Icon Crear Crear
Obtener Plan Académico
Obtener Plan Académico
Obtener Plan Académico

Cyber Safety Review (D)

Froggy Jumps

(3)
Malware, Predators, and Cyber Bullying

Descarga la versión para jugar en papel

726 veces realizada

Creada por

Estados Unidos
Este juego es una version de

Top 10 resultados

  1. 1
    02:03
    tiempo
    100
    puntuacion
  2. 2
    bruh
    bruh
    02:08
    tiempo
    100
    puntuacion
  3. 3
    08:11
    tiempo
    100
    puntuacion
  4. 4
    monkey
    monkey
    03:09
    tiempo
    97
    puntuacion
  5. 5
    JJDAPOO💩💩💩💩
    JJDAPOO💩💩💩💩
    03:07
    tiempo
    63
    puntuacion
  6. 6
    tony
    tony
    01:11
    tiempo
    17
    puntuacion
  7. 7
    03:51
    tiempo
    17
    puntuacion
¿Quieres aparecer en el Top 10 de este juego? para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Froggy Jumps

Cyber Safety Review (D)Versión en línea

Malware, Predators, and Cyber Bullying

por Lee Chastain
1

Plagiarism is

2

Google is not a source to give credit to, it is a ...

3

For school projects, you should always give credit for images, music, and videos that you use but didn't create yourself.

4

Someone who does just not sit by quietly and watch as another is being bullied

5

One person or group has a lot more power over another, frequently attempts physical or emotional harm

6

Arguments that go back and forth, power is fairly balanced

7

Someone who posts comments on websites just to make people angry

8

Cyberbullying is an example of free speech

9

Controls on social networking sites that determine what others can see

10

The information about a person that exists on the Internet as a result of their online activity

11

If I decide to delete something I've posted, is it gone for good?

12

About how many predators are online right now?

13

The illegal use of someone else's personal information

14

Stands for malicious software; it is designed to damage the computer or collect personal information

15

The motive behind most online scams is money.

16

A common type of Malware

17

To help protect your school device from malware

18

Online predators...

educaplay suscripción