220 likes | 365 Views
Privacy Rules!. 1. What type of personal information is it okay to share with someone you don’t know?. A. Your name and telephone number only B. Your email address only, if it doesn’t include your name C. Minor details like the name of your school, and what your parents do for a living.
E N D
1. What type of personal information is it okay to share with someone you don’t know? A. Your name and telephone number only B. Your email address only, if it doesn’t include your name C. Minor details like the name of your school, and what your parents do for a living. D. You should never share ANY personal information with someone you don’t know.
1. What type of personal information is it okay to share with someone you don’t know? D. You should never share ANY personal information with someone you don’t know.
2. Which of these is an example of spam? A. A downloadable game that contains hidden software. B. An email message advertising a product that you don’t want C. A harmful program that destroys your hard drive D. An email joke forwarded to you by your Aunt Gladys.
2. Which of these is an example of spam? • B. An email message advertising a product that you don’t want
3. Which of the following is a fact about malware? A. It can cause your computer to run slower B. It’s a sneaky, mean way for people to advertise C. The government should make it illegal as soon as possible D. It’s totally useless- no one buys products advertised by malware.
3. Which of the following is a fact about malware? A. It can cause your computer to run slower
4. What should you do if you receive a suspicious looking email with an attachment? A. Open the attachment to see if it is from a friend B. Send a message back to the sender, asking him to remove you from his email list C. Forward the attachment to a friend who knows a lot about computers D. Delete it immediately
4. What should you do if you receive a suspicious looking email with an attachment? D. Delete it immediately
5. Why would an identity thief want to steal your information? A. To imitate you in chat rooms and on message boards B. To access your bank accounts, credit cards and other financial resources C. To send you emails advertising stuff you’d never want D. To send viruses out from your email account
5. Why would an identity thief want to steal your information? B. To access your bank accounts, credit cards and other financial resources
6. What type of information would be appropriate to post on a personal website? A. Comments about your teachers dressing habits B. Digital photos you don’t want your parents to see C. A review of a restaurant you visited D. Gossip about your classmates
6. What type of information would be appropriate to post on a personal website? C. A review of a restaurant you visited
7. Which of the following might be part of a site’s privacy policy? A. A software program that protects against spam and malware B. Downloadable games and apps C. A promise that the site won’t sell your information to other people. D. Information about how to acquire anti-virus software.
7. Which of the following might be part of a site’s privacy policy? C. A promise that the site won’t sell your information to other people.
8. What are these called? A. Viruses B. Pop up adds C. Spam D. Trojan horses
8. What are these called? B. Pop up adds
9. The law compels websites to post privacy issues. What does “compels” mean in this context? A. Persuades B. Asks C. Forbids D. Requires
9. The law compels websites to post privacy issues. What does “compels” mean in this context? D. Requires
10. What can you infer from the fact that scams and other illegal behavior are so common on the internet? A. There are no laws that regulate the internet B. Online criminals often use clever tactics to avoid detection C. Law enforcement officials aren’t aware of how much online crime there is D. Most internet users are criminals
10. What can you infer from the fact that scams and other illegal behavior are so common on the internet? B. Online criminals often use clever tactics to avoid detection
Do now… Go to fifth grade, and click on Cybersmart link. Once on the site, click on Student Links, and then click on the triangle. Find the title of this lesson, and open its links. You will be given a website to look at. Find it on the list, click on it and answer the questions on the paper.