DIGITAL CITIZENSHIP QUIZ
|
|
|
- Sharyl Smith
- 9 years ago
- Views:
Transcription
1 1. Kelly is on Instagram and a boy she doesn t know begins to follow her and comment on her images. She should... A. Just go along with it (ignore it) B. Delete the follower C. Start a chat and get to know him 2. When you create passwords, you should make them easy to guess. 3. Popular sites are always safe from spyware, malware, and other online threats. 4. When online, you should be careful whenever approached by a new person or asked to provide personal information.
2 5. You receive a text or an from a person that identifies herself as your Aunt Carol. She wants to meet you some place nearby after school. Do you: A. Tell your parents about the message and ignore it B. Ask the person a question that only Aunt Carol would know C. Arrange to go and meet her 6. You receive a funny text or an interesting chat invite on Kik that asks you to pass it on to 5 of your closest friends. A. Pass it on B. Delete the text/invitation 7. Malware is a common term used to describe a digital virus, worm, advertisement, or dangerous program that puts your computer at risk.
3 8. When Steven shops online, it s okay for him to enter a credit card and personal information as long as he feels like the online store is legit. 9. You and a friend just heard a new song on Pandora that you love. You could (choose all that apply): A. Find a place to buy it, even if it costs $1.29 B. Find a place to get it for free, even though you know other people pay for it C. Have a friend share their mp3 file, since that s easier D. Wait for the song to come on again later and enjoy it then
4 10. What is the best way to use social media? A. Limit what I share about myself B. Make sure my friends and followers are people I know in real life C. Limit what non-friends and nonfollowers can see on my profile D. All of the above 11. You posted an embarrassing photo of a friend to their social media, but you suddenly feel guilty and take it down. Your friend will never see the photo. 12. The best thing about social media is that we can say things online that we might not say in real life.
5 13. The pictures you post to social media in middle school can affect your reputation in the future. 14. Stealing someone s words or images from the World Wide Web is a crime. 15. Jason s new girlfriend asks for his Instagram password. He should: A. Give her the password. She s beautiful and he loves her. B. Give her the password, but change it quickly. She can t be trusted. C. Never give away his password.
6 16. After a fight at school, a group of 13-year-old students decide to create fake social media accounts and threaten Rachel online. She should: A. Block them from her social media B. Save any threatening messages C. Tell a parent, teacher or adult D. All of the above 17. Creating a fake Instagram account for someone you know in a class, or even for someone you don t know, is illegal.
7 18. When reading something on the Internet for a class assignment, I should (check all that apply): A. Evaluate the credibility, accuracy, reasonableness, and support of a website where I received the information B. Copy/paste what I find without telling anyone where I found it C. Check other websites to confirm the information is accurate D. All of the above 19. During a presidential election, the World Wide Web is buzzing with articles and sites about the candidates. I should: A. Avoid sites that are full of bias (complete hate or complete praise) B. Read everything and pass it on 20. As a middle school student, I am still considered a (choose all that apply): A. Minor B. Child C. Adult D. Citizen
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.
Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1
Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines
A Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Internet Safety: Pitfalls & Dangers
Sample Questions Part I: Good Neighborhoods, Bad Neighborhoods In what way is the Internet like a city? (It contains good places and dangerous places.) Name five different kinds of bad neighborhood websites.
Understand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
Too Good for Drugs Grade 5
Dear Parent: Our class is participating in Too Good for Drugs, a prevention program designed by the Mendez Foundation to teach skills for living healthy, drug-free lives. We are excited about this opportunity
Today s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Teens, Online Stranger Contact and Cyberbullying What the research is telling us
Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Staying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
e-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
e-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
A: We really embarrassed ourselves last night at that business function.
Dialog: VIP LESSON 049 - Future of Business A: We really embarrassed ourselves last night at that business function. B: What are you talking about? A: We didn't even have business cards to hand out. We
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
F-Secure Anti-Virus for Mac. User's Guide
F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to
(A trading company s staff, Ken, is opening the office s door)
Information Security Animations Cloud Service Case Study (Script) First Set Setting: At a Trading Company (A trading company s staff, Ken, is opening the office s door) Ken: Boss, what happened? Mr. Chung:
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Shop Online with Confidence
Shop Online with Confidence Table of Contents Introduction 3 Benefits and Drawbacks of Online Shopping Benefits Drawbacks 5 6 Tips for Safe Online Shopping Before You Buy When Making a Purchase After Your
What is Safeguarding?
What is Safeguarding? Easy read 2011 All images CHANGE http://www.changepeople.co.uk/ 1 Message from CHANGE We hope that you find this document useful to support people with learning disabilities and other
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Parenting. Coping with A Parent s Problem Drug or Alcohol Use. For children. aged 6 to 12
Parenting Positively Coping with A Parent s Problem Drug or Alcohol Use For children aged 6 to 12 The information in this booklet is meant to help children who are living with harmful parental drug or
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN
TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN Ngo Quang Huy Information Security Expert, Vietnam Computer Emergency Response Team Ministry of Information and Communications, Vietnam Email: [email protected]
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
General Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand [email protected] http://www.csis.dk Table of contents Table of contents...
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
HIV/AIDS: Influence of Alcohol & Other Drugs Grade 7, Lesson #22
HIV/AIDS: Influence of Alcohol & Other Drugs Grade 7, Lesson #22 Time Needed One class period Student Learning Objectives To be able to 1. Describe the physical and emotional effects of alcohol and other
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
Private Today, Public Tomorrow
Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
Voir Dire in Domestic Violence Cases
Voir Dire in Domestic Violence Cases By Sarah M. Buel, Co-Director, University of Texas School of Law Domestic Violence Clinic Voir dire provides the opportunity to educate jurors while probing for bias,
Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
Related KidsHealth Links
Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
Question Bank June 2015 R001 Mock
Bank June 2015 R001 Mock Jan13 1 Spec 1 Spec 7 Jan15 7 1. The software needed to create individual graphics for animated cartoons Richard uses his smartphone to take a photograph. a) State two ways in
Small Business Guide to Monitoring your Online Reputation
Small Business Guide to Monitoring your Online Reputation Small Business Guide to Monitoring your Online Reputation Your customers are talking to each other, and to you. They are doing it in person, on
Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user
Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user Ad Preferences Playlist Creation Recommended Playlists
Network Security. Demo: Web browser
Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs
Website Privacy Policy Statement
Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
