. Be aware of general safety guidelines just as you would be for viruses. (http://www.fraud.org/tips/internet/phishing.htm)
What is phishing and how can you avoid it?
300
Your internet reputation follows you in real life.
Why should you be careful about what you post online?
300
No more than five pictures from the same artist may be used without special permission. (http://www.granvillecsd.org/webpages/lgrandjean/files/copyright_schrock.pdf)
What are the fair use guidelines for picture use?
300
It is easy for a student to copy and paste information, but it is also easy for a teacher to google suspected plagiarized material and confirm any wrong doing. Websites like turnitin.com also curb the temptation for students.
How does technology effect plagiarism?
300
Just like any other bullying! Talk to an adult about your concerns.
How should cyber bullying be handled?
300
Trojan horse is similar to a virus; it appears on your computer as something harmless but it then compromises computer security. Trojan horses cannot be duplicated and therefore it is fairly easy to avoid them by not downloading .exe, .ink or .vbs files and following basic security measures. (http://sync.sympatico.ca/how-to/computing/how_to_prevent_a_trojan_horse_infection/a1487f14)
What is a Trojan Horse and how can you prevent it?
400
Some people online are not as safe and friendly as they may seem.
Why is it not a good idea to talk to strangers online?
400
10% of a video or song may be used without permission from the copyright owner. Three minutes for videos or thirty seconds of a songs are alternative options. (http://www.granvillecsd.org/webpages/lgrandjean/files/copyright_schrock.pdf )
What are the fair use rules for videos and music?
400
1. Brainstorm ideas with other students but do not take their work. 2. Carefully document where you got information as you do research. 3. Remember to give sources for all your information in your final project.
What are some ways to avoid plagiarism?
400
1. Only go to websites that have been approved by a trusted adult. 2. Work on the computer in a high-traffic area of your home. 3. Make sure your parents know if you are using the internet on a cell phone, gaming device etc. (http://www.netsmartz.org/InternetSafety)
How can you avoid exposure to inappropriate online material?
400
A worm is a computer program that copies itself and automatically sends copies to other networks, generally having a negative effect on any computers that have contacted it. Worms can be prevented by staying up to date on firewall and security software, being aware of what is being downloaded and keeping the computer protected with strong passwords. (http://security.widyani.com/virus-security/computer-worm-definition-and-how-to-prevent-it.html)
What is a worm and how can they be prevented?
500
Reach out (help people new to social media sites), Research (try to find answers on your own) and Remember (all the names on the internet are real people-treat them that way). (http://www.livinginternet.com/i/ia_nq_basics.htm)
Explain the three R's of Netiquette
500
Poems may be used if they are under 250 words and 250 words may be used of poems over 2,500 words. Up to 2,500 words may be used from articles. 10% of a book may be used, along with one chart, picture or diagram. (http://www.granvillecsd.org/webpages/lgrandjean/files/copyright_schrock.pdf)
What are the fair use rules for text material? (Including poems, articles and books).
500
Bonus
Bonus
500
1. Do not talk to people you do not know. 2. Always ask your parents before visiting a new website. 3. Talk to a trusted adult if anything happens that you are uncomfortable with.
How can you avoid the concerns of online predators?
500
Viruses and worms spread through networks and take over computers, generally having an adverse effect. Trojan Horses have the same effect, but they do not spread. Phishing is related to identity theft.
Explain the difference between different types of viruses.
M
e
n
u