Ch. 1- Digital Life 101
Ch. 2- Strategic Searching
Ch. 3- Scams and Schemes
Ch. 4- Cyberbullying-Be Understanding
Ch.5- Creators Rights
100
a literary device for comparing two unlike things
What is Simile.
100
The 4 URL domains
What is .com-company .gov-government website .edu-educational institution .org-organization
100
What do thieves look for when they're trying to scam you? why?
What is personal information they do this to use it for criminal activities
100
What is an example of cyberbullying
What is answers may vary Commenting rude comments on someones video they worked hard on
100
Why couldn't people use "Happy Birthday" in their movies without paying alot of money
What is "Happy Birthday" had a license
200
communication, including television, radio and newspapers, that often reaches and impacts a large audience.
What is Media.
200
5 steps of the search Plan
What is S=elect Reasearch Questions E=xtract keywords and terms A=pply search strategies R=un your search CH=art your search
200
How do thieves try to trick you into giving your personal information
What is answers may vary They can send you an email like winning a free cruise if you give your personal information.
200
Define: Bystander, Upstander, and Empathize
What is Bystander- someone who sees cyberbullying happening, but does nothing to help Upstander- someone who helps when they see cyberbullying occur Empathize- to imagine the feelings that someone else is experiencing
200
What is the definition of Piracy, Public Domain, and Plagiarize
What is Piracy- Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying Public Domain- Creative work that's not copyrighted and therefore free for you to use however you want Plagiarize- Copying, "lifting," or making slight changes to some or all of someone else's work and saying you created it
300
electronic devices and media platforms such as cell phones, the Internet, digital video, social networking sites, video games, and virtual worlds that allow users to create, communicate, and interact with one another or with the device or application itself
What is Digital Media
300
Define:effective, efficient, and strategy
What is effective-acheiving a desired goal efficient-doing something in a way that saves time or energy strategy- a course of action designed to help you reach a specific goal or result
300
What is an example of a scam email
What is answers may vary Dear Bank User, There as been an error in your account! You must email bankfix@gmail.com your credit card and social security number! Email in the next 24 hours and you will win 4 free fronnt row seats for your choice of a basketball game in return of your troubles! Thank You! Your Bank Fixers
300
What can bystandars do to be upstanders
What is answers may vary Bystanders can get trusted adults involved
300
Define:Creative Work, Copyright,Creative Commons, and License
What is Creative Work- any idea or artistic creation that is recorded in some form, whether it's hard copy or digital Copyright- a law that protects your control over the creative work you make so that people must get your permissionbefore they copy, share, or perform your work Creative Commons- a kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it License- a clear way to define the copyright of your creative work so people know how it can be used
400
Why might people feel different about their own digital lives?
What is they may not be used to digital media, didn't grow up with digital media, they think its too slow or too expensive.
400
Why is it important to have a search plan? explain.
What is Search plans help you find more accurate results and help you find your results quicker which allows you more free time.
400
What are the definitions of Scam, Identity Theft, Vulernable, and Phishing
What is Scam-an attempt to trick someone, usually with the intention of stealing money or private information Identity Theft-a type of crime in which your private information is stolen and used for criminal activity Vulenerable- in a position that makes it easier for you to be harmed or attacked Phishing- when people send you phony emails, pop-up messages, social media, messages, texts, calls, or links to fake websites in order to hook you into giving your personal and financial information
400
What is an example of showing empathizing and being an upstander
What is answers may vary If your friend is getting cyberbullied you can ask them if they want to talk about it and maybe get an adult involved
400
Why do people put a copyright on their work
What is they worked hard on the work and they don't want other people being able to easily copy their work and calling it their own
500
What are two characteristics of digital media
What is email, game systems, text, calling, etc.
500
Name the 8 Strategic Search Tips
What is -Multiple specific words -synonyms -use quotation marks -add a minus sign before the word you don't want included -Place OR between words -Search and pay attention to the URL -Specify the format your looking for -Use advanced search options on a search engine
500
What are the 7 ways to spot a scam email
What is -Need to verify account information -Sense of urgency -Spelling errors -Alert that account is in trouble -Link in attachment or email -Too good to be true -Generic Greeting
500
What is an example of a cyberbully comment and an upstander comment
What is cyberbully- Wow... You sure know how to sing (sarcasm) Upstander: Wow! You have a really could voice
500
What year was the "Happy Birthday" song first published and by whom sang it
What is "Happy Birthday" was published in 1893 by two school teachers