SuperTeacherTools SuperTeacherTools Help Subscribe to Email Subscribe to RSS
Create a New Game Create a New Game

Computer Crimes and Digital Footprint
Speed Match Review Game

This game has been played 255 times
The best time ever was Teri at 27 seconds.
The best time today is at seconds.
How To Play:
Drag the squares in the gray area and drop them in the matching squares in the blue area below.
If you drop a square in the correct spot, it will disappear.
If you make a mistake, the square will return to its original spot.
Good luck!

Let's Play Speed Match!

Crashing, running slow, pop ups.
Digital Footprint
Online Fraud
harrassing people online
Breaching copyright
Spamming
Deceiving individuals to gain private or personal information about that person
Cookie
Identity Theft
A Virus
Plagiarism
Sexting
Is a reflection of you and can often be permanent.
Hacking
Posting offensive messages online with the intent to provoke readers.
The act of presenting someone else's work as your own is called...
If your computer has a virus it may display the following symptoms....
Cyberbullying usually involves...
Manipulating data, e.g. changing banking records to transfer money to an account is
Your digital footprint....
Pretending to be someone you are not is called
A malicious programme that damages a computer system or its data
A file that tracks all of your online activity is called a _________
Can be defined as the trail or history left behind of all your interactions on the internet.
The use of technology to share sexual or sexually implied content is called
Downloading movies, music, software or pictures with out the owners permission is known as
Distributing e-mail to dozens or hundreds of different addresses is called
Phishing is...
Unauthorised access to a computer system is called
Trolling is...

That's a high score!

You did it!



What is your name?

Play This Game Again!


You did it!
You got every match correct!

Here are all the answers:

DescriptionMatch:
Can be defined as the trail or history left behind of all your interactions on the internet.Digital Footprint
Your digital footprint....Is a reflection of you and can often be permanent.
A file that tracks all of your online activity is called a _________Cookie
Unauthorised access to a computer system is calledHacking
Cyberbullying usually involves...harrassing people online
The use of technology to share sexual or sexually implied content is calledSexting
Pretending to be someone you are not is calledIdentity Theft
Trolling is...Posting offensive messages online with the intent to provoke readers.
Downloading movies, music, software or pictures with out the owners permission is known asBreaching copyright
Distributing e-mail to dozens or hundreds of different addresses is calledSpamming
Phishing is...Deceiving individuals to gain private or personal information about that person
The act of presenting someone else's work as your own is called...Plagiarism
Manipulating data, e.g. changing banking records to transfer money to an account is Online Fraud
A malicious programme that damages a computer system or its dataA Virus
If your computer has a virus it may display the following symptoms....Crashing, running slow, pop ups.