Digital Citizenship Test 1 Play This Game Live Now Join Live Game as a Player
The act of copying someone else’s work and saying it is your own is
The act of copying someone else’s work and saying it is your own is
plagiarism
any idea or artistic creation that is recorded in some form whether it is hard copy or digital
any idea or artistic creation that is recorded in some form whether it is hard copy or digital
creative works
clear way to define the copyright of your creative work so people know how it can be used
clear way to define the copyright of your creative work so people know how it can be used
license
Creative work that’s not copyrighted and therefore free for you to use however you want
Creative work that’s not copyrighted and therefore free for you to use however you want
public domain
You can use things you find online as long as you
You can use things you find online as long as you
check who created it and give them credit, get permission to use it, buy it if necessary, use it responsibly
The purpose of copyright is to
The purpose of copyright is to
Protect a person’s creative work and require permission from others to use it
Why would people want to use a Creative Commons license?
Why would people want to use a Creative Commons license?
to allow others to use their work, but while requiring credit be given; make it easier to share things responsibly
the ability to use a small amount of copyrighted work without permission, but only in certain ways and in specific situations
the ability to use a small amount of copyrighted work without permission, but only in certain ways and in specific situations
fair use
Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying
Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying
piracy
Know when it is appropriate to use each item in the Ask, Acknowledge, and Add Value framework
Know when it is appropriate to use each item in the Ask, Acknowledge, and Add Value framework
ask - when you can get permission from the author or artist Example: using a picture your friend took. Acknowledge - anytime you use material created by someone else. Add Value - anytime you are reworking something Example: creating a parody
When people send phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal information and financial information
When people send phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal information and financial information
phishing
Is it okay to share your full name online?
Is it okay to share your full name online?
No
Is it okay to share information about your pets online?
Is it okay to share information about your pets online?
Yes
Is it okay to share passwords online?
Is it okay to share passwords online?
No
What are some of the other pieces of information identity thieves try to get from you?
What are some of the other pieces of information identity thieves try to get from you?
date of birth, place or birth, addresses, phone numbers. driver's license number, passport number, account numbers, social security number
A type of crime in which your private information is stolen and used for criminal activity
A type of crime in which your private information is stolen and used for criminal activity
identity theft
an attempt to trick someone, usually with the intention of stealing money or private info
an attempt to trick someone, usually with the intention of stealing money or private info
scam
in a position that makes it easier for you to be harmed or attacked
in a position that makes it easier for you to be harmed or attacked
vulnerable
Give an example of a feature of a phishing email
Give an example of a feature of a phishing email
need to verify account info, sense of urgency, alert account is in trouble, link in email or attachment, too good to be true, generic greeting, spelling errors
How can you protect yourself from an online scheme?
How can you protect yourself from an online scheme?
avoid opening messages that look suspicious, don't click on links or download attachments, don't reply, mark as junk or spam for your email provider
To bother or pressure aggressively
To bother or pressure aggressively
harass
A chance for something to happen
A chance for something to happen
opportunity
A hidden or unsuspected problem or danger
A hidden or unsuspected problem or danger
pitfall
Kayla replies to a fan of her cooking blog, answering a question about a recipe she just posted. Is this situation a red, yellow, or green situation?
Kayla replies to a fan of her cooking blog, answering a question about a recipe she just posted. Is this situation a red, yellow, or green situation?
green - there is nothing risky here
What should you do if someone makes you uncomfortable while communicating online?
What should you do if someone makes you uncomfortable while communicating online?
change the subject, log off, block the user, create a new account, tell a friend or adult
Team 1 |
|
|
|
|
Team 2 |
|
|
|
|
Team 3 |
|
|
|
|
Team 4 |
|
|
|
|
Team 5 |
|
|
|
|
Team 6 |
|
|
|
|
Team 7 |
|
|
|
|
Team 8 |
|
|
|
|
Team 9 |
|
|
|
|
Team 10 |
|
|
|
|
What Would You Like To Risk?
Team 1 |
|
|
|
|
Team 2 |
|
|
|
|
Team 3 |
|
|
|
|
Team 4 |
|
|
|
|
Team 5 |
|
|
|
|
Team 6 |
|
|
|
|
Team 7 |
|
|
|
|
Team 8 |
|
|
|
|
Team 9 |
|
|
|
|
Team 10 |
|
|
|
|
Go To The Final Question
Final Score:
Team 1 |
|
|
|
|
Team 2 |
|
|
|
|
Team 3 |
|
|
|
|
Team 4 |
|
|
|
|
Team 5 |
|
|
|
|
Team 6 |
|
|
|
|
Team 7 |
|
|
|
|
Team 8 |
|
|
|
|
Team 9 |
|
|
|
|
Team 10 |
|
|
|
|
Edit This Game:
|
|