5 Written questions
5 Matching questions
- Cyber Bullying
- Privacy Settings
- a Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.
- b An imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.
- c A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
- d The ability to control access of information about oneself.
- e Bullying that takes place by email, instant messaging, text messages o.r web sites
5 Multiple choice questions
- A secret series of characters that enables a user to access a file, computer, or program.
- Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
- A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
- A confidential website where you can report inappropriate behavior or concerns.
- Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
5 True/False questions
Flaming → The act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.
Shouting → Typing an entire sentence in "all caps."
Digital Footprint → Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
Worm → A software program capable of reproducing itself that can spread from one computer to the next over a network.
Spyware → Malicious software designed to infiltrate or damage a computer system without the user's informed consent.