Are most e-mail systems are free or expensive?
What is... Free
Copy the Selected Text
What is... Ctrl + C
What is the use of internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients.
What is... Social networking
presenting someone else's work as your own
What is... Plagiarism
Name 1 website where you can back up your files online manually or automatically
What is... Dropbox, Google Drive, OneDrive, Carbonite, iCloud
When a new e-mail is sent, which folder will it appear in?
What is... Inbox
Undo
What is... Ctrl + Z
What will you do if someone is cyberbullying you online?
What is... tell someone
legal concept that works (art, images, writing, music, video, and more) belong to the people who create them.
What is.... Copyright
Describe 1 downfall to a back-up storage device
What is... Files can be stolen or hacked.
You must make an _____ in order to send and receive e-mails.
What is... e-mail address
Underline the selected text
What is... Ctrl + U
What are the top 3 social media apps?
What is... Facebook, Instagram, and Twitter
Which of the statements below best describes how you can tell if a website is reliable?
Checking the site’s purpose and if it is biased.
By the images and if the information is relevant.
Looking into the site’s domain and if the other is reliable.
All the above.
What is... All the above
How can you prevent a “Hacker” from cracking your password
What is... By creating a strong password
Messages distributed by electronic means from one computer user to one or more recipients via a network.
What is... E-Mail
Find a word or phrase on a current file
What is... Ctrl + F
Explain the difference between cyber bullying and bullying
What is... Online vs in person
Which of the statements below best describes what copyright is?
The right to copy anyone’s work.
Protection on the owner's personal work or creation from being illegally used.
A temporary work that is protected for the life of the work.
What is... Protection on the owner's personal work or creation from being illegally used.
How would a password manager be beneficial
What is... Store them securely online
What are the 5 folders that all e-mails have?
What is... Inbox, Sent, Draft, Trash, Junk e-mail
Quit a Frozen Application
What is... Ctrl + Alt + Delete
What are 3 ways you will help protect yourself online
What is...
Don’t post personal information online.
Avoid escalating the situation. Don’t respond to harassment.
Document any type of cyberbullying. Save electronic versions and print it out.
___________ ________is a limitation on copyright
Public Domain
Fair Play
Fair Use
What is... Fair Use
Write out the 3 Tips for creating a password on the provided lines below
What is...
Never use personal information such as your name, birthday, user name, or email address. This type of information is often publicly available, which makes it easier for someone to guess your password.
Use a longer password. Your password should be at least six characters long, although for extra security it should be even longer.
Don't use the same password for each account. If someone discovers your password for one account, all of your other accounts will be vulnerable.
Try to include numbers, symbols, and both uppercase and lowercase letters.
Avoid using words that can be found in the dictionary. For example, swimming1 would be a weak password.
Random passwords are the strongest. If you're having trouble creating one, you can use a password generator instead.