Inicia sesión
Crear actividad
Tipos de actividades
Centro de ayuda
Introduce tu Game Pin
Blog
Premium
English
Español
Français
Crear actividad
Inicia sesión
Todas las actividades
Jugar Froggy Jumps
Imprimir Froggy Jumps
Cyber Safety Review (D)
Author :
Lee Chastain
1.
Plagiarism is
A
passing off others' ideas as your own
B
using others' work without giving credit
C
Both
2.
Google is not a source to give credit to, it is a ...
A
reference tool
B
search engine
C
giant game site
3.
For school projects, you should always give credit for images, music, and videos that you use but didn't create yourself.
A
True
B
False
C
Not this one!
4.
Someone who does just not sit by quietly and watch as another is being bullied
A
Bully
B
Upstander
C
Troll
5.
One person or group has a lot more power over another, frequently attempts physical or emotional harm
A
Bullying
B
Upstander
C
Troll
6.
Arguments that go back and forth, power is fairly balanced
A
Upstander
B
Identity theft
C
Conflict
7.
Someone who posts comments on websites just to make people angry
A
Troll
B
Conflict
C
Malware
8.
Cyberbullying is an example of free speech
A
True
B
False
C
Not this one!
9.
Controls on social networking sites that determine what others can see
A
copyright
B
personal identity
C
privacy settings
10.
The information about a person that exists on the Internet as a result of their online activity
A
digital footprint
B
privacy settings
C
public domain
11.
If I decide to delete something I've posted, is it gone for good?
A
Yep - it's gone!
B
Probably not - someone could've saved it
C
Not this one!
12.
About how many predators are online right now?
A
5,000
B
50,000
C
500,000
13.
The illegal use of someone else's personal information
A
public domain
B
identity theft
C
conflict
14.
Stands for malicious software; it is designed to damage the computer or collect personal information
A
flame war
B
privacy settings
C
malware
15.
The motive behind most online scams is money.
A
True
B
False
C
Not this one!
16.
A common type of Malware
A
Ransomware
B
Spyware
C
Both
17.
To help protect your school device from malware
A
only visit approved sites
B
power off device at the end of the day
C
BOTH
18.
Online predators...
A
pretend to be someone you can trust
B
will watch and wait for a long time
C
BOTH