What is the name of the policy that explains what is acceptable to do on a school device.
Acceptable Use Policy
A password should contain at least how many characters?
8
When posting information on social media, you should never give which of the following?
Name, address, phone number
Before you start working on a iPad you need to ______ ______ to your account.
sign on
When it comes to cyberbullies, block them if you can, ___________ them if you can’t.
ignore
School technology is a ___________, not a right.
Privilege
What things should be used to make a strong password?
Numbers, Uppercase letters, Lowercase letters, Special Characters
Your _____ _____ stays online forever.
digital footprint
A _______ ________ describes different parts of iMovie and who who is in the video.
Story Map
Cyberbullying is different from bullying because it can _________ and at ___________.
anywhere, anytime
True or False- The school blocks inappropriate material from the internet so that students are safe at school.
True
What is a secret string of letters, numbers and symbols that prevents others from getting into your accounts?
Password
Only share your password with ______ _______.
your parents
Using the iPad inappropriately (ex. taking pictures or making videos when not instructed to) will cause you to lose iPad ________.
privileges
A ____________ just stands by and watches bullying/cyberbullying happen.
bystander
If you see something inappropriate on your electronic device (computer, chromebook, other) while at school, you should close your __________ or ______________ and tell an adult immediately.
If you see something inappropriate on your electronic device (computer, chrome book, other) while at school, you should close your chrome book or turn off your monitor and tell an adult immediately.
What is it called to use both numbers and letters?
Alphanumeric
True or False- You are safe from getting hacked because you are still in school.
False
You must ______ __ the iPad when returning it to the cart.
plug in
_________ are the individuals or groups who are bullied by others.
targets or victims
Using any electronic device in an inappropriate manner while at school could cause you to lose your _______ ___________.
online privileges
True or False- You should use words from the dictionary in your password.
False
_________ ________ is a type of crime in which private information is stolen and used by someone else for criminal activity.
Identity Theft
Before you put the iPad away you need to _______ ________ of your account.
sign out
Name two effects that a victim might experience because they were cyberbullied.
depression, anxiety, health problems, loss of interest, skip or missing school...