Edit Game
Computer Literacy Review
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   34  Close
What types of works can be plagiarized and are protected by Copyright Laws?
Essays, music, Movies, artwork, songs, photographs, computer software, etc.
What are some tips to consider when sending an email?
tone, grammar, be brief, have professional fonts, and use punctuation
What are examples of sensitive information that should not be shared in emails?
credit card numbers, social security numbers, passwords
Which keyboard key allows you to select NON adjacent files?
CTRL
Which keyboard key allows you to select adjacent files?
SHIFT
How do you identify the bully, target, and the upstander?
the bully is the one doing the harmful action, the target is who the bully is doing the bullying to, and the upstander is the person who stands up for the targe
When shopping online, what signals that you are on a secure site to protect against security threats?
https in the website or a locked symbol
How can cyberbullying and social media posts affect your future?
Lose scholarships, get denied from college acceptance, jail time
What is the ability to imagine the feelings that someone else is experiencing?
Empathy
What is cyberbullying?
the electronic posting of mean-spirited messages about a person (such as a student) often done anonymously
What is the way you tell your readers that certain material in your work came from another source?
Citation, cite your source
What is plagiarism?
taking someone else's work and passing it off as your own
What is the practice of spying on a user of an ATM, computer, or other electronic device in order to obtain their personal access information?
Shoulder Surfing
What does a firewall do?
prevents other computers on the internet from accessing a computer OR prevents a program on the computer from accessing the Internet
What does Anitvirus software do?
it searches for files that cause harm and tries to fix them by erasing or disabling the commands
What is the unauthorized use of or damage to a computer or computer files called?
Security Threat
What is the act of defrauding an account holder by sending emails to try to gain access to financial information?
Phishing
What is software used to track a computer user's internet usage?
Spyware
What is the best way to find out if something is true?
Research the information
What makes a good password?
A mix of letters (uppercase and lowercase), numbers, and symbols that you can remember.
What are some issues that can occur when you spend a lot of time online?
It can hurt friendships, grades, mental health, etc.
Why are people meaner online than in person?
They can stay anonymous.
Why is it important to disregard Internet hoaxes, chain emails, and constant messaging?
It can contain harmful viruses and could clog up your email
What are two examples of Security Threats?
Virus, Spoofed site, phishing, shoulder surfing, pharming, malware, spyware
What is a redirect from a legitimate site that sends a customer to a criminal's spoofed site?
Pharming
What is a spoofed site?
a website set up to look like another website (fake site)
What are ways your identity can be stolen?
dumpster diving, shoulder surfing, wallet is stolen, through business records, spoofing, phishing, con game (phone calls)
What is identity theft?
when someone takes your personal information and pretends to be you
What is tricky about online communication whether it is email or text?
Lack of emotional details and tone so it leads to misunderstandings.
Why is it not a good idea to keep all your credit cards in your wallet or purse?
Because it can get stolen.
What is the best practice for your PINs for credit or debit cards?
To memorize them.
What do you do if you are a victim of identity theft? (There are five.)
Contact FTC, notify the 3 credit bureaus, file police report, contact creditors, make complaints in writing
Name two ways to prevent identity theft. (There were eight.)
Educate, Check credit report annually, Check monthly statements, Don't give out info, Secure websites, Strong Passwords, Shred Mail, Firewall
What is the fastest growing crime in America?
Identity Theft