Internet Safety Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| What is a computer virus? | malicious code |
| What is steganography? | A way to transmit hidden files |
| A worm is similar to? | virus and Trojan horse |
| Your computer can become infected with a virus from? | an attachment to an email, a floppy disk, downloaded programs, cds, and flash drives |
| What are red flags that an email might contain a virus? | It has FW: and a attachment it had an attachment that ends in .exe, vsb, scr |
| Who uses steganography? | Terrorists, drug dealers, hackers |
| How can you decrease your chances of getting a virus? | Don't open strangers emails, emails that end in exe, vsb, scr, and emails that contain an attachment |
| What can happen to people who cause viruses and worms? | may receive jail time and they may have to pay fines |
| A ____________appears to be something good, but may contain viruses or worms and attacks your computer. | Trojan Horse |
| Cyber Space is a ____________ | community |
| a website for a casino is __________ for kids | inappropriate |
| a URL is a | websites address |
| You might be sent a link to a website with adult content through | email, pop ups, or a URL |
| A website that is created by someone who does not like someone else. It can be because of race or religion | Hate site |
| The columbine high school shooting happened on April 20th. Why did they choose this date? | It was Hitler's birthday |
| If you come across a website where a student at another school has posted information that he or she is going to hurt someone at school you should: | TELL an adult, teacher, or inform the police |
| An unwanted email is | Spam |
| What does a URL do? | lets you go anywhere on the internet |
| What are ways we communicate online? | email, instant messaging (text), bulletin board |
| If you get an inappropriate email you should ___________. | delete it |
| A place where you can post messages in cyber space so others may read them (like pinterest) | bulletin board |
| ___________information posted online is your name, number, address, etc | identifying |
| You can ____________ trust a person you meet in a chat room. | never |
| Someone online may trick you into believing they are your friends by ________________________ | Telling you lies, sending you gifts, sending you tickets to meet them, tell you its ok to be mad at your parents. |
| _______ kids have the ability to get in trouble on the internet. | all |
| Who should you talk on the internet? | only people you know in real life |
| A chat room is ___________ | a place where people talk online about anything they want |
| What do you do if someone threatens you online or makes you feel uncomfortable? | tell an adult |
| The person in a chat room trying to find someone to trick is called: | predator |
| In cyber space a person who is the victim of a predator is the __________. | prey |
| What is the process a predator uses to trick you? | grooming |
| What is an example of an unsafe screen name | Jana14LA |
| When a person on the Internet wants to meet you they will pretend to have the same: | interests as you |
| For someone to take advantage of you, he or she will: | gain your trust, threaten you, tell you to keep your relationship a secret |
| Why would someone on the internet send you inappropriate pictures | to break down barriers |
| a popular place for bad people to go to find a kid or teen to trick is called: | A chat room for teens (snap chat, instagram, fb, etc) |
| People on the internet can get information about you : | from your profile, your pictures, your chats or messages poste b/t you and your friends. |
| Coping and pasting information from the internet into a paper is called: | Plagiarism |
| When writing a paper for school, it is OK to: | reference or quote information you find on the internet because its free |
| What does copyright protect? | a person's original work movies music books |
| If someone wants to sell you a CD that is not the original, that CD is a: | counterfeit |
| Do you have the right to make a copy of music or a software CD and give it to your friends? | no |
| Why is it better it better to have a paid service to download music like iTunes? | you get music from the original owner, strangers don't have access to your files, you are less likely to get a virus on your computer |
| What right do you have when you buy a CD? | listen to it, give it away, and sell it |
Created by:
amarino19
Popular Academic Vocabulary sets