Proper Internet Usage
2) Proper e-mail etiquette
Instant Messaging
Cyber Bullying
Illegal Music/movie downloading
100
software that displays advertisements or software that tracks personal or sensitive information.
What is spyware?
100
Because it's a form of advertisement
Why should you ignore junk mail?
100
The use of inappropriate language, hurtful sayings, or overall negative words towards another in instant messaging.
what is Flamming?
100
facebook, twitter..etc
What is an example of a social network sight where cyberbullying occurs?
100
copyright laws are a form of protection for authors of ______________-(fill in the blank)
original works
200
To keep track of the computer usage and site content
What is the function of parental controls?
200
a security and privacy risk
What are chain emails considered to be?
200
LOL, BRB, NVM, BTW..etc
What are some examples of IM terminology?
200
Be true to your self and aviod being aggressive online
How do you properly use a social network?
200
At US copyright offices
Where do you apply for a copyright law?
300
Norton, McAfee, and Vipre
What are some example of virus protection?
300
As you would any business letter
how should you construct email?
300
Because people may pose as other individuals
Why should you know who your messaging?
300
By being an role model for others and spreading positiveity online
What are exapmples YOU can do to stop cyber bullying?
300
to ensure that an artist is acknowleged and compensated for their works
What are Copyright Laws
400
is used to prevent, detect and remove malicious computer viruses.
What is Virus protection?
400
spam is......
chain mail junk mail any email ads
400
Dont just answer with one word, answer in no more than 3 minutes and a maximum of 5 minutes, dont right your whole day in your messages...etc
Give an example of an unwritten IM rule
400
Ignore it or report it to the website
What should you do if your a victim of cyberbullying?
400
A music download site that was eventually taken down for copyright infringment
What is Napster.com?
500
Can decide at what time of day yor children can use the computer or what games they can play based on its rating
What are some features on parental control?
500
when messages are forward by a person, the names and e-mail addresses of everyone you have sent it to, and possibly the addresses of everyone the last person also sent it to. The risk is that you do not know if an unethical or malicious person will receive the e-mail with all the e-mail addresses, and they could spam the emails
Why are chain emails considered spam?
500
Because it uses inapproiate language and can really hurt people
Why should flaming be avioded?
500
bullies have the advantage of being masked behind the computer screen
How do bullies online have the advantage than in person?
500
The offense for braching terms with someones original piece of work
What is copyright infringment?