Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Safety Assessment Review Grades 9-12. Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE.

Similar presentations


Presentation on theme: "Cyber Safety Assessment Review Grades 9-12. Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE."— Presentation transcript:

1 Cyber Safety Assessment Review Grades 9-12

2 Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE

3 Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE All forms of electronic communication that harasses, threatens, or embarrasses you is considered cyber bullying.

4 Question #2 Violating copyright laws is: a)A Federal offense b)Against school policy c)Morally wrong d)All of the above

5 Question #2 Violating copyright laws is: a)A Federal offense b)Against school policy c)Morally wrong d)All of the above Copyright laws protect the rights of ownership and must be followed at all times.

6 Question #3 When you receive an offering an opportunity to win fabulous prizes, you should: a)Sign up – you love fabulous prizes b)Sign up – and then forward it to your friends c)Leave your site immediately d)Delete the – it is most likely a scam

7 Question #3 When you receive an offering an opportunity to win fabulous prizes, you should: a)Sign up – you love fabulous prizes b)Sign up – and then forward it to your friends c)Leave your site immediately d)Delete the – it is most likely a scam Internet scams are numerous and tricky. Dont be a victim of this criminal deception.

8 Question #4 Online dating is dangerous because: a)You can never be sure who you are talking to online b)The picture that is posted of the person might be a total lie c)It might be a trick to lure you to a meeting d)All of the above

9 Question #4 Online dating is dangerous because: a)You can never be sure who you are talking to online b)The picture that is posted of the person might be a total lie c)It might be a trick to lure you to a meeting d)All of the above Dating someone online is dangerous because you do not know what intentions the person you meet online has, or even if they are who they say they are.

10 Question #5 When using blogs, chat rooms, , or instant messaging: a)Never reveal your last name b)Never reveal personal information such as address or phone number c)Never reveal your user name or password d)Never reveal any of the above information

11 Question #5 When using blogs, chat rooms, , or instant messaging: a)Never reveal your last name b)Never reveal personal information such as address or phone number c)Never reveal your user name or password d)Never reveal any of the above information Any personal information you may reveal online can be used to find you, harass you, and/or embarrass you. Be careful!

12 Question #6 Using a cell phone to send or receive text messages is very similar to using or instant messaging and some of the same safety rules apply. TRUE FALSE

13 Question #6 Using a cell phone to send or receive text messages is very similar to using or instant messaging and some of the same safety rules apply. TRUE FALSE Cell phones and text messaging have the same important safety rules that online chat rooms and social media have.

14 Question #7 If someone online is making you feel uncomfortable: a)Confront them online and tell them how you feel b)Try to find out information about the person you are uneasy about c)Leave the Internet site immediately and tell someone about it d)Immediately change the subject to one that makes you feel better

15 Question #7 If someone online is making you feel uncomfortable: a)Confront them online and tell them how you feel b)Try to find out information about the person you are uneasy about c)Leave the Internet site immediately and tell someone about it d)Immediately change the subject to one that makes you feel better Tell a trusted adult about the occurrence and block the person from sending you messages in the future

16 Question #8 When posting photos online, the most important thing to remember is: a)Your friends and family will appreciate your photos b)You must always tag each photo with your name c)Use only the most flattering photos available d)Any photos you can post can then be used without your permission

17 Question #8 When posting photos online, the most important thing to remember is: a)Your friends and family will appreciate your photos b)You must always tag each photo with your name c)Use only the most flattering photos available d)Any photos you can post can then be used without your permission Once you post a photo, you lose control of who has it and how it is being used

18 Question #9 You can usually trust the information you find on a website without evaluating it. TRUE FALSE

19 Question #9 You can usually trust the information you find on a website without evaluating it. TRUE FALSE Anyone can post information online, so be sure to check out facts in several places before considering it to be unbiased and/or true.

20 Question #10 Which of the following would be the most secure password for an online sale? a)computer b)$trawb3rry c) d)football37

21 Question #10 Which of the following would be the most secure password for an online sale? a)computer b)$trawb3rry c) d)football37 Passwords should contain letters, numbers, and symbols.

22 Question #11 Violating copyright laws is: a)Illegal b)OK because no one enforces copyright laws c)OK because everyone does it d)All of the above

23 Question #11 Violating copyright laws is: a)Illegal b)OK because no one enforces copyright laws c)OK because everyone does it d)All of the above Copyright laws protect original music, art, literature, ideas, websites, images, logos, and lots of other things. Without copyright protection, no one would publish their work.

24 Question #12 Cyber bullying victims tend to be harassed by: a)A stranger who is much older than them b)A stranger who is much younger than them c)Someone they know from school d)A relative e)None of the above

25 Question #12 Cyber bullying victims tend to be harassed by: a)A stranger who is much older than them b)A stranger who is much younger than them c)Someone they know from school d)A relative e)None of the above Victims of cyber bullying are usually harassed by people they know from their school.

26 Question #13 If you find untrue information about yourself online, take appropriate steps to have it removed immediately. TRUE FALSE

27 Question #13 If you find untrue information about yourself online, take appropriate steps to have it removed immediately. TRUE FALSE False identity information could jeopardize you in the future, so you must take all possible steps to remove untrue data about yourself as soon as you recognize it online.

28 Question #14 When file-sharing programs to swap files and music: a)Always save your files to your computer that you receive from others b)You will almost always receive files or music you do not want c)You are violating copyright laws 100% of the time d)You are opening your computer up to receiving nasty viruses.

29 Question #14 When file-sharing programs to swap files and music: a)Always save your files to your computer that you receive from others b)You will almost always receive files or music you do not want c)You are violating copyright laws 100% of the time d)You are opening your computer up to receiving nasty viruses. Even music files that are not copyright protected and legal to swap can contain viruses that could harm your computer.

30 Question #15 attachments are: a)Safe for your computer b)Can contain viruses that could harm your computer c)Not a good way to send files to friends d)Only good for sending images

31 Question #15 attachments are: a)Safe for your computer b)Can contain viruses that could harm your computer c)Not a good way to send files to friends d)Only good for sending images Opening s from senders you do not recognize could cause huge problems fro your computer system and might put your information in jeopardy of being stolen.

32 Question #16 When reading your you should always: a)Carefully read all mail before you delete it b)Scan the from line and do not open any mail from people you dont know c)Save all attachments to your computer before you open them d)Forward all scam mail to your friends

33 Question #16 When reading your you should always: a)Carefully read all mail before you delete it b)Scan the from line and do not open any mail from people you dont know c)Save all attachments to your computer before you open them d)Forward all scam mail to your friends Opening s from senders you do not know will endanger your computer to viruses that could damage your information.

34 Question #17 Laptops often have built in cameras that are the size of a pinhole. TRUE FALSE

35 Question #17 Laptops often have built in cameras that are the size of a pinhole. TRUE FALSE Covering up your computer camera lens is a good idea unless you are absolutely certain you know the person you are communicating with.

36 Question #18 You should check for a secure Internet connection when: a)You are posting to a social networking site b)You are buying something online using a credit card or PayPal account c)You are searching for copyright free resources d)You are ing a friend

37 Question #18 You should check for a secure Internet connection when: a)You are posting to a social networking site b)You are buying something online using a credit card or PayPal account c)You are searching for copyright free resources d)You are ing a friend Looking for the secure Internet symbols is the only safe way to upload financial information online.

38 Question #19 Always unplug or cover your webcam when not in use. TRUE FALSE

39 Question #19 Always unplug or cover your webcam when not in use. TRUE FALSE It is a good idea to protect your privacy by disconnecting or covering your webcam when it is not in use.

40 Question #20 How do you know that a web site has a secure connection? a)There is a lock in the top right or bottom right of your web browser b)There is a red flashing pop-up that informs you c)The web address looks to be legitimate d)It is impossible to know

41 Question #20 How do you know that a web site has a secure connection? a)There is a lock in the top right or bottom right of your web browser b)There is a red flashing pop-up that informs you c)The web address looks to be legitimate d)It is impossible to know You should always look for the locked lock on the web browser page to make sure the site is secure before giving any personal information concerning finances.


Download ppt "Cyber Safety Assessment Review Grades 9-12. Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE."

Similar presentations


Ads by Google