In Becker Library, what does the Call Number "YAF" mean?
Young Adult Fiction
What do phishing emails or messages hope to get from you?
Personal information/ access to your money or identity.
What citation generator do we use at St. Stephen's?
NoodleTools
Which is NOT cyberbullying?
1. Posting mean comments
2. Using fun memes online
3. Posting embarrassing secrets online
Using fun memes online
Give the definition of this description:
"The ability to find, evaluate, understand, and use information"
Information Literacy!
What does the Call Number "GN" mean?
Graphic Novel
What is a type of crime in which your private information is stolen and used for criminal activity?
Identity Theft
What citation style do we (mostly) use at St. Stephen's?
MLA
What is a "bystander" in a cyberbullying situation?
Someone who sees cyberbullying and does nothing to help.
What is "digital citizenship?"
The practice of using technology responsibly and respectfully.
Is a biography about Abraham Lincoln Fiction or Nonfiction?
Nonfiction
If your identity is stolen, name 2 things criminals might do.
Steal money, apply for credit cards, cyberbully someone, apply for loans
What does a red asterisk mean next to an entry field in NoodleTools?
It means that info is required...you must fill it in.
What term is the opposite of "bystander?"
Upstander
Name 1 example of e-mail etiquette
Address teachers and adults appropriately, don't use school email for personal communication, watch out for "reply all," check your email each day and respond promptly
Name (3) search categories in the library catalog.
Keyword, Title, Author, Subject
Name 2 clues an email or message might be phishing
Spelling errors, sense of urgency, shortened URL, too good to be true, generic greetings
Which sources DO NOT require citation?
A photo from Flickr
A YouTube video
A webpage
An article in a database
ALL of them require citation
Name 2 reasons a person being cyberbullied may not come forward?
Fear of escalation, fear they might get punished, embarrassment, not wanting to snitch, being blackmailed, being threatened
What is 1 example of what makes a good infographic
Start with good information; use a title; SHOW, don't tell; at a glance info, citations
What do the three letters in the Call Number F MEL mean?
They are the first 3 letters of the author's last name.
What is malware?
Software designed to disrupt, damage, or get access to a computer.
Name 2 reasons why we cite sources.
To avoid plagiarism
To give credit to the author(s)
To provide a reader roadmap back to the original source
What might an instance of "indirect" bullying look like?
You don't mention the person you are bullying by name, but everyone knows who the target is.
What is "a visual image such as a chart or diagram used to represent information or data" ?
An infographic