phishing
what is the punishment for plagiarism, according to the chariho plagiarism policy
academic word for copying grade reduction grade complete 0 with no opportunity to make up esd redoing the assignment provide parenthetical citations need works cited page
what information needs to be sited
anything taken off the internet anything taken out of books or movies or songs
what is the best action to take when your not sure if an email is real or a scam
do not click on any links, go directly to the real website/phone number
list several appropriate ways to respond to cyber bullying
do not engage keep evidence/record dates and times report to an adult
what are some examples of software that chariho allows you to use when you want to download content
hulu itunes netflix
what is a good general guideline to keep in mind about downloading content
if it was published in the last 75 years, it is probably copyrighted
how can you tell of it is legal to down load content from a particular sight
if published in the last 75 years it is most likely illegal asks you yo download a vpn
what are the prohibited uses of your computer
illegally downloaded copyrighted material harassment racist material no pornography no configuration changes no stickers no financial activities no promoting political or religious activities
what is charihos policy on using a vpn on school computers
it is not allowed
what is charihos policy on using torrent software
it is not allowed
what is the district policy about personalizing your computer
not allowed
what is the district policy on the use of social media during the school day
not allowed
what does not require a citation
original ideas common knowledge
what are examples of software that chariho does not allow you to use to download content
the pirate bay limetorrents demonoid
how is the district allowed to monitor what you do on your computer
they can view everything you do
what are some ways to keep a positive digital footprint
turn on privacy settings dont do anything illegal
what are the legal consequences of violating copyright law
up to five years in jail or fines and charges up to $150,000 per file
how is the district allowed to monitor your own device when you are connected to the district wifi
view everything you do, such as texts sent, emails sent
define cyber bullying
when you intentionally attack or harass someone on line
why is your digital footprint important
you are legally responsible for everything you do online jobs and colleges can see everything you do online
what is a digital footprint
your trail online from all the things you do collection of your personal information including location
what are the red flags of scam emails
-calls you something other than your name -links to verify information -grammar mistakes -familiar adresses and logos -may try to scare you by telling you you are at risk -credit card numbers are required
what steps can you take to protect yourself and your computer when you use public wifi
-do not log into sensitive places while on public wifi -use a vpn - verify connection - turn off sharing -log out of each site you visit - don't use the same password everywhere
what is the fair use provision of copyright law? how does it allow people to use copyrighted material without paying
-fair use are situations where you can use copyrighted material without paying -use a small amount -transform the original -for a school project - obtained the original legally -parody -30 second rule
what is phishing and why is it dangerous
-phishing is an email scam that tricks you into handing over information -ages 18-24 are most likely -these scammers want your money
why can using public wifi be risky
-public wifi can create an opportunity for criminals to intercept your information -it can be an opportunity for people to install malware on your device -security issues -fake wifi networks -trick and confusing you
what makes for a weak password
-simple words -information about you -pets names/ phone number
what is copyright and what does it protect
-the protection from thievery of your own ideas -protects your ability to have something as yours and no one else can steal it - intellectual properties
what makes for a strong password
-using uppercase letters -using numbers -using special characters -not in the dictionary -placement of letters and numbers -phrases -hard to guess