click below
click below
Normal Size Small Size show me how
Internet Safety
I safe lessons 1-5
Question | Answer |
---|---|
What is a computer virus? | malicious code |
What is steganography? | A way to transmit hidden files |
A worm is similar to? | virus and Trojan horse |
Your computer can become infected with a virus from? | an attachment to an email, a floppy disk, downloaded programs, cds, and flash drives |
What are red flags that an email might contain a virus? | It has FW: and a attachment it had an attachment that ends in .exe, vsb, scr |
Who uses steganography? | Terrorists, drug dealers, hackers |
How can you decrease your chances of getting a virus? | Don't open strangers emails, emails that end in exe, vsb, scr, and emails that contain an attachment |
What can happen to people who cause viruses and worms? | may receive jail time and they may have to pay fines |
A ____________appears to be something good, but may contain viruses or worms and attacks your computer. | Trojan Horse |
Cyber Space is a ____________ | community |
a website for a casino is __________ for kids | inappropriate |
a URL is a | websites address |
You might be sent a link to a website with adult content through | email, pop ups, or a URL |
A website that is created by someone who does not like someone else. It can be because of race or religion | Hate site |
The columbine high school shooting happened on April 20th. Why did they choose this date? | It was Hitler's birthday |
If you come across a website where a student at another school has posted information that he or she is going to hurt someone at school you should: | TELL an adult, teacher, or inform the police |
An unwanted email is | Spam |
What does a URL do? | lets you go anywhere on the internet |
What are ways we communicate online? | email, instant messaging (text), bulletin board |
If you get an inappropriate email you should ___________. | delete it |
A place where you can post messages in cyber space so others may read them (like pinterest) | bulletin board |
___________information posted online is your name, number, address, etc | identifying |
You can ____________ trust a person you meet in a chat room. | never |
Someone online may trick you into believing they are your friends by ________________________ | Telling you lies, sending you gifts, sending you tickets to meet them, tell you its ok to be mad at your parents. |
_______ kids have the ability to get in trouble on the internet. | all |
Who should you talk on the internet? | only people you know in real life |
A chat room is ___________ | a place where people talk online about anything they want |
What do you do if someone threatens you online or makes you feel uncomfortable? | tell an adult |
The person in a chat room trying to find someone to trick is called: | predator |
In cyber space a person who is the victim of a predator is the __________. | prey |
What is the process a predator uses to trick you? | grooming |
What is an example of an unsafe screen name | Jana14LA |
When a person on the Internet wants to meet you they will pretend to have the same: | interests as you |
For someone to take advantage of you, he or she will: | gain your trust, threaten you, tell you to keep your relationship a secret |
Why would someone on the internet send you inappropriate pictures | to break down barriers |
a popular place for bad people to go to find a kid or teen to trick is called: | A chat room for teens (snap chat, instagram, fb, etc) |
People on the internet can get information about you : | from your profile, your pictures, your chats or messages poste b/t you and your friends. |
Coping and pasting information from the internet into a paper is called: | Plagiarism |
When writing a paper for school, it is OK to: | reference or quote information you find on the internet because its free |
What does copyright protect? | a person's original work movies music books |
If someone wants to sell you a CD that is not the original, that CD is a: | counterfeit |
Do you have the right to make a copy of music or a software CD and give it to your friends? | no |
Why is it better it better to have a paid service to download music like iTunes? | you get music from the original owner, strangers don't have access to your files, you are less likely to get a virus on your computer |
What right do you have when you buy a CD? | listen to it, give it away, and sell it |