The circular port called where you could hook up earbuds?
What is the Headphone Jack or Audio Jack
These are the most common type of scams
What are phone scams?
This speaker was in the TED video about online tracking (G.K. were his initials)
Who is Gary Kovacs
Leaving a PERMANENT online trail that for others online to follow you
What is: digital footprint
These are the letters of your home row typed by your LEFT HAND
What are: A,S,D,F,and G?
This is the name of where you plug in your charger to your Chromebook
What is the AC input?
These kinds of scams are sent via e-mail.
What are phishing scams?
Tell at least TWO ADVANTAGES of online tracking
What are: saving time, customization, discounts and coupons, accurate routes, finding a person in need, etc...?
A good rule to remember before posting something online: Never post something that would make your _____________ ashamed.
who is: grandmother or mother
This is the most common type of keyboard used
What is the Qwerty keyboard?
The name of this scam sounds similar to scams sent via e-mail and are sent by text
What are smishing scams?
At least THREE DISADVANTAGES to online tracking
What are: trying to steal personal information, trying to steal private information, advertising that is unwanted, targeting for specific reasons, invasion of privacy, etc...?
What is the Google feature for organizing and tracking data that you set up after the typing assessment?
Google sheets
This is the most knowledgeable person about technology at AMS?
Who is Mr. Yoder?
This type of connection connects other kinds of High Definition Multimedia Interfaces
What is the HDMI port?
You saw a video about scams like this that target teens playing popular games online.
What are gaming scams?
Tell 4 of the 9 Key P's to Online Protection
What are:Protection from viruses, Privacy settings, Professionalism, Personal info, Private info, Password strength, Personal Brand, Permission, Photos, Property
What is a student definition of "FIREWALL"?
a part of a computer system or network which is designed to block unauthorized access
What are the names of the three boys and two girls from the "6 Degrees of Information" video we went through in class?
Will, Nick, Logan, Kayla, and Elise
The EXACT name of the port that provides extra security for a laptop or Chromebook
What is the Kensington or Noble lock port?
Tell THREE WARNING SIGNS of a PHISHING OR SMISHING SCAM
What are: too good to be true, generic greeting, generic closing, verification of information, your account is in some sort of trouble, a link to some other area, spelling errors.
the 5 remaining Keys to Online Protection that were not mentioned
What are: Protection from viruses, Privacy settings, Professionalism, Personal info, Private info, Password strength, Personal Brand, Permission, Photos, Property
What 4-letter word means "electronic junk mail" or
undesired electronic messages .
What is SPAM?
The ten KEYS along the bottom row of your keyboard are?
What are: Z,X,C,V,B,N,M, the comma, the period, and the back slash.