Download presentation
Presentation is loading. Please wait.
Published byMatthew Johns Modified over 9 years ago
3
If one of your online friendships is following the grooming process, what should you do? Meet them Tell a family member Stay friends
4
INCORRECT!!! Try Again
5
CORRECT Next Question
6
What is meant by Web 2.0? Software Web services such as blogs Web services such as blogs Hardware
7
INCORRECT!!! Try Again
8
CORRECT Next Question
9
What risks does Social Networking pose? Everyone can see posts All of the above Your information can be used against you Your information can be used against you “Grooming” victims
10
INCORRECT!!! Try Again
11
CORRECT Next Question
12
Is the internet anonymous? Yes No
13
INCORRECT!!! Try Again
14
CORRECT Next Question
15
How should you cope with cyberbullying? Ignore it Tell someone Delete messages
16
INCORRECT!!! Try Again
17
CORRECT Next Question
18
Look at this chat name “missy18teen”. What does it tell a online predator? All of the above Name and gender Possible age
19
INCORRECT!!! Try Again
20
CORRECT Next Question
21
Are private chats always private? Maybe No Yes
22
INCORRECT!!! Try Again
23
CORRECT Next Question
24
What is a digital footprint? Making a print of your foot in the sand Making a print of your foot in the sand Bytes of information Kicking your computer with your foot Kicking your computer with your foot
25
INCORRECT!!! Try Again
26
CORRECT Next Question
27
People that you meet online are a ________? Pen Pal Stranger Online Buddy Computer geek
28
INCORRECT!!! Try Again
29
CORRECT Next Question
30
Is texting hurtful words and inappropriate pictures considered bullying? Maybe Yes No Sometimes
31
INCORRECT!!! Try Again
32
CORRECT Next Question
33
What are the two types of footprints? Large and small Passive and active Online and offline
34
INCORRECT!!! Try Again
35
CORRECT Next Question
36
Should a username include things like a name, city, street, etc.? Maybe No Yes
37
INCORRECT!!! Try Again
38
CORRECT Next Question
39
Does the chat name “sue15lady” reveal too much information? No Yes Maybe
40
INCORRECT!!! Try Again
41
CORRECT Next Question
42
There are levels of information you learned about; 90 180, and 360. What level should you stay in? 180 90 360 Any of them are fine
43
INCORRECT!!! Try Again
44
CORRECT Next Question
45
When you meet someone online, is it okay to meet them in person? After 2 months No Yes
46
INCORRECT!!! Try Again
47
CORRECT Next Question
48
Is Cyber Bullying ok because it is online? Once a month No Yes Sometimes
49
INCORRECT!!! Try Again
50
CORRECT Next Question
51
Internet predators use the _________ process to establish an online friendship. Friend Grooming Trust Buddy
52
INCORRECT!!! Try Again
53
CORRECT Next Question
54
To keep from being bullied online you should? Type in all CAPS Use netiquette Call people names All of the above
55
INCORRECT!!! Try Again
56
CORRECT Next Question
57
There are no risks involved with using Web 2.0 technologies? Yes No Maybe
58
INCORRECT!!! Try Again
59
CORRECT Next Question
60
When you use a blog, an online predator cannot acquire information about you. Yes No
61
INCORRECT!!! Try Again
62
CORRECT Next Question
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.