The digital trail you leave behind while online......
What is your digital footprint
True or False. Sometimes free games, ring tones or screen savers can hide computer viruses.
What is true
2 examples of private information that you should not provide online....
What is:
Date of Birth
Address
Phone number
Your school
Your full name
Someone you should tell that you are really close to about being cyberbullied
What is a trusted person?
a person who harasses a kid/adult through technology like posts, texts, photos, and etc.
DAILY DOUBLE
What is a Cyberbully?
Despite what you think, your digital footprint cannot be......
What is be "erased"
What term best describes responsible use of technology by anyone who uses the internet, social media, cell phones etc....
Digital Citizenship
What you should do if you receive a text from someone you don't know....
DAILY DOUBLE
Block them
Delete/Ignore
Tell a trusted adult
Is the secret word you use when signing into a computer or social media platform.....
What is a password
This is communication sent in real time
DAILY DOUBLE
What is an instant message (text)
In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
What is identity theft
What are 2 responsible ways to use social media?
Limit what I share about yourself
Make sure your friends are all people you personally know
Limit what non friends and followers can see about me.
the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you
What are Privacy Settings
This is used to protect your identity online....
What is a screen name
What is Malware?
DAILY DOUBLE
A computer program that is meant to damage, destroy or corrupt information on a computer.
A good password includes these.....
What are:
Lower and upper case letters
Numbers
Symbols
What term describes person who uses the Internet to break into a computer network or an individual's computer for malicious purposes?
What is a Hacker
You can be a victim of this, both online and in person.....
What is a cyberbullying and "in person" bullying
Posting rumors or embarrassing information on social networking sites is called....
What is gossip
Save all nasty messages and emails, tell a trusted adult, don’t respond are all examples of....
What you should do if you are being cyberbullied
(e.g., strategies)