Connectez-vous
Créer une activité
Types d'activités
Centre d'aide
Entrez votre Game Pin
Blog
Premium
English
Español
Français
Créer une activité
Connectez-vous
Toutes les activités
Jouer Froggy Jumps
Imprimer Froggy Jumps
Cyber Safety Review (D)
Author :
Lee Chastain
1.
Plagiarism is
A
passing off others' ideas as your own
B
using others' work without giving credit
C
Both
2.
Google is not a source to give credit to, it is a ...
A
reference tool
B
search engine
C
giant game site
3.
For school projects, you should always give credit for images, music, and videos that you use but didn't create yourself.
A
True
B
False
C
Not this one!
4.
Someone who does just not sit by quietly and watch as another is being bullied
A
Bully
B
Upstander
C
Troll
5.
One person or group has a lot more power over another, frequently attempts physical or emotional harm
A
Bullying
B
Upstander
C
Troll
6.
Arguments that go back and forth, power is fairly balanced
A
Upstander
B
Identity theft
C
Conflict
7.
Someone who posts comments on websites just to make people angry
A
Troll
B
Conflict
C
Malware
8.
Cyberbullying is an example of free speech
A
True
B
False
C
Not this one!
9.
Controls on social networking sites that determine what others can see
A
copyright
B
personal identity
C
privacy settings
10.
The information about a person that exists on the Internet as a result of their online activity
A
digital footprint
B
privacy settings
C
public domain
11.
If I decide to delete something I've posted, is it gone for good?
A
Yep - it's gone!
B
Probably not - someone could've saved it
C
Not this one!
12.
About how many predators are online right now?
A
5,000
B
50,000
C
500,000
13.
The illegal use of someone else's personal information
A
public domain
B
identity theft
C
conflict
14.
Stands for malicious software; it is designed to damage the computer or collect personal information
A
flame war
B
privacy settings
C
malware
15.
The motive behind most online scams is money.
A
True
B
False
C
Not this one!
16.
A common type of Malware
A
Ransomware
B
Spyware
C
Both
17.
To help protect your school device from malware
A
only visit approved sites
B
power off device at the end of the day
C
BOTH
18.
Online predators...
A
pretend to be someone you can trust
B
will watch and wait for a long time
C
BOTH