Internet Safety Jeopardy Game

  • 5,297 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • If I can't download this it's useless.
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
5,297
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
1
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Jeopardy Choose a category. You will be given the answer. You must give the correct question. Click to begin.
  • 2. Choose a point value. Choose a point value. Click here for Final Jeopardy
  • 3. Online Shopping Cyber- bullying Internet Scams 10 Point 20 Points 30 Points 40 Points 50 Points 10 Point 10 Point 10 Point 10 Point 20 Points 20 Points 20 Points 20 Points 30 Points 40 Points 50 Points 30 Points 30 Points 30 Points 40 Points 40 Points 40 Points 50 Points 50 Points 50 Points Words & Pictures Social Network Sites
  • 4. What is the main downside of social network sites?
  • 5. What you see on your monitor may not reflect what’s in the real world
  • 6. How do dangerous criminals use social network sites?
  • 7. They disguise their identities to target young victims.
  • 8. What are two rules for people who blog, use chat rooms or send e-mails to online acquaintances?
  • 9.
    • Never divulge your last name
    • Never reveal your address
    • Never disclose your phone number
    • Never tell usernames and passwords
  • 10. Name two rules for meeting an online acquaintance (always best not to meet)
  • 11.
    • Meet in a place with lots of people around
    • Meet during the day
    • Bring along a friend or parent, never go alone
    • If bringing a friend, always tell an adult where you’re going and when you will return
  • 12. Name two social network sites
  • 13.
    • Facebook – 13 years and older
    • My Space – 13 years and older
    • Shelfari
    • Twitter
    • Classmates
    • Goodreads
  • 14. What is one thing you should look for when on a checkout page?
  • 15. “ https” or A lock icon
  • 16. What kind of on-line merchants are generally most trustworthy?
  • 17. A well-known retailer
  • 18. List one thing an on-line retailer should have on its website.
  • 19.
    • Street Address
    • Phone Number
    • Clearly states return policy
  • 20. In an on-line auction fraud you receive an e-mail informing you that you’ve won a great prize. You must pay for this before the “prize” is sent your way.
  • 21. Shipping and Handling
  • 22. How long might an on-line post last?
  • 23.
    • years, even decades
  • 24. When you are “chatting” with someone online what is an immediate red flag?
  • 25. Asking you to meet in an out of the way place.
  • 26. What is another word used for “screen name”?
  • 27. handle
  • 28. Which screen name would be a safer choice? Unker.tcms thelibrarian
  • 29. Thelibrarian- do not use partial names, schools or addresses
  • 30. If anyone ever sends you IM or e-mails that discusses private matters that make you feel uncomfortable, immediately do this.
  • 31. End the conversation and correspondence.
  • 32. Why should you never give an online acquaintance your phone number?
  • 33. They could do a reverse look up and get your address.
  • 34. If a cyberbully sends you a serious threat, what should you do?
  • 35. Tell an adult immediately.
  • 36. What is a cyberbully?
  • 37. A person who humiliates or harasses classmates through postings on blogs, website guest books, I-M’s, cell phone text messages.. Etc.
  • 38. Why are most cyberbullies considered immature?
  • 39. Mature persons don’t hide behind a computer.
  • 40. Does Kentucky have a state law against cyberbullying?
  • 41. Yes. It passed on April 15, 2008- House Bill 315.
  • 42. Girls are twice as likely as boys to be cyberbullied. True or False?
  • 43. True
  • 44. What should you do if you receive a pfishing e-mail?
  • 45. Delete it or notify the company who “supposedly” sent the message.
  • 46. What does pfishing e-mail ask the recipient to do?
  • 47. Immediately go to a linked website to solve the problem.
  • 48. How do pfishing schemes normally begin?
  • 49. With an e-mail notification that a bank or other financial institution has lost important information.
  • 50. What do criminals who use pfishing schemes try to steal? Must name two.
  • 51.
    • Social security numbers
    • Bank account numbers
    • Passwords
    • Credit card numbers
  • 52. What are two safe browsers to use when on-line shopping?
  • 53. Internet Explorer Netscape Firefox Opera
  • 54. Final Jeopardy Make your wager
  • 55. In what way is the internet like a city?
  • 56. It contains good places and dangerous places. It’s just like a big neighborhood.