click below
click below
Normal Size Small Size show me how
Internet Safety
I safe lessons 1-5
| Question | Answer |
|---|---|
| What is a computer virus? | malicious code |
| What is steganography? | A way to transmit hidden files |
| A worm is similar to? | virus and Trojan horse |
| Your computer can become infected with a virus from? | an attachment to an email, a floppy disk, downloaded programs, cds, and flash drives |
| What are red flags that an email might contain a virus? | It has FW: and a attachment it had an attachment that ends in .exe, vsb, scr |
| Who uses steganography? | Terrorists, drug dealers, hackers |
| How can you decrease your chances of getting a virus? | Don't open strangers emails, emails that end in exe, vsb, scr, and emails that contain an attachment |
| What can happen to people who cause viruses and worms? | may receive jail time and they may have to pay fines |
| A ____________appears to be something good, but may contain viruses or worms and attacks your computer. | Trojan Horse |
| Cyber Space is a ____________ | community |
| a website for a casino is __________ for kids | inappropriate |
| a URL is a | websites address |
| You might be sent a link to a website with adult content through | email, pop ups, or a URL |
| A website that is created by someone who does not like someone else. It can be because of race or religion | Hate site |
| The columbine high school shooting happened on April 20th. Why did they choose this date? | It was Hitler's birthday |
| If you come across a website where a student at another school has posted information that he or she is going to hurt someone at school you should: | TELL an adult, teacher, or inform the police |
| An unwanted email is | Spam |
| What does a URL do? | lets you go anywhere on the internet |
| What are ways we communicate online? | email, instant messaging (text), bulletin board |
| If you get an inappropriate email you should ___________. | delete it |
| A place where you can post messages in cyber space so others may read them (like pinterest) | bulletin board |
| ___________information posted online is your name, number, address, etc | identifying |
| You can ____________ trust a person you meet in a chat room. | never |
| Someone online may trick you into believing they are your friends by ________________________ | Telling you lies, sending you gifts, sending you tickets to meet them, tell you its ok to be mad at your parents. |
| _______ kids have the ability to get in trouble on the internet. | all |
| Who should you talk on the internet? | only people you know in real life |
| A chat room is ___________ | a place where people talk online about anything they want |
| What do you do if someone threatens you online or makes you feel uncomfortable? | tell an adult |
| The person in a chat room trying to find someone to trick is called: | predator |
| In cyber space a person who is the victim of a predator is the __________. | prey |
| What is the process a predator uses to trick you? | grooming |
| What is an example of an unsafe screen name | Jana14LA |
| When a person on the Internet wants to meet you they will pretend to have the same: | interests as you |
| For someone to take advantage of you, he or she will: | gain your trust, threaten you, tell you to keep your relationship a secret |
| Why would someone on the internet send you inappropriate pictures | to break down barriers |
| a popular place for bad people to go to find a kid or teen to trick is called: | A chat room for teens (snap chat, instagram, fb, etc) |
| People on the internet can get information about you : | from your profile, your pictures, your chats or messages poste b/t you and your friends. |
| Coping and pasting information from the internet into a paper is called: | Plagiarism |
| When writing a paper for school, it is OK to: | reference or quote information you find on the internet because its free |
| What does copyright protect? | a person's original work movies music books |
| If someone wants to sell you a CD that is not the original, that CD is a: | counterfeit |
| Do you have the right to make a copy of music or a software CD and give it to your friends? | no |
| Why is it better it better to have a paid service to download music like iTunes? | you get music from the original owner, strangers don't have access to your files, you are less likely to get a virus on your computer |
| What right do you have when you buy a CD? | listen to it, give it away, and sell it |