Netiquette
Censorship and Privacy
Email
Hacking, Piracy, and Viruses
Authenticity
100
A set of rules for behaving properly online.
What is Netiquette?
100
1) organizations 2) governments 3) internet service providers
What three "groups" want to contro what people do on the internet?
100
The "E" stands for electronic.
What does the "E" in Email stand for?
100
Viruses are files or programs with a malicious code that infects your computer.
What are viruses?
100
The URL is the address of the site.
What is a URL?
200
respect other people's privacy
How to prevent from netiquette?
200
Internet cookies are files that keep track of the places you visit on the web.
Define what an 'internet cookie' is.
200
We use the "@" sign to indicate that the user was 'at' some other host rather than being local.
Why do we use the "@" sign?
200
Malware.
What is another name for viruses?
200
Indicated with a tilde.
What is a personal page indicated with?
300
respect others, mind your own business, and stay appropriate.
How do you look good online?
300
It can help the user on the IDs and passwords, so that they don't need to be retyped every time you visit the site.
What is one possible advantage of an 'internet cookie'?
300
The year was 2003.
In what year did the "Slammer" virus infect over half a million servers around the world.
300
Worms can replicate themselves from system to system without using the original infected file.
What do worms do?
300
Geocities and AOL
What providers are like to be personal rather than professional pages?
400
talk to them and start solving them slowly.
How to keep flame wars under control?
400
They look for cookies that contain sensitive information like PINS and paswords and extract them from your computer.
What are packet sniffers?
400
There was six given tips on Emails.
How many tips were given about Emails?
400
30-200 billion U.S. dollars per year.
What is the estimated cost of malware?
400
"About Us"
List one type of information statement available in links?
500
Some people in cyberspace have more power than others.
Why can't you abuse your power in cyberspace?
500
Social security numbers & ID numbers.
_______ and _______ of living and deceased people are easily acquired off the Net and used to create new identities.
500
It is 70% and the year was 2007.
What is the percent of emails that are spam in the U.S. and what year was it in?
500
The International Federation of the Phonograph Industry
What does IFPI stand for?
500
Copy right statement and or permission to reprint.
What will be there if your article is legitimate?
Continue
ESC
Reveal Correct Response
Spacebar
M
e
n
u
Team 1
0
+
-
Ethical Consideration Jeopardy Game
No teams
1 team
2 teams
3 teams
4 teams
5 teams
6 teams
7 teams
8 teams
9 teams
10 teams
Custom
Press
F11
Select menu option
View > Enter Fullscreen
for full-screen mode
Edit
•
Print
•
Download
•
Embed
•
Share
JeopardyLabs