Secret-ary of Defense
Leave No Digital Footprints
The Chicago Cyber-Bulls
Term-inally Online
100

Someone who tries to steal personal information or personal accounts?

A hacker

100

You should absolutely never do this with a stranger online.

Meet them

100

This is a word that can describe hurting someone on the internet

Cyberbullying

100

This is a term used to describe someone attempting to trick you in some way...

A Scam

200

Do this so people do not know your password

Keep it private, do not share it.

200

You should never share this type of information with others online

Personal information

200

Cyberbullying can hurt and affect a person's self-esteem. True or False

True

200

When you put something on social media

A post

300

Online account passwords should have a combination of these 3 things...

What are letters, numbers and symbols?

300

When you suspect suspicious activity online you should always do this

Report it

300

Another name for a cyber bully

A troll

300

Any data that can be used to identify someone (ex. address, name, online passwords)...

Personal Information

400

Why should you be careful when answering questions on a website or online game (ex. those "Which Character from ____ Are You?" kinds of quizzes)?

This also includes answering questions someone asks on Xbox Live Game Chat or Discord messages.

It could lead to you giving out information about yourself.

400

Elementary students can have social media accounts. True or False Why?

False, in the USA, you must be 13 to have a social media account.


400

Cyber bullying is the most common type of bullying

T/F

True

400

A sequence of numbers, letters, and characters used to secure your online accounts.

A password

500

A method of hacking that attempts to "reel in" your money or your identity information by getting you to reveal personal information.

Phishing

500

You can erase everything you do online and no one will know? True or False

False, anything posted on the internet is never really deleted. Social media accounts keep a record of everything someone does.

500

What should you do if you encounter a cyberbully?

Speak with a trusted adult or submit an online report to the website's owner(s).

500

A security system usually made up of hardware and software used to "wall off" hackers, viruses, and other malicious threats to your computer

A firewall