SuperTeacherTools SuperTeacherTools Help Subscribe to Email Subscribe to RSS
Create a New Game Create a New Game

Computer Crimes and Digital Footprint
Speed Match Review Game

This game has been played 255 times
The best time ever was Teri at 27 seconds.
The best time today is at seconds.
How To Play:
Drag the squares in the gray area and drop them in the matching squares in the blue area below.
If you drop a square in the correct spot, it will disappear.
If you make a mistake, the square will return to its original spot.
Good luck!

Let's Play Speed Match!

Is a reflection of you and can often be permanent.
Deceiving individuals to gain private or personal information about that person
Cookie
Plagiarism
Sexting
Posting offensive messages online with the intent to provoke readers.
Crashing, running slow, pop ups.
Identity Theft
Digital Footprint
Online Fraud
Breaching copyright
Hacking
harrassing people online
A Virus
Spamming
Cyberbullying usually involves...
If your computer has a virus it may display the following symptoms....
A malicious programme that damages a computer system or its data
Unauthorised access to a computer system is called
Phishing is...
Pretending to be someone you are not is called
The use of technology to share sexual or sexually implied content is called
The act of presenting someone else's work as your own is called...
Distributing e-mail to dozens or hundreds of different addresses is called
Your digital footprint....
A file that tracks all of your online activity is called a _________
Manipulating data, e.g. changing banking records to transfer money to an account is
Can be defined as the trail or history left behind of all your interactions on the internet.
Trolling is...
Downloading movies, music, software or pictures with out the owners permission is known as

That's a high score!

You did it!



What is your name?

Play This Game Again!


You did it!
You got every match correct!

Here are all the answers:

DescriptionMatch:
Can be defined as the trail or history left behind of all your interactions on the internet.Digital Footprint
Your digital footprint....Is a reflection of you and can often be permanent.
A file that tracks all of your online activity is called a _________Cookie
Unauthorised access to a computer system is calledHacking
Cyberbullying usually involves...harrassing people online
The use of technology to share sexual or sexually implied content is calledSexting
Pretending to be someone you are not is calledIdentity Theft
Trolling is...Posting offensive messages online with the intent to provoke readers.
Downloading movies, music, software or pictures with out the owners permission is known asBreaching copyright
Distributing e-mail to dozens or hundreds of different addresses is calledSpamming
Phishing is...Deceiving individuals to gain private or personal information about that person
The act of presenting someone else's work as your own is called...Plagiarism
Manipulating data, e.g. changing banking records to transfer money to an account is Online Fraud
A malicious programme that damages a computer system or its dataA Virus
If your computer has a virus it may display the following symptoms....Crashing, running slow, pop ups.