Online Privacy
Cyberbullying
Internet Safety
Malware
What Should You Do?
100

True or False: It’s okay to post anything you want on the internet because you can always go back and permanently delete it later.

False

100

A person who stands up against bullying is called an _________________________.

Upstander

100

Which of the following would be considered a strong password?

a. mybirdtweety    

b. dr.phillipssixthgrader

c. Emily12345@       

d. Il2Diwp3@    

d. Il2Diwp3@        

100

What type of software that prevents, finds, and removes dangerous software on computers and networks?

Antivirus or Antimalware software

100

If you receive a text message that makes you feel uncomfortable what is the first thing you should do?

Show it to a trusted adult

200

Which of the following poses the greatest risk to your internet privacy?

a. watching Youtube videos      

b. online gaming

c. sending emails

d. social networking

d. social networking

200

A person who watches bullying happen and does nothing is called a ___________________________.

Bystander

200

You are chatting with an online friend who is a fourteen year old girl and has multiple pictures of herself posted on her profile. She asks to hang out with you in person sometime.  Why is this not a good idea?

It may be an online predator and not actually a fourteen year old girl

200

Fake email messages trying to get you to click on a link, download a file, or give personal information

Phishing

200

Someone is sending you mean messages online list the following steps in order of what you should do:

Tell a trusted adult or parent

Screen shot what they said

Block the person

1. Screen shot what they said  

2. Block the person

3. Tell a trusted adult or parent

300

What is the easiest way to see how much of your personal information is online for people to see?

Google yourself

300

What is cyberbullying?

 Any online behavior that repeatedly harasses, embarrasses or hurts feelings

300

Someone who intentionally targets people for physical harm using online chat rooms or social media is called an _______________   _____________________.

Online predator

300

A URL or link that will attempt to download malware.

 a. Phishing

b. Pharming

c. Spyware  

d. Trojan

b. Pharming

300

While playing an online game your computer starts running really slowly and multiple popup windows start showing up on your screen. What 2 things should you do?

Close the program/popup windows

Run a virus scan on your computer

400

All of the information about you and what you do online is called your…

Digital Footprint

400

_________________________ is a set of rules for interacting politely online.

Netiquette

400

What are 3 examples of information you should never put on the internet?

Home address, phone number, full name, birthday, your current location, ect.

400

Malicious (bad) computer code that secretly watches your computer is called

Spyware

400

You sign up for a new SnapChat account and it asks you if you want to login using Facebook. What should you do? Why?

Do: Don’t use Facebook to sign in. 

Why: The privacy settings are not the same for your new Snapchat account as they are on your facebook. Your personal information may become available.

500

Social media websites have ___________________   ____________________ to allow you to choose who can see your posts and any personal information in your online profile.

Privacy settings        

500

What is the worst consequence that can happen to someone who is cyberbullying others?

They can be charged with the crime of online harassment

500

Instead of using your actual name on social media, what could you use instead?

A screen name

500

Special types of viruses that travel from computer to computer without human action are called…

Worms

500

Your computer tells you that your web browser needs to be updated. What should you do? Why is that important?

Do: Do the update

Why: Updates contain anti-virus/anti-malware software for the most recent viruses.

M
e
n
u