Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Internet Safety Jeopardy Game


Published on

Internet Safety Jeopardy Game

  1. 1. Jeopardy Choose a category. You will be given the answer. You must give the correct question. Click to begin.
  2. 2. Choose a point value. Choose a point value. Click here for Final Jeopardy
  3. 3. Online Shopping Cyber- bullying Internet Scams 10 Point 20 Points 30 Points 40 Points 50 Points 10 Point 10 Point 10 Point 10 Point 20 Points 20 Points 20 Points 20 Points 30 Points 40 Points 50 Points 30 Points 30 Points 30 Points 40 Points 40 Points 40 Points 50 Points 50 Points 50 Points Words & Pictures Social Network Sites
  4. 4. What is the main downside of social network sites?
  5. 5. What you see on your monitor may not reflect what’s in the real world
  6. 6. How do dangerous criminals use social network sites?
  7. 7. They disguise their identities to target young victims.
  8. 8. What are two rules for people who blog, use chat rooms or send e-mails to online acquaintances?
  9. 9. <ul><li>Never divulge your last name </li></ul><ul><li>Never reveal your address </li></ul><ul><li>Never disclose your phone number </li></ul><ul><li>Never tell usernames and passwords </li></ul>
  10. 10. Name two rules for meeting an online acquaintance (always best not to meet)
  11. 11. <ul><li>Meet in a place with lots of people around </li></ul><ul><li>Meet during the day </li></ul><ul><li>Bring along a friend or parent, never go alone </li></ul><ul><li>If bringing a friend, always tell an adult where you’re going and when you will return </li></ul>
  12. 12. Name two social network sites
  13. 13. <ul><li>Facebook – 13 years and older </li></ul><ul><li>My Space – 13 years and older </li></ul><ul><li>Shelfari </li></ul><ul><li>Twitter </li></ul><ul><li>Classmates </li></ul><ul><li>Goodreads </li></ul>
  14. 14. What is one thing you should look for when on a checkout page?
  15. 15. “ https” or A lock icon
  16. 16. What kind of on-line merchants are generally most trustworthy?
  17. 17. A well-known retailer
  18. 18. List one thing an on-line retailer should have on its website.
  19. 19. <ul><li>Street Address </li></ul><ul><li>Phone Number </li></ul><ul><li>Clearly states return policy </li></ul>
  20. 20. In an on-line auction fraud you receive an e-mail informing you that you’ve won a great prize. You must pay for this before the “prize” is sent your way.
  21. 21. Shipping and Handling
  22. 22. How long might an on-line post last?
  23. 23. <ul><li>years, even decades </li></ul>
  24. 24. When you are “chatting” with someone online what is an immediate red flag?
  25. 25. Asking you to meet in an out of the way place.
  26. 26. What is another word used for “screen name”?
  27. 27. handle
  28. 28. Which screen name would be a safer choice? Unker.tcms thelibrarian
  29. 29. Thelibrarian- do not use partial names, schools or addresses
  30. 30. If anyone ever sends you IM or e-mails that discusses private matters that make you feel uncomfortable, immediately do this.
  31. 31. End the conversation and correspondence.
  32. 32. Why should you never give an online acquaintance your phone number?
  33. 33. They could do a reverse look up and get your address.
  34. 34. If a cyberbully sends you a serious threat, what should you do?
  35. 35. Tell an adult immediately.
  36. 36. What is a cyberbully?
  37. 37. A person who humiliates or harasses classmates through postings on blogs, website guest books, I-M’s, cell phone text messages.. Etc.
  38. 38. Why are most cyberbullies considered immature?
  39. 39. Mature persons don’t hide behind a computer.
  40. 40. Does Kentucky have a state law against cyberbullying?
  41. 41. Yes. It passed on April 15, 2008- House Bill 315.
  42. 42. Girls are twice as likely as boys to be cyberbullied. True or False?
  43. 43. True
  44. 44. What should you do if you receive a pfishing e-mail?
  45. 45. Delete it or notify the company who “supposedly” sent the message.
  46. 46. What does pfishing e-mail ask the recipient to do?
  47. 47. Immediately go to a linked website to solve the problem.
  48. 48. How do pfishing schemes normally begin?
  49. 49. With an e-mail notification that a bank or other financial institution has lost important information.
  50. 50. What do criminals who use pfishing schemes try to steal? Must name two.
  51. 51. <ul><li>Social security numbers </li></ul><ul><li>Bank account numbers </li></ul><ul><li>Passwords </li></ul><ul><li>Credit card numbers </li></ul>
  52. 52. What are two safe browsers to use when on-line shopping?
  53. 53. Internet Explorer Netscape Firefox Opera
  54. 54. Final Jeopardy Make your wager
  55. 55. In what way is the internet like a city?
  56. 56. It contains good places and dangerous places. It’s just like a big neighborhood.