CyberSafety Tic Tac KNOW - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

CyberSafety Tic Tac KNOW

Description:

If 'O' goes first: http://www.neave.com/games/tictactoe/tictactoe.swf ... A free online service that allows people to talk to each other over the computer. ... – PowerPoint PPT presentation

Number of Views:158
Avg rating:3.0/5.0
Slides: 19
Provided by: russ141
Category:
Tags: cybersafety | know | free | games | online | tac | tic

less

Transcript and Presenter's Notes

Title: CyberSafety Tic Tac KNOW


1
CyberSafetyTic Tac KNOW
A Technology Safety Quiz for Parents, Teachers,
Counselors, and other Care Takers
  • Russ Sabella, PhD
  • www.SchoolCounselor.com/safety

Version 1.0 2/10/2007
2
Directions
  • Split your audience/class into two groups, one
    will be Xs, the other Os.
  • Pick one representative from each group that
    will, in collaboration with their groups, make
    the decisions for which answer to pick and which
    place on the tic-tac-toe grid to put their mark.
  • On the next slide, you will get the chance to
    have representatives flip to go first. After
    they have decided, advance the slide to reveal
    the results of the coin toss.
  • Also open the following website for the game grid
    (youll have to go back and forth between this
    PPT and the game keep only these two things open
    and use ALT-TAB on a Windows machine to easily do
    this). Also know that you will be able to click
    on one of these links and go directly to the
    website from the coin toss screen.
  • If O goes first http//www.neave.com/games/tict
    actoe/tictactoe.swf
  • If X goes first http//gfx-pros.com/pspflash/ti
    ctactoe.swf

3
Who goes first ?
O Goes First
X Goes First
4
One way to get around a schools blocking
software is to
  • Bring a PlayStation Portable and log in
  • Use a proxy server
  • Slip the front office assistant 20 for a
    password
  • Connect to the Net using a CodeCrasher
  • All of the above

5
Social Networks allow any person to
  • Establish friends
  • Post events (e.g. parties)
  • Search for others based on demographics
  • Upload videos
  • All of the above

6
Students use the following method to cheat
  • Photocam
  • Language translators
  • Essay purchases
  • Copy and paste
  • All of the above

7
Sexual predators use which of the following to
learn more about their victims?
  • Video sites
  • Social Networks
  • Government Databases
  • Chat rooms
  • All of the above

8
One precaution that parents can take to protect
their children is to
  • Put the computer in the childs bedroom
  • Install blocking/filtering software
  • Take their child to an Internet Café
  • Ban use of the Internet
  • All of the above

9
Cyberbullying is
  • When one cyborg or robot bullies another
  • Bullying that is carried out over the Internet or
    other electronic network
  • A form of bullying as described in the book
    Brave New World
  • When one student insults another students
    computing skills.
  • All of the above

10
A blog is
  • Short for web log, an online journal
  • Short for busy logger, someone who conducts data
    entry
  • Short for blah log, a boring online journal
  • Short for blue and orange, an online journal from
    the University of Florida
  • All of the above

11
If an anonymous person is sending constant
messages to your PC what should your kid do?
  • Run around the house screaming her head off
  • Talk to his parents and see if he can find out
    who and where the anonymous person is
  • Stick her head down the toilet
  • Be flattered
  • All of the above

12
In a chat room, you see the following, a/s/l or
asl, which means
  • Away, see (you) later
  • Attractive sexy lover
  • American sign language
  • Age, sex, location
  • All the above

13
A parent can see which sites their child has
visited by
  • Asking him/her
  • Checking the history
  • Reading the Cybersitter report
  • Sharing the online experience with him/her
  • All of the above

14
What should you do if your children tell you that
someone they have "met" online has asked for
their telephone number and wants to meet them in
person?
  • Take away their computer privileges
  • Praise them for being honest with you about this
    information and discuss
  • Tell them that it's okay to meet their friend as
    long as you know where they are going
  • Track the person down and meet with them yourself
  • All of the above

15
Which of the following online activities can be
addictive?
  • Surfing
  • Shopping
  • Social networks
  • Games
  • All of the above

16
A Limited User Account is
  • An account on the computer only to be used by
    someone limited in their computer skills
  • An account that is intended for someone who
    should be prohibited from changing most computer
    settings and deleting important files.
  • An account that allows only 45 minutes of
    activity per day.
  • An account that limits the use of the computer to
    people 18 years old and older.
  • All of the above

17
Skype is
  • A free online service that allows people to talk
    to each other over the computer.
  • Short for serious hype, its another term used
    to describe MySpace.com
  • A famous blog
  • A terms used to describe when a child has been
    targeted for bullying (e.g., shes been skyped).
  • All of the above

18
Any Suggestions
  • Russ Sabella, PhD
  • Sabella_at_schoolcounselor.com

Visit www.SchoolCounselor.com/safety for other
CyberSafety Resources.
Write a Comment
User Comments (0)
About PowerShow.com