SuperTeacherTools SuperTeacherTools Help
Create a New Game Create a New Game

Digital Citizenship Test 1
Speed Match Review Game

This game has been played times
The best time ever was at seconds.
The best time today is at seconds.
How To Play:
Drag the squares in the gray area and drop them in the matching squares in the blue area below.
If you drop a square in the correct spot, it will disappear.
If you make a mistake, the square will return to its original spot.
Good luck!

Let's Play Speed Match!

opportunity
plagiarism
Yes
identity theft
No
pitfall
green - there is nothing risky here
No
fair use
Protect a person’s creative work and require permission from others to use it
vulnerable
ask - when you can get permission from the author or artist Example: using a picture your friend took. Acknowledge - anytime you use material created by someone else. Add Value - anytime you are reworking something Example: creating a parody
check who created it and give them credit, get permission to use it, buy it if necessary, use it responsibly
change the subject, log off, block the user, create a new account, tell a friend or adult
date of birth, place or birth, addresses, phone numbers. driver's license number, passport number, account numbers, social security number
need to verify account info, sense of urgency, alert account is in trouble, link in email or attachment, too good to be true, generic greeting, spelling errors
license
phishing
creative works
public domain
harass
avoid opening messages that look suspicious, don't click on links or download attachments, don't reply, mark as junk or spam for your email provider
to allow others to use their work, but while requiring credit be given; make it easier to share things responsibly
scam
piracy
You can use things you find online as long as you
Is it okay to share information about your pets online?
A hidden or unsuspected problem or danger
Give an example of a feature of a phishing email
in a position that makes it easier for you to be harmed or attacked
the ability to use a small amount of copyrighted work without permission, but only in certain ways and in specific situations
clear way to define the copyright of your creative work so people know how it can be used
any idea or artistic creation that is recorded in some form whether it is hard copy or digital
Kayla replies to a fan of her cooking blog, answering a question about a recipe she just posted. Is this situation a red, yellow, or green situation?
A type of crime in which your private information is stolen and used for criminal activity
To bother or pressure aggressively
an attempt to trick someone, usually with the intention of stealing money or private info
The act of copying someone else’s work and saying it is your own is
Know when it is appropriate to use each item in the Ask, Acknowledge, and Add Value framework
Is it okay to share passwords online?
What should you do if someone makes you uncomfortable while communicating online?
What are some of the other pieces of information identity thieves try to get from you?
How can you protect yourself from an online scheme?
A chance for something to happen
Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying
The purpose of copyright is to
Is it okay to share your full name online?
When people send phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal information and financial information
Why would people want to use a Creative Commons license?
Creative work that’s not copyrighted and therefore free for you to use however you want

You did it!



What is your name?

Play This Game Again!


You did it!
You got every match correct!

Here are all the answers:

DescriptionMatch:
The act of copying someone else’s work and saying it is your own isplagiarism
any idea or artistic creation that is recorded in some form whether it is hard copy or digitalcreative works
clear way to define the copyright of your creative work so people know how it can be usedlicense
Creative work that’s not copyrighted and therefore free for you to use however you wantpublic domain
You can use things you find online as long as youcheck who created it and give them credit, get permission to use it, buy it if necessary, use it responsibly
The purpose of copyright is to Protect a person’s creative work and require permission from others to use it
Why would people want to use a Creative Commons license?to allow others to use their work, but while requiring credit be given; make it easier to share things responsibly
the ability to use a small amount of copyrighted work without permission, but only in certain ways and in specific situationsfair use
Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without payingpiracy
Know when it is appropriate to use each item in the Ask, Acknowledge, and Add Value frameworkask - when you can get permission from the author or artist Example: using a picture your friend took. Acknowledge - anytime you use material created by someone else. Add Value - anytime you are reworking something Example: creating a parody
When people send phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal information and financial informationphishing
Is it okay to share your full name online?No
Is it okay to share information about your pets online?Yes
Is it okay to share passwords online?No
What are some of the other pieces of information identity thieves try to get from you?date of birth, place or birth, addresses, phone numbers. driver's license number, passport number, account numbers, social security number
A type of crime in which your private information is stolen and used for criminal activityidentity theft
an attempt to trick someone, usually with the intention of stealing money or private infoscam
in a position that makes it easier for you to be harmed or attackedvulnerable
Give an example of a feature of a phishing emailneed to verify account info, sense of urgency, alert account is in trouble, link in email or attachment, too good to be true, generic greeting, spelling errors
How can you protect yourself from an online scheme?avoid opening messages that look suspicious, don't click on links or download attachments, don't reply, mark as junk or spam for your email provider
To bother or pressure aggressivelyharass
A chance for something to happenopportunity
A hidden or unsuspected problem or dangerpitfall
Kayla replies to a fan of her cooking blog, answering a question about a recipe she just posted. Is this situation a red, yellow, or green situation?green - there is nothing risky here
What should you do if someone makes you uncomfortable while communicating online?change the subject, log off, block the user, create a new account, tell a friend or adult