Library Catalog
Phishing
Citation
Cyberbullying
Miscellaneous
100

In Becker Library, what does the Call Number "YAF" mean?

Young Adult Fiction

100

What do phishing emails or messages hope to get from you?

Personal information/ access to your money or identity.

100

What citation generator do we use at St. Stephen's?

NoodleTools

100

Which is NOT cyberbullying?

1. Posting mean comments

2. Using fun memes online

3. Posting embarrassing secrets online

Using fun memes online

100

Give the definition of this description:


"The ability to find, evaluate, understand, and use information"

Information Literacy!

200

What does the Call Number "GN" mean?

Graphic Novel

200

What is a type of crime in which your private information is stolen and used for criminal activity?

Identity Theft

200

What citation style do we (mostly) use at St. Stephen's?

MLA

200

What is a "bystander" in a cyberbullying situation?

Someone who sees cyberbullying and does nothing to help.  

200

What is "digital citizenship?"

The practice of using technology responsibly and respectfully.

300

Is a biography about Abraham Lincoln Fiction or Nonfiction?

Nonfiction

300

If your identity is stolen, name 2 things criminals might do.

Steal money, apply for credit cards, cyberbully someone, apply for loans

300

What does a red asterisk mean next to an entry field in NoodleTools?

It means that info is required...you must fill it in.

300

What term is the opposite of "bystander?"

Upstander

300

Name 1 example of e-mail etiquette

Address teachers and adults appropriately, don't use school email for personal communication, watch out for "reply all," check your email each day and respond promptly

400

Name (3) search categories in the library catalog.

Keyword, Title, Author, Subject

400

Name 2 clues an email or message might be phishing

Spelling errors, sense of urgency, shortened URL, too good to be true, generic greetings

400

Which sources DO NOT require citation?

A photo from Flickr

A YouTube video

A webpage

An article in a database

ALL of them require citation

400

Name 2 reasons a person being cyberbullied may not come forward?

Fear of escalation, fear they might get punished, embarrassment, not wanting to snitch, being blackmailed, being threatened

400

What is 1 example of what makes a good infographic

Start with good information; use a title; SHOW, don't tell; at a glance info, citations

500

What do the three letters in the Call Number F MEL mean?

They are the first 3 letters of the author's last name.

500

What is malware?

Software designed to disrupt, damage, or get access to a computer.

500

Name 2 reasons why we cite sources.

To avoid plagiarism

To give credit to the author(s)

To provide a reader roadmap back to the original source


500

What might an instance of "indirect" bullying look like?

You don't mention the person you are bullying by name, but everyone knows who the target is.

500

What is "a visual image such as a chart or diagram used to represent information or data" ?

An infographic

M
e
n
u