Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Internet Safety

I safe lessons 1-5

QuestionAnswer
What is a computer virus? malicious code
What is steganography? A way to transmit hidden files
A worm is similar to? virus and Trojan horse
Your computer can become infected with a virus from? an attachment to an email, a floppy disk, downloaded programs, cds, and flash drives
What are red flags that an email might contain a virus? It has FW: and a attachment it had an attachment that ends in .exe, vsb, scr
Who uses steganography? Terrorists, drug dealers, hackers
How can you decrease your chances of getting a virus? Don't open strangers emails, emails that end in exe, vsb, scr, and emails that contain an attachment
What can happen to people who cause viruses and worms? may receive jail time and they may have to pay fines
A ____________appears to be something good, but may contain viruses or worms and attacks your computer. Trojan Horse
Cyber Space is a ____________ community
a website for a casino is __________ for kids inappropriate
a URL is a websites address
You might be sent a link to a website with adult content through email, pop ups, or a URL
A website that is created by someone who does not like someone else. It can be because of race or religion Hate site
The columbine high school shooting happened on April 20th. Why did they choose this date? It was Hitler's birthday
If you come across a website where a student at another school has posted information that he or she is going to hurt someone at school you should: TELL an adult, teacher, or inform the police
An unwanted email is Spam
What does a URL do? lets you go anywhere on the internet
What are ways we communicate online? email, instant messaging (text), bulletin board
If you get an inappropriate email you should ___________. delete it
A place where you can post messages in cyber space so others may read them (like pinterest) bulletin board
___________information posted online is your name, number, address, etc identifying
You can ____________ trust a person you meet in a chat room. never
Someone online may trick you into believing they are your friends by ________________________ Telling you lies, sending you gifts, sending you tickets to meet them, tell you its ok to be mad at your parents.
_______ kids have the ability to get in trouble on the internet. all
Who should you talk on the internet? only people you know in real life
A chat room is ___________ a place where people talk online about anything they want
What do you do if someone threatens you online or makes you feel uncomfortable? tell an adult
The person in a chat room trying to find someone to trick is called: predator
In cyber space a person who is the victim of a predator is the __________. prey
What is the process a predator uses to trick you? grooming
What is an example of an unsafe screen name Jana14LA
When a person on the Internet wants to meet you they will pretend to have the same: interests as you
For someone to take advantage of you, he or she will: gain your trust, threaten you, tell you to keep your relationship a secret
Why would someone on the internet send you inappropriate pictures to break down barriers
a popular place for bad people to go to find a kid or teen to trick is called: A chat room for teens (snap chat, instagram, fb, etc)
People on the internet can get information about you : from your profile, your pictures, your chats or messages poste b/t you and your friends.
Coping and pasting information from the internet into a paper is called: Plagiarism
When writing a paper for school, it is OK to: reference or quote information you find on the internet because its free
What does copyright protect? a person's original work movies music books
If someone wants to sell you a CD that is not the original, that CD is a: counterfeit
Do you have the right to make a copy of music or a software CD and give it to your friends? no
Why is it better it better to have a paid service to download music like iTunes? you get music from the original owner, strangers don't have access to your files, you are less likely to get a virus on your computer
What right do you have when you buy a CD? listen to it, give it away, and sell it
Created by: amarino19
Popular Academic Vocabulary sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards