Internet safety

Cyber Safety
Keeping Our Computers Safe
Overview
Computer Protection
 Key Terms:
 Firewall – Blocks outside access to a computer
 Antivirus – Prevents most destructive programs (viruses) from accessing a computer
 Cookies – Stores and transmits information
to parent websites
 Passwords – Allows access to online accounts
Working Of A Fire Wall
Computer Protection
 Online:
 Connected to the Internet
 Disconnect when not in use
 Firewall:
 Limits the information sent to and from your computer
 Barrier from the internet
 Examples of firewall programs:
• Zonealarm
• Comodo
• Norton
Computer Protection
 Antivirus Protection:
 Prevents viruses from effecting your computer
 Can only prevent what it recognizes
 Examples of antivirus programs:
• McAfee
• Norton
• AVG Anti-virus
Computer Protection
 Cookies
 Allow companies to store information on your machine
 Collect information on your use
 Set computer to accept different level of cookies I’ve been to
this site!
Computer Protection
 Keep Your Password Safe!
 Passwords are key to your personal information.
 Increase password security by using:
• Capital letters, lowercase letters,
symbols, and numbers
• Abbreviations not whole words
Example: s0uth*ern ILL-in0is
Change your password frequently
Identity Theft
 Key Terms:
 Email – Messages sent
via the internet
 Websites - Locations on
the Internet
Identity Theft
Scamming: Tricking or
deceiving a person
or group of people to
obtain information
 Phishing Email -
 A common avenue for virtual scam artist. False
email can appear obvious or subtle.
 Phishing Website -
 Another common venue for virtual scam artist.
Attempt to gather personal information
What are the world of
warcraft scammers looking
for ???
Email Scam: Clear
Example
Email Scam: Subtle
Example
Southern Illinois Bank
Email
 Follow these guidelines
when using email:
 Sent messages are
uncontrollable.
 Do not open emails
from email addresses
you do not recognize!
 Treat online situations
the same way you would
personal situations.
Identity Theft: Websites
 Check out the legitimacy of a
website
 Key icons and web addresses
 Well-known site
 Check for misspellings
 Do not give out personal
information
 Set information to private if possible
 If you are unsure just remember
to:
Stop… Look… Call!
Communicating Online

Information you may want to consider before
sharing with others online:
Spending And Saving Online

Consider the following before buying anything online:

Do you know the store from the brick mortar world?

What is the site’s reputation?

Is the website secure?

Is the offer too good to be true?

Does the merchant collect more information than is needed to
complete the sale?

Use a payment service or credit card for payment.

Review the company's shipping method.
Spending and Saving Online

Protect yourself when banking or paying bills online:
Computing On The Go

Using public computers safely

Using mobile phones
Bullying On Line

What to do if you are “cyber-bullied.”

Safety tips to avoid or deal with online bullying.

Keep personal information private.

Use technology tools to block inappropriate or threatening behavior.

Do not answer phone calls or read messages, e-mails or comments
from “cyber-bullies.” Set them aside in case they are needed by
authorities for evidence.
When Being bullied.....
Buying Prescriptions On Line

Know your source to make sure it’s safe

Make sure a website is a state-licensed pharmacy located in the
United States.

Find a list at http://www.nabp.net and http://www.vipps.info.

Look for websites with practices that protect you.

Be sure your privacy is protected.

If you are suspicious or have complaints about a service or
transaction, report the website!
Electronic Medical Records

The advantages of Electronic Medical Records

Recommended online storage services for
Electronic Medical Records.
Socializing Online

Blogging

Social Networking

Chat discussion boards and forums

Online quizzes and surveys
Sharing Photos, Images & Video

Sharing Photos Safely

Image copyright infringement

Sharing videos online

Using webcams
Defensive Computing

Browsing and searching

Ads on search engines and sponsored search results.

Identifying secure/trusted websites

Understand the risks in sharing information.

Browser settings and filtering software.
Safe Practices
 Remember these helpful tips when using a computer for
“web surfing” or online transactions:
 Treat your computer
like your home.
 Never give out
personal information!
 Talk to your kids about
Internet safety.
 If it sounds too good
to be true… it usually is!
Internet safety
The First Question
When I’m on line I should never give out:
A. My last name
B. The names of my pets
C. The names of my favorite book or TV shows
Answer 1
 Option A - My last name
Question 2
 Before I buy something online or access a site
requiring payment I should:
A. First make sure I really want it
B. Check with my parents
C. Check out store prices first.
Answer 2
 Option B - Check with my parents
Question 3
 You are in a very high post in a company. You have to
complete a project with your Senior. As you are going
on a vacation your senior asks your Email ID and
Password so that he can access files. It is an
important work. Should you give it ??
A. Give your password as it is important
B. Do not give your password as you do not care about
the work.
C. Do not give him and request your boss for some
more time
Answer 3
 Option C - Do not give him and request your
boss for some more time
Question 4
 If someone I meet online gives me his phone
number I should:
A. Call him as he is your friend and has given his
number too
B. Give him your number and request him to call
after sometime
C. Ask your Parents and check the number
Answer 4
 Option C - Ask your Parents and check the
number
Question 5
 What is Netiquette?
A. Treat others as badly as they treat you.
B. Be polite online and others will do the same
C. Call people names when they do something
you don't like.
D. Repeat messages over an over so others
don't get a chance to talk.
E. No Answer
Answer 5
 Option B - Be polite online and others will do
the same
Question 6
 Which is these is a good way to keep from being
bullied?
A.Delete messages from people you don't know, or from
those people who seem angry or mean.
B.When something doesn't seem right, stay in the site,
chat anyway and give out personal information.
C.Post all your school pictures online along with your
address, email, and phone number.
D.Send messages when you are angry and haven't had
time to think about the situation.
Answer 6
 Option A - Delete messages from people you don't
know, or from those people who seem angry or mean.
Question 7
As I travel through "Cyberspace," I should
never..
A.Take a break and have a snack.
B.Use the Internet to help me with my
homework.
C.Agree to meet someone in person who I have
met online.
Answer 7
 Option C - Agree to meet someone in person
who I have met online.
Question 8
 If someone I meet online asks me to keep a
secret from my parents I should....
A.Keep the secret because they are my "cyber
friend."
B.Tell all of my friends, because it's hard for me
to keep a secret.
C.Tell my parents, because no one should ever
ask me to keep secrets from my parents.
Answer 8
 Option C - Tell my parents, because no one
should ever ask me to keep secrets from my
parents.
Question 9
 Which of these is NOT a good way to keep from
being bullied?
A.Get back at the bullies by doing the same things they
did to you.
B.Don't give out private information .
C.Don't exchange pictures or give out email addresses to
people you meet on the Internet.
D.Don't send a message when you are angry.
Answer 9
 Option A - Get back at the bullies by doing the
same things they did to you.
Question 10
 Someone is on my E-mail "buddy list," "friend
list," or "contact list" and I only know that
person online, he or she is
A. My friend and someone I can trust
B. The Person he or she claims to be
C. Someone I should be cautious about,
because I don't know him or her well.
Answer 10
 Option C - Someone I should be cautious
about, because I don't know him or her well.
Internet safety
1 de 50

Recomendados

Cyber safety tips por
Cyber safety tipsCyber safety tips
Cyber safety tipsArunmozhi Ramesh
581 vistas37 diapositivas
Internet Safety por
Internet SafetyInternet Safety
Internet Safetymcgeet
7.7K vistas66 diapositivas
A Quick Online Safety Presentation por
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
2.3K vistas21 diapositivas
Cyber safety: internet safety presentation for middle school students por
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
27.9K vistas16 diapositivas
Internet safety por
Internet safetyInternet safety
Internet safetyDan Tomlinson
959 vistas29 diapositivas
Internet safety tips for kids and teens por
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
1K vistas11 diapositivas

Más contenido relacionado

La actualidad más candente

Internet Safety Presentation por
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
18.9K vistas26 diapositivas
Internet safety ppt por
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
8.3K vistas31 diapositivas
Internet Safety por
Internet SafetyInternet Safety
Internet SafetyNaheelah Irving
1.5K vistas25 diapositivas
Internet Safety for Children Powerpoint por
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
52.7K vistas7 diapositivas
Internet Safety por
Internet SafetyInternet Safety
Internet SafetyWilliam Breitsprecher
59.1K vistas14 diapositivas
Cyber security for children por
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
5.3K vistas18 diapositivas

La actualidad más candente(20)

Internet Safety Presentation por Pamela Moeai
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai18.9K vistas
Internet safety ppt por mcmullan
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan8.3K vistas
Internet Safety for Children Powerpoint por bgmartinez1971
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez197152.7K vistas
Cyber security for children por Avanzo net
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net5.3K vistas
Cyber Bullying por CoachElrod
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod6.3K vistas
Cyber Safety por Niti Arora
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora9.7K vistas
Internet Safety Elementary por jaimejoyh
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh24K vistas
Cyber safety por Yash Jain
Cyber safetyCyber safety
Cyber safety
Yash Jain926 vistas
Awareness Training on Information Security por Ken Holmes
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes2.3K vistas
Internet Safety Slideshare por Lawrence Fine
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine8.9K vistas

Similar a Internet safety

Internet safety for middles school por
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
423 vistas15 diapositivas
Im A Chatter Al por
Im A Chatter AlIm A Chatter Al
Im A Chatter Alguest8e113b
291 vistas10 diapositivas
Cyber-Safety and Digital Citizenship por
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
1K vistas35 diapositivas
Internet Safety Hope Sievert, Emma Balison, Caleb por
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
348 vistas15 diapositivas
Internet Safety Hope, Emma, Ali, Caleb por
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
715 vistas15 diapositivas
Internet Safety Final por
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
181 vistas19 diapositivas

Similar a Internet safety (20)

Internet safety for middles school por esksaints
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
esksaints423 vistas
Im A Chatter Al por guest8e113b
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
guest8e113b291 vistas
Internet Safety Hope Sievert, Emma Balison, Caleb por guestde489f
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
guestde489f348 vistas
Internet Safety Hope, Emma, Ali, Caleb por guestde489f
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
guestde489f715 vistas
Internet Safety Final por guest5000f0a
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5000f0a181 vistas
Cyber peace for youth tanta por Samir Deutsch
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
Samir Deutsch105 vistas
Slick The Spammer por guest80ad5c
Slick The SpammerSlick The Spammer
Slick The Spammer
guest80ad5c240 vistas
Ass3 Sum por Antglynn
Ass3 SumAss3 Sum
Ass3 Sum
Antglynn236 vistas
Internet Safety Final por guest5558240
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5558240349 vistas
Rules of Netiquette por Leelet1121
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet11218.2K vistas
EMPOWERMENT TECHNOLOGIES LESSON 2 por JayMarkBandoy1
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy137 vistas
Internet Safety Presentation por cey.ruth
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth1.2K vistas
Internet Safety Jeopardy Game por cynthia.warner
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
cynthia.warner4.6K vistas
Internet Safety Im Chatterer por guest4fd30d4
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
guest4fd30d4123 vistas

Más de bhavya mohindru

India - My Motherland, My Country por
India - My Motherland, My CountryIndia - My Motherland, My Country
India - My Motherland, My Countrybhavya mohindru
12.8K vistas58 diapositivas
William Shakespeare - To be or not to be por
William Shakespeare - To be or not to beWilliam Shakespeare - To be or not to be
William Shakespeare - To be or not to bebhavya mohindru
1.7K vistas20 diapositivas
Global warming - Let's save our Earth por
Global warming - Let's save our EarthGlobal warming - Let's save our Earth
Global warming - Let's save our Earthbhavya mohindru
955 vistas12 diapositivas
Air Around Us Edited por
Air Around Us EditedAir Around Us Edited
Air Around Us Editedbhavya mohindru
3.3K vistas13 diapositivas
Fun With Magnets por
Fun With MagnetsFun With Magnets
Fun With Magnetsbhavya mohindru
29.9K vistas12 diapositivas
Cyber Crime por
Cyber Crime Cyber Crime
Cyber Crime bhavya mohindru
2.5K vistas14 diapositivas

Más de bhavya mohindru(12)

Último

MIXING OF PHARMACEUTICALS.pptx por
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptxAnupkumar Sharma
77 vistas35 diapositivas
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Ms. Pooja Bhandare
93 vistas45 diapositivas
Structure and Functions of Cell.pdf por
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
545 vistas10 diapositivas
Use of Probiotics in Aquaculture.pptx por
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptxAKSHAY MANDAL
100 vistas15 diapositivas
Dance KS5 Breakdown por
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 BreakdownWestHatch
79 vistas2 diapositivas
ICS3211_lecture 08_2023.pdf por
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
149 vistas30 diapositivas

Último(20)

Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare93 vistas
Structure and Functions of Cell.pdf por Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan545 vistas
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL100 vistas
Dance KS5 Breakdown por WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch79 vistas
REPRESENTATION - GAUNTLET.pptx por iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood100 vistas
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1115 vistas
Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch79 vistas
AI Tools for Business and Startups por Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov107 vistas
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239298 vistas
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 vistas
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta201 vistas
Psychology KS4 por WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch84 vistas
Education and Diversity.pptx por DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar173 vistas

Internet safety

  • 1. Cyber Safety Keeping Our Computers Safe
  • 3. Computer Protection  Key Terms:  Firewall – Blocks outside access to a computer  Antivirus – Prevents most destructive programs (viruses) from accessing a computer  Cookies – Stores and transmits information to parent websites  Passwords – Allows access to online accounts
  • 4. Working Of A Fire Wall
  • 5. Computer Protection  Online:  Connected to the Internet  Disconnect when not in use  Firewall:  Limits the information sent to and from your computer  Barrier from the internet  Examples of firewall programs: • Zonealarm • Comodo • Norton
  • 6. Computer Protection  Antivirus Protection:  Prevents viruses from effecting your computer  Can only prevent what it recognizes  Examples of antivirus programs: • McAfee • Norton • AVG Anti-virus
  • 7. Computer Protection  Cookies  Allow companies to store information on your machine  Collect information on your use  Set computer to accept different level of cookies I’ve been to this site!
  • 8. Computer Protection  Keep Your Password Safe!  Passwords are key to your personal information.  Increase password security by using: • Capital letters, lowercase letters, symbols, and numbers • Abbreviations not whole words Example: s0uth*ern ILL-in0is Change your password frequently
  • 9. Identity Theft  Key Terms:  Email – Messages sent via the internet  Websites - Locations on the Internet
  • 10. Identity Theft Scamming: Tricking or deceiving a person or group of people to obtain information  Phishing Email -  A common avenue for virtual scam artist. False email can appear obvious or subtle.  Phishing Website -  Another common venue for virtual scam artist. Attempt to gather personal information
  • 11. What are the world of warcraft scammers looking for ???
  • 15. Email  Follow these guidelines when using email:  Sent messages are uncontrollable.  Do not open emails from email addresses you do not recognize!  Treat online situations the same way you would personal situations.
  • 16. Identity Theft: Websites  Check out the legitimacy of a website  Key icons and web addresses  Well-known site  Check for misspellings  Do not give out personal information  Set information to private if possible  If you are unsure just remember to: Stop… Look… Call!
  • 17. Communicating Online  Information you may want to consider before sharing with others online:
  • 18. Spending And Saving Online  Consider the following before buying anything online:  Do you know the store from the brick mortar world?  What is the site’s reputation?  Is the website secure?  Is the offer too good to be true?  Does the merchant collect more information than is needed to complete the sale?  Use a payment service or credit card for payment.  Review the company's shipping method.
  • 19. Spending and Saving Online  Protect yourself when banking or paying bills online:
  • 20. Computing On The Go  Using public computers safely  Using mobile phones
  • 21. Bullying On Line  What to do if you are “cyber-bullied.”  Safety tips to avoid or deal with online bullying.  Keep personal information private.  Use technology tools to block inappropriate or threatening behavior.  Do not answer phone calls or read messages, e-mails or comments from “cyber-bullies.” Set them aside in case they are needed by authorities for evidence.
  • 23. Buying Prescriptions On Line  Know your source to make sure it’s safe  Make sure a website is a state-licensed pharmacy located in the United States.  Find a list at http://www.nabp.net and http://www.vipps.info.  Look for websites with practices that protect you.  Be sure your privacy is protected.  If you are suspicious or have complaints about a service or transaction, report the website!
  • 24. Electronic Medical Records  The advantages of Electronic Medical Records  Recommended online storage services for Electronic Medical Records.
  • 25. Socializing Online  Blogging  Social Networking  Chat discussion boards and forums  Online quizzes and surveys
  • 26. Sharing Photos, Images & Video  Sharing Photos Safely  Image copyright infringement  Sharing videos online  Using webcams
  • 27. Defensive Computing  Browsing and searching  Ads on search engines and sponsored search results.  Identifying secure/trusted websites  Understand the risks in sharing information.  Browser settings and filtering software.
  • 28. Safe Practices  Remember these helpful tips when using a computer for “web surfing” or online transactions:  Treat your computer like your home.  Never give out personal information!  Talk to your kids about Internet safety.  If it sounds too good to be true… it usually is!
  • 30. The First Question When I’m on line I should never give out: A. My last name B. The names of my pets C. The names of my favorite book or TV shows
  • 31. Answer 1  Option A - My last name
  • 32. Question 2  Before I buy something online or access a site requiring payment I should: A. First make sure I really want it B. Check with my parents C. Check out store prices first.
  • 33. Answer 2  Option B - Check with my parents
  • 34. Question 3  You are in a very high post in a company. You have to complete a project with your Senior. As you are going on a vacation your senior asks your Email ID and Password so that he can access files. It is an important work. Should you give it ?? A. Give your password as it is important B. Do not give your password as you do not care about the work. C. Do not give him and request your boss for some more time
  • 35. Answer 3  Option C - Do not give him and request your boss for some more time
  • 36. Question 4  If someone I meet online gives me his phone number I should: A. Call him as he is your friend and has given his number too B. Give him your number and request him to call after sometime C. Ask your Parents and check the number
  • 37. Answer 4  Option C - Ask your Parents and check the number
  • 38. Question 5  What is Netiquette? A. Treat others as badly as they treat you. B. Be polite online and others will do the same C. Call people names when they do something you don't like. D. Repeat messages over an over so others don't get a chance to talk. E. No Answer
  • 39. Answer 5  Option B - Be polite online and others will do the same
  • 40. Question 6  Which is these is a good way to keep from being bullied? A.Delete messages from people you don't know, or from those people who seem angry or mean. B.When something doesn't seem right, stay in the site, chat anyway and give out personal information. C.Post all your school pictures online along with your address, email, and phone number. D.Send messages when you are angry and haven't had time to think about the situation.
  • 41. Answer 6  Option A - Delete messages from people you don't know, or from those people who seem angry or mean.
  • 42. Question 7 As I travel through "Cyberspace," I should never.. A.Take a break and have a snack. B.Use the Internet to help me with my homework. C.Agree to meet someone in person who I have met online.
  • 43. Answer 7  Option C - Agree to meet someone in person who I have met online.
  • 44. Question 8  If someone I meet online asks me to keep a secret from my parents I should.... A.Keep the secret because they are my "cyber friend." B.Tell all of my friends, because it's hard for me to keep a secret. C.Tell my parents, because no one should ever ask me to keep secrets from my parents.
  • 45. Answer 8  Option C - Tell my parents, because no one should ever ask me to keep secrets from my parents.
  • 46. Question 9  Which of these is NOT a good way to keep from being bullied? A.Get back at the bullies by doing the same things they did to you. B.Don't give out private information . C.Don't exchange pictures or give out email addresses to people you meet on the Internet. D.Don't send a message when you are angry.
  • 47. Answer 9  Option A - Get back at the bullies by doing the same things they did to you.
  • 48. Question 10  Someone is on my E-mail "buddy list," "friend list," or "contact list" and I only know that person online, he or she is A. My friend and someone I can trust B. The Person he or she claims to be C. Someone I should be cautious about, because I don't know him or her well.
  • 49. Answer 10  Option C - Someone I should be cautious about, because I don't know him or her well.