Chromebook Ports
Scams
Tracking and Protection
Digital Citizenship
Typing/Misc.
100

 The circular port called where you could hook up earbuds?

What is the Headphone Jack or Audio Jack

100

These are the most common type of scams

What are phone scams?

100

This speaker was in the TED video about online tracking (G.K. were his initials)

Who is Gary Kovacs

100

Leaving a PERMANENT online trail that for others online to follow you 

What is: digital footprint

100

These are the letters of your home row typed by your LEFT HAND

What are: A,S,D,F,and G?

200

This is the name of where you plug in your charger to your Chromebook

What is the AC input?

200

These kinds of scams are sent via e-mail.

What are phishing scams?

200

Tell at least TWO ADVANTAGES of online tracking

What are:  saving time, customization, discounts and coupons, accurate routes, finding a person in need, etc...?

200

A good rule to remember before posting something online:  Never post something that would make your _____________ ashamed.

who is: grandmother or mother

200

This is the most common type of keyboard used

What is the Qwerty keyboard?

300
The type of port that you have two of on a Chromebook
What are the USB ports?
300

The name of this scam sounds similar to scams sent via e-mail and are sent by text

What are smishing scams?

300

 At least THREE DISADVANTAGES to online tracking

What are: trying to steal personal information, trying to steal private information, advertising that is unwanted, targeting for specific reasons, invasion of privacy, etc...?

300

What is the Google feature for organizing and tracking data that you set up after the typing assessment?

Google sheets

300

This is the most knowledgeable person about technology at AMS?

Who is Mr. Yoder?

400

This type of connection connects other kinds of High Definition Multimedia Interfaces

What is the HDMI port?

400

You saw a video about scams like this that target teens playing popular games online.

What are gaming scams?

400

Tell 4 of the 9 Key P's to Online Protection

What are:Protection from viruses, Privacy settings, Professionalism, Personal info, Private info, Password strength, Personal Brand, Permission, Photos, Property

400

What is a student definition of "FIREWALL"?

a part of a computer system or network which is designed to block unauthorized access

400

What are the names of the three boys and two girls from the "6 Degrees of Information" video we went through in class?

Will, Nick, Logan, Kayla, and Elise

500

The EXACT name of the port that provides extra security for a laptop or Chromebook

What is the Kensington or Noble lock port?

500

Tell THREE WARNING SIGNS of a PHISHING OR SMISHING SCAM

What are: too good to be true, generic greeting, generic closing, verification of information, your account is in some sort of trouble, a link to some other area, spelling errors.

500

 the 5 remaining Keys to Online Protection that were not mentioned

What are: Protection from viruses, Privacy settings, Professionalism, Personal info, Private info, Password strength, Personal Brand, Permission, Photos, Property

500

What 4-letter word means "electronic junk mail" or

undesired electronic messages .

What is SPAM?

500

The ten KEYS along the bottom row of your keyboard are?

What are: Z,X,C,V,B,N,M, the comma, the period, and the back slash.