DIGITAL CITIZENSHIP QUIZ

Size: px
Start display at page:

Download "DIGITAL CITIZENSHIP QUIZ"

Transcription

1 1. Kelly is on Instagram and a boy she doesn t know begins to follow her and comment on her images. She should... A. Just go along with it (ignore it) B. Delete the follower C. Start a chat and get to know him 2. When you create passwords, you should make them easy to guess. 3. Popular sites are always safe from spyware, malware, and other online threats. 4. When online, you should be careful whenever approached by a new person or asked to provide personal information.

2 5. You receive a text or an from a person that identifies herself as your Aunt Carol. She wants to meet you some place nearby after school. Do you: A. Tell your parents about the message and ignore it B. Ask the person a question that only Aunt Carol would know C. Arrange to go and meet her 6. You receive a funny text or an interesting chat invite on Kik that asks you to pass it on to 5 of your closest friends. A. Pass it on B. Delete the text/invitation 7. Malware is a common term used to describe a digital virus, worm, advertisement, or dangerous program that puts your computer at risk.

3 8. When Steven shops online, it s okay for him to enter a credit card and personal information as long as he feels like the online store is legit. 9. You and a friend just heard a new song on Pandora that you love. You could (choose all that apply): A. Find a place to buy it, even if it costs $1.29 B. Find a place to get it for free, even though you know other people pay for it C. Have a friend share their mp3 file, since that s easier D. Wait for the song to come on again later and enjoy it then

4 10. What is the best way to use social media? A. Limit what I share about myself B. Make sure my friends and followers are people I know in real life C. Limit what non-friends and nonfollowers can see on my profile D. All of the above 11. You posted an embarrassing photo of a friend to their social media, but you suddenly feel guilty and take it down. Your friend will never see the photo. 12. The best thing about social media is that we can say things online that we might not say in real life.

5 13. The pictures you post to social media in middle school can affect your reputation in the future. 14. Stealing someone s words or images from the World Wide Web is a crime. 15. Jason s new girlfriend asks for his Instagram password. He should: A. Give her the password. She s beautiful and he loves her. B. Give her the password, but change it quickly. She can t be trusted. C. Never give away his password.

6 16. After a fight at school, a group of 13-year-old students decide to create fake social media accounts and threaten Rachel online. She should: A. Block them from her social media B. Save any threatening messages C. Tell a parent, teacher or adult D. All of the above 17. Creating a fake Instagram account for someone you know in a class, or even for someone you don t know, is illegal.

7 18. When reading something on the Internet for a class assignment, I should (check all that apply): A. Evaluate the credibility, accuracy, reasonableness, and support of a website where I received the information B. Copy/paste what I find without telling anyone where I found it C. Check other websites to confirm the information is accurate D. All of the above 19. During a presidential election, the World Wide Web is buzzing with articles and sites about the candidates. I should: A. Avoid sites that are full of bias (complete hate or complete praise) B. Read everything and pass it on 20. As a middle school student, I am still considered a (choose all that apply): A. Minor B. Child C. Adult D. Citizen

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware. Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1 Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Class 3: Identify Tricks and Scams Online

Class 3: Identify Tricks and Scams Online Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Internet Safety: Pitfalls & Dangers

Internet Safety: Pitfalls & Dangers Sample Questions Part I: Good Neighborhoods, Bad Neighborhoods In what way is the Internet like a city? (It contains good places and dangerous places.) Name five different kinds of bad neighborhood websites.

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

Too Good for Drugs Grade 5

Too Good for Drugs Grade 5 Dear Parent: Our class is participating in Too Good for Drugs, a prevention program designed by the Mendez Foundation to teach skills for living healthy, drug-free lives. We are excited about this opportunity

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Internet Safety Plan for Your Family

Internet Safety Plan for Your Family The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Teens, Online Stranger Contact and Cyberbullying What the research is telling us

Teens, Online Stranger Contact and Cyberbullying What the research is telling us Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

A: We really embarrassed ourselves last night at that business function.

A: We really embarrassed ourselves last night at that business function. Dialog: VIP LESSON 049 - Future of Business A: We really embarrassed ourselves last night at that business function. B: What are you talking about? A: We didn't even have business cards to hand out. We

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Case study: What the? Online scams and identity theft

Case study: What the? Online scams and identity theft Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

F-Secure Anti-Virus for Mac. User's Guide

F-Secure Anti-Virus for Mac. User's Guide F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to

More information

Digital Citizenship Lesson

Digital Citizenship Lesson Digital Citizenship Lesson Categories: School Environment and Student Behavior/ Student Life Outside of School Environment Element: Digital Security Lesson: Malware Grade Level: 6-12 Part I Introduction

More information

(A trading company s staff, Ken, is opening the office s door)

(A trading company s staff, Ken, is opening the office s door) Information Security Animations Cloud Service Case Study (Script) First Set Setting: At a Trading Company (A trading company s staff, Ken, is opening the office s door) Ken: Boss, what happened? Mr. Chung:

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

Shop Online with Confidence

Shop Online with Confidence Shop Online with Confidence Table of Contents Introduction 3 Benefits and Drawbacks of Online Shopping Benefits Drawbacks 5 6 Tips for Safe Online Shopping Before You Buy When Making a Purchase After Your

More information

What is Safeguarding?

What is Safeguarding? What is Safeguarding? Easy read 2011 All images CHANGE http://www.changepeople.co.uk/ 1 Message from CHANGE We hope that you find this document useful to support people with learning disabilities and other

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

Parenting. Coping with A Parent s Problem Drug or Alcohol Use. For children. aged 6 to 12

Parenting. Coping with A Parent s Problem Drug or Alcohol Use. For children. aged 6 to 12 Parenting Positively Coping with A Parent s Problem Drug or Alcohol Use For children aged 6 to 12 The information in this booklet is meant to help children who are living with harmful parental drug or

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN Ngo Quang Huy Information Security Expert, Vietnam Computer Emergency Response Team Ministry of Information and Communications, Vietnam Email: huynq@mic.gov.vn

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand rand@csis.dk http://www.csis.dk Table of contents Table of contents...

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS Code No. 605.6E1(B) I am the parent or guardian of the student named

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

HIV/AIDS: Influence of Alcohol & Other Drugs Grade 7, Lesson #22

HIV/AIDS: Influence of Alcohol & Other Drugs Grade 7, Lesson #22 HIV/AIDS: Influence of Alcohol & Other Drugs Grade 7, Lesson #22 Time Needed One class period Student Learning Objectives To be able to 1. Describe the physical and emotional effects of alcohol and other

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

SUPERIOR NORTH CATHOLIC District School Board ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS

SUPERIOR NORTH CATHOLIC District School Board ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS SUPERIOR NORTH CATHOLIC District School Board AR134 ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS Students Responsibility Students shall be responsible

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Voir Dire in Domestic Violence Cases

Voir Dire in Domestic Violence Cases Voir Dire in Domestic Violence Cases By Sarah M. Buel, Co-Director, University of Texas School of Law Domestic Violence Clinic Voir dire provides the opportunity to educate jurors while probing for bias,

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

Cyber Security. Keeping the internet safe for you and your family

Cyber Security. Keeping the internet safe for you and your family Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Standard 9: The student will identify and explain consumer fraud and identity theft.

Standard 9: The student will identify and explain consumer fraud and identity theft. TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial

More information

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007 CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007 Written by Dennis Rand rand@csis.dk http://www.csis.dk Table of

More information

Related KidsHealth Links

Related KidsHealth Links Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

E-Safety and Acceptable Use Policy

E-Safety and Acceptable Use Policy E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour

More information

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Question Bank June 2015 R001 Mock

Question Bank June 2015 R001 Mock Bank June 2015 R001 Mock Jan13 1 Spec 1 Spec 7 Jan15 7 1. The software needed to create individual graphics for animated cartoons Richard uses his smartphone to take a photograph. a) State two ways in

More information

Roger s Cyber Security and Compliance Mini-Guide

Roger s Cyber Security and Compliance Mini-Guide Roger s Cyber Security and Compliance Mini-Guide A Mini Guide for Small and Medium Business and not for profit organisations. By Roger Smith Managed Service Provider and Cyber Security Coach R & I ICT

More information

Small Business Guide to Monitoring your Online Reputation

Small Business Guide to Monitoring your Online Reputation Small Business Guide to Monitoring your Online Reputation Small Business Guide to Monitoring your Online Reputation Your customers are talking to each other, and to you. They are doing it in person, on

More information

Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user

Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user Ad Preferences Playlist Creation Recommended Playlists

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012 COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE

More information

Beware! Identity Theft

Beware! Identity Theft STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs

More information

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE aaa BUSINESS SECURITY SECURITY FOR LIFE CHAPTER 1: WHY COMPUTER SECURITY IS IMPORTANT FOR YOUR BUSINESS No matter how big or small your business is, it s highly likely that you have some information stored

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information