5 Written questions
5 Matching questions
- Social Security Number
- Mal Ware
- a A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
- b A secret series of characters that enables a user to access a file, computer, or program.
- c Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
- d Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
- e Defines the URL of a "secure" site.
5 Multiple choice questions
- A software program capable of reproducing itself that can spread from one computer to the next over a network.
- Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
- Program placed on a computer without the user's knowledge that secretly collects information about the user.
- A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
- "Gender neutral" names that can be used instead of real names to increase your privacy online. For example, "Pat" can be both a girl's name or a boy's name; it is "gender neutral".
5 True/False questions
Flaming → Typing an entire sentence in "all caps."
Privacy Settings → A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
Scouts → Business and college employees who frequently look at social networking sites (like Facebook) to assess the typical "behaviors" of their applicants.
Predator → An imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.
www.cybertipline.org → Bullying that takes place by email, instant messaging, text messages o.r web sites