Digital Life
Strategic Searching
Scams and Schems
Cyber Bullying
Creator's Rights
100
Electronic devices and media platforms such as computers, cell phones, the Internet, digital video, social networking sites, video games, and virtual worlds that allow users to create, communicate, and interact with one another or with the device or application itself.
What is digital media?
100
Doing something in a way that saves you time and energy.
What is efficient?
100
A type of crime in which your private information is stolen and used for criminal activity.
What is identity thief?
100
To imagine the feelings that someone else is experiencing.
What is empathize?
100
A law that protects your control over the creative work you make so that people must get your permission before they copy, share, or preform your work.
What is copyright?
200
A literary device for comparing two unlike things.
What is a simile?
200
A course of action designing to help you reach a specific goal or result.
What is strategy?
200
When people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.
What is phishing?
200
Someone who sees cyberbullying happening, but does nothing about it.
What is bystander?
200
Copying, or "lifting," or making slight changes to some or all of someone else's work and saying you created it.
What is plagiarize?
300
communication, including television, radio, and newspapers, that often reaches and impacts a large audience.
What is media?
300
Achieving a desired goal or result.
What is effective?
300
In a position that makes it easier for you to be harmed or attacked.
What is vulnerable?
300
Someone who helps when they see cyberbullying occur.
What is upstander?
300
A clear way to define the copyright of your creative work so people know how it can be used.
What is license?
400
Instant messaging, and sending a text message to a friend.
What are types of social media?
400
Select research questions, extract keywords and terms, apply search strategies, run your search, and chart your search.
The strategic search plan.
400
Personal information or account information like your credit card number.
What kinds of information do identity thieves look for.
400
Hurting someone's feelings or bullying online or on any device that you can communicate on.
What is cyber bullying.
400
It's against the law and if someone finds out you can get in big trouble.
Why can't you directly copy information from online?
500
People can make friends on the internet and communication can be "two way."
When digital media is described as being interactive.
500
Use multiple descriptive keywords, use synonyms, use quotation marks, add a minus sign for words you don't want to use, use OR, look at the URL domain types, specify the format your looking for, and use advanced search options.
What are the tips for strategic searching.
500
Need to verify account information, sense of urgency, spelling errors, alert that your account is in trouble, link in email or attachment, too good to be true, generic greeting.
What is spotting scams.
500
Standing up for someone even if you haven't before and helping them out if they need it.
How can you become an upstander?
500
Creative commons
What is having some control over photos but making it easy for people to share them.