The circular port called where you could hook up earbuds?
What is the Headphone Jack or Audio Jack
These are the most common type of scams
What are phone scams?
This speaker was in the TED video about online tracking (G.K. were his initials)
Who is Gary Kovacs
Leaving a PERMANENT online trail that for others online to follow you
What is: digital footprint
These are the letters of your home row typed by your LEFT HAND
What are: A,S,D,F,and G?
This is the name of where you plug in your charger to your Chromebook
What is the AC input?
These kinds of scams are sent via e-mail.
What are phishing scams?
Tell at least TWO ADVANTAGES of online tracking
What are: saving time, customization, discounts and coupons, accurate routes, finding a person in need, etc...?
A good rule to remember before posting something online: Never post something that would make your _____________ ashamed.
who is: grandmother or mother
What is the Qwerty keyboard?
The name of this scam sounds similar to scams sent via e-mail and are sent by text
What are smishing scams?
At least THREE DISADVANTAGES to online tracking
What are: trying to steal personal information, trying to steal private information, advertising that is unwanted, targeting for specific reasons, invasion of privacy, etc...?
______% of companies have formal policies that require their recruiters to do online research when screening candidates for a position. (EdTech Review told us this...)
What is 75%?
This is the most knowledgeable person about technology at AMS?
Who is Mr. Yoder?
This type of connection connects other kinds of High Definition Multimedia Interfaces
What is the HDMI port?
You saw a video about scams like this that target teens playing popular games online.
What are gaming scams?
Tell 4 of the 9 Key P's to Online Protection
What are:Protection from viruses, Privacy settings, Professionalism, Personal info, Private info, Password strength, Personal Brand, Permission, Photos, Property
___________% of College recruiters are looking at high school seniors' social media backgrounds as one of the determining factors to accept them at their university. (Percentage between 50-80%)
What is 66%?
The TWO main things you SHOULD do if you are online talking with one of your friends, when you see a warning sign from them that Ms. Ewen discussed with us...
Take the warning signs SERIOUSLY, and contact an adult to get that person the help they need.
The EXACT name of the port that provides extra security for a laptop or Chromebook
What is the Kensington or Noble lock port?
Tell THREE WARNING SIGNS of a PHISHING OR SMISHING SCAM
What are: too good to be true, generic greeting, generic closing, verification of information, your account is in some sort of trouble, a link to some other area, spelling errors.
the 5 remaining Keys to Online Protection that were not mentioned
What are: Protection from viruses, Privacy settings, Professionalism, Personal info, Private info, Password strength, Personal Brand, Permission, Photos, Property
Willow B. (in Live My Digital) taught that is important to make sure to _______-_______ any social media and websites you haven't used recently.
What is log-off?
The ten KEYS along the bottom row of your keyboard are?
What are: Z,X,C,V,B,N,M, the comma, the period, and the back slash.