DIGITAL CITIZENSHIP QUIZ



Similar documents
STOP. THINK. CONNECT. Online Safety Quiz

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:


EADS up. stop think connect

Cyber Safety For Parents

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

HEADS up. stop think connect

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.

How To Avoid The Identity Theft Predators

BE SAFE ONLINE: Lesson Plan

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety. Parents Evening

Introduction. Tips for Success Etiquette and Safety. Page 1

A Publication of the GCPS Information Management Division

Class 3: Identify Tricks and Scams Online

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

E-Safety Issues and Online Safety

Internet Safety: Pitfalls & Dangers

Understand What s Going On

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

F-Secure Anti-Virus for Mac 2015

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

HOW TO STAY SAFE. Smartphones

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

Too Good for Drugs Grade 5

Today s mobile ecosystem means shared responsibility

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Internet Safety Plan for Your Family

Digital Citizenship Lesson Plan

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Cyber Security Awareness. Internet Safety Intro.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Teens, Online Stranger Contact and Cyberbullying What the research is telling us

Common Facebook issues

Staying Safe.....on social media and online

SENIORS ONLINE SECURITY

Activities for Protecting Your Identity and Computer for Middle and High School Students

e-safety for Parents

e-rate toolkit Cyberbullying: Crossing the Line

A: We really embarrassed ourselves last night at that business function.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Case study: What the? Online scams and identity theft

Practical guide for secure Christmas shopping. Navid

F-Secure Anti-Virus for Mac. User's Guide

Digital Citizenship Lesson

(A trading company s staff, Ken, is opening the office s door)

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at

i-safe America Internet Safety Tips for Parents

Office of the Privacy Commissioner of Canada. Identity Theft and You

Cyber safety Parent Easy Guide 63

Digital Safety and Privacy

Shop Online with Confidence

What is Safeguarding?

Social Networking Sites A Predator s Playground?

National Cybersecurity Awareness Campaign. Kids Presentation

How To Behave At A School

Practical tips for a. Safe Christmas

Parenting. Coping with A Parent s Problem Drug or Alcohol Use. For children. aged 6 to 12

Protect yourself online

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Online Safety for Middle and High School

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

SOCIAL NETWORKING SITES

General Security Best Practices

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

Desktop and Laptop Security Policy

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

HIV/AIDS: Influence of Alcohol & Other Drugs Grade 7, Lesson #22

Keeping you and your computer safe in the digital world.

SUPERIOR NORTH CATHOLIC District School Board ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS

Online Security Tips

Private Today, Public Tomorrow

Cyber Security. Securing Your Mobile and Online Banking Transactions

Voir Dire in Domestic Violence Cases

Cyberbullying. Welcome!

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Cyber Security. Keeping the internet safe for you and your family

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Standard 9: The student will identify and explain consumer fraud and identity theft.

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007

Related KidsHealth Links

E-Safety and Acceptable Use Policy

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Protecting Yourself from Identity Theft

Teen Online & Wireless Safety Survey

Question Bank June 2015 R001 Mock

Roger s Cyber Security and Compliance Mini-Guide

Small Business Guide to Monitoring your Online Reputation

Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user

Network Security. Demo: Web browser

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

Beware! Identity Theft

Code of Virginia, 1950, as amended, Sections , :1, , , and

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

Website Privacy Policy Statement

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Transcription:

1. Kelly is on Instagram and a boy she doesn t know begins to follow her and comment on her images. She should... A. Just go along with it (ignore it) B. Delete the follower C. Start a chat and get to know him 2. When you create passwords, you should make them easy to guess. 3. Popular sites are always safe from spyware, malware, and other online threats. 4. When online, you should be careful whenever approached by a new person or asked to provide personal information.

5. You receive a text or an email from a person that identifies herself as your Aunt Carol. She wants to meet you some place nearby after school. Do you: A. Tell your parents about the message and ignore it B. Ask the person a question that only Aunt Carol would know C. Arrange to go and meet her 6. You receive a funny text or an interesting chat invite on Kik that asks you to pass it on to 5 of your closest friends. A. Pass it on B. Delete the text/invitation 7. Malware is a common term used to describe a digital virus, worm, advertisement, or dangerous program that puts your computer at risk.

8. When Steven shops online, it s okay for him to enter a credit card and personal information as long as he feels like the online store is legit. 9. You and a friend just heard a new song on Pandora that you love. You could (choose all that apply): A. Find a place to buy it, even if it costs $1.29 B. Find a place to get it for free, even though you know other people pay for it C. Have a friend share their mp3 file, since that s easier D. Wait for the song to come on again later and enjoy it then

10. What is the best way to use social media? A. Limit what I share about myself B. Make sure my friends and followers are people I know in real life C. Limit what non-friends and nonfollowers can see on my profile D. All of the above 11. You posted an embarrassing photo of a friend to their social media, but you suddenly feel guilty and take it down. Your friend will never see the photo. 12. The best thing about social media is that we can say things online that we might not say in real life.

13. The pictures you post to social media in middle school can affect your reputation in the future. 14. Stealing someone s words or images from the World Wide Web is a crime. 15. Jason s new girlfriend asks for his Instagram password. He should: A. Give her the password. She s beautiful and he loves her. B. Give her the password, but change it quickly. She can t be trusted. C. Never give away his password.

16. After a fight at school, a group of 13-year-old students decide to create fake social media accounts and threaten Rachel online. She should: A. Block them from her social media B. Save any threatening messages C. Tell a parent, teacher or adult D. All of the above 17. Creating a fake Instagram account for someone you know in a class, or even for someone you don t know, is illegal.

18. When reading something on the Internet for a class assignment, I should (check all that apply): A. Evaluate the credibility, accuracy, reasonableness, and support of a website where I received the information B. Copy/paste what I find without telling anyone where I found it C. Check other websites to confirm the information is accurate D. All of the above 19. During a presidential election, the World Wide Web is buzzing with articles and sites about the candidates. I should: A. Avoid sites that are full of bias (complete hate or complete praise) B. Read everything and pass it on 20. As a middle school student, I am still considered a (choose all that apply): A. Minor B. Child C. Adult D. Citizen