Cyber Safety Assessment Review Grades 6-8. Question #1 Cyber bullies are generally quite mature in their behavior. TRUE FALSE.

Slides:



Advertisements
Similar presentations
Internet Safety and Cyber Bullying All info came from
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Internet Safety in Schools
Don’t be bullied, or be a bully.
Cyberbullying Bullying with Technology. What is Cyberbullying??? Using , instant messaging, chat rooms, or other forms of information technology.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
This week is anti-bullying week.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
e-safety and cyber bullying
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Internet Safety Awareness
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Welcome to our E-Safety
The Internet & Using it Safely! Morgan Johnson. Benefits of the Internet Plethora of information delivered quickly The internet can be helpful when creating.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Internet Safety By: Kelly Tripi. Standards 1. Facilitate and Inspire Student Learning and Creativity b. Engage students in exploring real-world issues.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Safety: 5 th Grade. The Internet What are some good things with using the Internet? What are some good things with using the Internet? What are.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Do pictures always give truthful information? Can publishing it be hurtful??
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
By Mitch Parker.  These rules are a great guide to go on when using the internet.  These rules are going to be the main rules to the internet in the.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Predator Identification Internet Safety Awareness.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
28 th January 2008 The Jitty. Why do we use the Internet? Communication Information Entertainment Escapism Attention seeking Genuinely seeking help Showcasing/promoting.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
Bullying and Harassment Andover YMCA Swim Team. What are... bullyingandharassment?
Circle of Grace 4 th Grade Mrs. Vos. Vocab. Review (3 rd grade)
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Created By Cece Chukwumah. ONLINE SAFETY viewing unsuitable content e.g. hate material, adult content, sites that endorse unhealthy behavior giving out.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety How to stay safe online.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Online Safety! By: Michelle Deng.
Appropriate Use of Technology
Cyber Bullying.
Rules To Help You Navigate the Internet Safely
Personal Safety Online
Presentation transcript:

Cyber Safety Assessment Review Grades 6-8

Question #1 Cyber bullies are generally quite mature in their behavior. TRUE FALSE

Question #1 Cyber bullies are generally quite mature in their behavior. TRUE FALSE Cyber bullying is a very juvenile act, and mature adults do not find it the least bit interesting.

Question #2 When using blogs, chat rooms, s, or instant messaging: a)Never reveal your last name b)Never reveal personal information such as address or phone number c)Never reveal your user name or password d)Never reveal any of the above information

Question #2 When using blogs, chat rooms, s, or instant messaging: a)Never reveal your last name b)Never reveal personal information such as address or phone number c)Never reveal your user name or password d)Never reveal any of the above information Any of the above information can be used to find you and perhaps hurt you in some way.

Question #3 To be safe, social networking sites: a)Require that you follow some precautions b)Should never be used c)Require you to register personal information d)None of the above

Question #3 To be safe, social networking sites: a)Require that you follow some precautions b)Should never be used c)Require you to register personal information d)None of the above Social websites such as Facebook have options to limit access to your information, and these precautions should always be taken

Question #4 Why should you never telephone an online acquaintance? a)They may think you want to be more than just friends b)Your phone number can be displayed on the caller ID c)Calling someone is just like meeting them in person d)It will raise a warning flag with the person you are calling

Question #4 Why should you never telephone an online acquaintance? a)They may think you want to be more than just friends b)Your phone number can be displayed on the caller ID c)Calling someone is just like meeting them in person d)It will raise a warning flag with the person you are calling Today’s technology can help criminals trace your location in many different ways

Question #5 An important aspect of social networking sites is that: a)They are expensive b)They are where dangerous criminals may target victims c)They are confusing to most people d)All of the above

Question #5 An important aspect of social networking sites is that: a)They are expensive b)They are where dangerous criminals may target victims c)They are confusing to most people d)All of the above If you do not take precautions to mae your information private, you are running the risk of your information falling into the hands of unscrupulous people.

Question #6 The best thing about online communication is that you can post hilarious and embarrassing pictures of your friends to share with everyone. TRUE FALSE

Question #6 The best thing about online communication is that you can post hilarious and embarrassing pictures of your friends to share with everyone. TRUE FALSE Embarrassing pictures is a cruel form of cyber bullying.

Question #7 Online predators are recognizable to you because: a)They use screen names that tell you who they really are b)They send you their picture so you know who they are c)They will tease you or insult you to gain your friendship d)None of the above

Question #7 Online predators are recognizable to you because: a)They use screen names that tell you who they really are b)They send you their picture so you know who they are c)They will tease you or insult you to gain your friendship d)None of the above You can NEVER be sure who you are talking with online.

Question #8 Online communications that offer you money or items of value are: a)A way of doing E-business on the Internet b)A good way for criminals to collect your personal information c)A good way to make some extra cash d)None of the above

Question #8 Online communications that offer you money or items of value are: a)A way of doing E-business on the Internet b)A good way for criminals to collect your personal information c)A good way to make some extra cash d)None of the above Many give-away offers online are schemes to deceive you into giving out your personal information.

Question #9 You can judge that a website is dangerous if: a)It contains illegal or immoral content b)It tries to get your address to send you junk mail c)It attempts to steal your personal information d)All of the above

Question #9 You can judge that a website is dangerous if: a)It contains illegal or immoral content b)It tries to get your address to send you junk mail c)It attempts to steal your personal information d)All of the above Do not give out personal information under any circumstances.

Question #10 What should you do if you receive a phishing ? a)Delete it immediately b)Open it to see if it is someone you might know c)Forward it to your friends d)Call the police

Question #10 What should you do if you receive a phishing ? a)Delete it immediately b)Open it to see if it is someone you might know c)Forward it to your friends d)Call the police Do not open this type of because it can harm your computer

Question #11 What are is a device that can be used to cyber bully others? a)Cell phones b)Computers c)Internet-enabled gaming consoles d)Digital cameras e)All of the above

Question #11 What are is a device that can be used to cyber bully others? a)Cell phones b)Computers c)Internet-enabled gaming consoles d)Digital cameras e)All of the above All technology has the capability to be used to harass, tease, hurt, or embarrass others.

Question #12 If you give out your phone number online: a)You may start receiving harassing phone calls b)A criminal can get your address easily c)You are putting yourself and your family in real danger d)All of the above

Question #12 If you give out your phone number online: a)You may start receiving harassing phone calls b)A criminal can get your address easily c)You are putting yourself and your family in real danger d)All of the above Your phone number is personal, and you should never put it in writing online.

Question #13 By posting pictures of yourself on a social networking site, website, or blog or ing a picture to a person you meet online or text in an IM session, you may be putting yourself in grave danger. TRUE FALSE

Question #13 By posting pictures of yourself on a social networking site, website, or blog or ing a picture to a person you meet online or text in an IM session, you may be putting yourself in grave danger. TRUE FALSE You can never be sure who you are communicating with online. Do not identify yourself by sending your picture.

Question #14 When using or file-sharing to swap music or files, be aware that there is real danger in doing so because: a)Many nasty viruses can be transferred to your computer b)Some files you receive will be incomplete c)Opening s let other people have access to your computer d)Swapping all music is against the law

Question #14 When using or file-sharing to swap music or files, be aware that there is real danger in doing so because: a)Many nasty viruses can be transferred to your computer b)Some files you receive will be incomplete c)Opening s let other people have access to your computer d)Swapping all music is against the law Although not all music is copyrighted, music files often contain viruses that can shut down your computer.

Question #15 A cyber bully is a person who creates blogs, websites, s, cell phone messages, or pictures that spread lies, transmit threats, or other harmful or hurtful communication. TRUE FALSE

Question #15 A cyber bully is a person who creates blogs, websites, s, cell phone messages, or pictures that spread lies, transmit threats, or other harmful or hurtful communication. TRUE FALSE Cyber bullying is not only hurtful, it is illegal!

Question #16 What should you do if someone send you an IM that makes you feel uncomfortable? a)Write them back and tell them they are making you feel uncomfortable b)Disguise your true identity and tell them off c)End the conversation immediately d)Change the subject

Question #16 What should you do if someone send you an IM that makes you feel uncomfortable? a)Write them back and tell them they are making you feel uncomfortable b)Disguise your true identity and tell them off c)End the conversation immediately d)Change the subject End the conversation and tell a trusted adult if it happens again.