SlideShare a Scribd company logo
1 of 56
Jeopardy Choose a category.  You will be given the answer.  You must give the correct question. Click to begin.
Choose a point value. Choose a point value. Click here for Final Jeopardy
Online Shopping Cyber- bullying Internet Scams 10 Point 20 Points 30 Points 40 Points 50 Points 10 Point 10 Point 10 Point 10 Point 20 Points 20 Points 20 Points 20 Points 30 Points 40 Points 50 Points 30 Points 30 Points 30 Points 40 Points 40 Points 40 Points 50 Points 50 Points 50 Points Words & Pictures Social  Network Sites
What is the main downside of social network  sites?
What you see on your monitor may not reflect what’s in the real world
How do dangerous criminals use social network sites?
They disguise their identities to target young victims.
What are two rules for people who blog, use chat rooms or send e-mails to online acquaintances?
[object Object],[object Object],[object Object],[object Object]
Name two rules for meeting an online acquaintance (always best not to meet)
[object Object],[object Object],[object Object],[object Object]
Name two social network sites
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is one thing you should look for when on a checkout page?
“ https” or A lock icon
What kind of on-line merchants are generally most trustworthy?
A well-known retailer
List one thing an on-line retailer should have on its website.
[object Object],[object Object],[object Object]
In an on-line auction fraud you receive an e-mail informing you that you’ve won a great prize. You must pay for this before the “prize” is sent your way.
Shipping and Handling
How long might an on-line post last?
[object Object]
When you are “chatting” with someone online what is an immediate red flag?
Asking you to meet in an out of the way place.
What is another word used for “screen name”?
handle
Which screen name would be a safer choice? Unker.tcms thelibrarian
Thelibrarian- do not use partial names, schools or addresses
If anyone ever sends you IM or e-mails that discusses private matters that make you feel uncomfortable, immediately do this.
End the conversation and correspondence.
Why should you never give an online acquaintance your phone number?
They could do a reverse look up and get your address.
If a cyberbully sends you a serious threat, what should you do?
Tell an adult immediately.
What is a cyberbully?
A person who humiliates or harasses classmates through postings on blogs, website guest books, I-M’s, cell phone text messages.. Etc.
Why are most cyberbullies considered immature?
Mature persons don’t hide behind a computer.
Does Kentucky have a state law against cyberbullying?
Yes. It passed on April 15, 2008- House Bill 315.
Girls are twice as likely as boys to be cyberbullied. True or False?
True
What should you do if you receive a pfishing e-mail?
Delete it  or  notify the company who “supposedly” sent the message.
What does pfishing e-mail ask the recipient to do?
Immediately go to a linked website to solve the problem.
How do pfishing schemes normally begin?
With an e-mail notification that a bank or other financial institution has lost important information.
What do criminals who use pfishing schemes try to steal? Must name two.
[object Object],[object Object],[object Object],[object Object]
What are two safe browsers to use when on-line shopping?
Internet Explorer Netscape Firefox Opera
Final Jeopardy Make your wager
In what way is the internet like a city?
It contains good places and dangerous places. It’s just like a big neighborhood.

More Related Content

What's hot

Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1Vinay Kumar
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Pointguest24931c
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Daisy yeung project
Daisy yeung projectDaisy yeung project
Daisy yeung projectdaisyyeung
 
Letter to Roger Seawright from M. Shanken Communications
Letter to Roger Seawright from M. Shanken CommunicationsLetter to Roger Seawright from M. Shanken Communications
Letter to Roger Seawright from M. Shanken CommunicationsRoger Seawright
 
Tech Etiquette for Teens Powerpoint
Tech Etiquette for Teens PowerpointTech Etiquette for Teens Powerpoint
Tech Etiquette for Teens PowerpointDiane Windingland
 
High School Social Media Presentation
High School Social Media PresentationHigh School Social Media Presentation
High School Social Media PresentationwebmattersUS
 
Social Media, Brand Management, and your Job Search
Social Media, Brand Management, and your Job SearchSocial Media, Brand Management, and your Job Search
Social Media, Brand Management, and your Job SearchwebmattersUS
 

What's hot (18)

Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
Vvvvvvvv
VvvvvvvvVvvvvvvv
Vvvvvvvv
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
d
dd
d
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
Peer pressure
Peer pressurePeer pressure
Peer pressure
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Daisy yeung project
Daisy yeung projectDaisy yeung project
Daisy yeung project
 
Letter to Roger Seawright from M. Shanken Communications
Letter to Roger Seawright from M. Shanken CommunicationsLetter to Roger Seawright from M. Shanken Communications
Letter to Roger Seawright from M. Shanken Communications
 
COPPA and YOU
COPPA and YOUCOPPA and YOU
COPPA and YOU
 
Ostatok 18242 accs
Ostatok 18242 accsOstatok 18242 accs
Ostatok 18242 accs
 
Tech Etiquette for Teens Powerpoint
Tech Etiquette for Teens PowerpointTech Etiquette for Teens Powerpoint
Tech Etiquette for Teens Powerpoint
 
High School Social Media Presentation
High School Social Media PresentationHigh School Social Media Presentation
High School Social Media Presentation
 
Social Media, Brand Management, and your Job Search
Social Media, Brand Management, and your Job SearchSocial Media, Brand Management, and your Job Search
Social Media, Brand Management, and your Job Search
 
Secret To Hotwire Hotels
Secret To Hotwire HotelsSecret To Hotwire Hotels
Secret To Hotwire Hotels
 

Viewers also liked

Family Fortunes
Family FortunesFamily Fortunes
Family FortunesPaul Smith
 
Stock market activities and trades reviews
Stock market activities and trades reviewsStock market activities and trades reviews
Stock market activities and trades reviewsFinancial Website Review
 
INFORMED WOMEN KNOW MORE!
INFORMED WOMEN KNOW MORE!INFORMED WOMEN KNOW MORE!
INFORMED WOMEN KNOW MORE!WOGA Colorado
 
WORLD ECONOMIC FORUM... NON SOLO DAVOS
WORLD ECONOMIC FORUM... NON SOLO DAVOS WORLD ECONOMIC FORUM... NON SOLO DAVOS
WORLD ECONOMIC FORUM... NON SOLO DAVOS telosaes
 
Everything About Dental Implantology- How to Put Dental Implants.
Everything About Dental Implantology- How to Put Dental Implants.Everything About Dental Implantology- How to Put Dental Implants.
Everything About Dental Implantology- How to Put Dental Implants.Dr. Aman Singh
 
Fred Travels Pvt Ltd
Fred Travels Pvt LtdFred Travels Pvt Ltd
Fred Travels Pvt LtdPerviz Surti
 
Resumen La Paradoja de James Hunter por omarling granda
Resumen La Paradoja de James Hunter por omarling grandaResumen La Paradoja de James Hunter por omarling granda
Resumen La Paradoja de James Hunter por omarling grandaOmarling Isabel Granda Paredes
 
Scuola milano legno è innovazione 11 marzo 2017
Scuola milano legno è innovazione 11 marzo 2017Scuola milano legno è innovazione 11 marzo 2017
Scuola milano legno è innovazione 11 marzo 2017italiasicura-scuole
 

Viewers also liked (12)

Family Fortunes
Family FortunesFamily Fortunes
Family Fortunes
 
Trabajo estadisticas
Trabajo estadisticasTrabajo estadisticas
Trabajo estadisticas
 
Apareça & Cre$ça
Apareça & Cre$çaApareça & Cre$ça
Apareça & Cre$ça
 
Stock market activities and trades reviews
Stock market activities and trades reviewsStock market activities and trades reviews
Stock market activities and trades reviews
 
INFORMED WOMEN KNOW MORE!
INFORMED WOMEN KNOW MORE!INFORMED WOMEN KNOW MORE!
INFORMED WOMEN KNOW MORE!
 
Platos norteños
Platos norteñosPlatos norteños
Platos norteños
 
La Paradoja (resumen)
La Paradoja (resumen)La Paradoja (resumen)
La Paradoja (resumen)
 
WORLD ECONOMIC FORUM... NON SOLO DAVOS
WORLD ECONOMIC FORUM... NON SOLO DAVOS WORLD ECONOMIC FORUM... NON SOLO DAVOS
WORLD ECONOMIC FORUM... NON SOLO DAVOS
 
Everything About Dental Implantology- How to Put Dental Implants.
Everything About Dental Implantology- How to Put Dental Implants.Everything About Dental Implantology- How to Put Dental Implants.
Everything About Dental Implantology- How to Put Dental Implants.
 
Fred Travels Pvt Ltd
Fred Travels Pvt LtdFred Travels Pvt Ltd
Fred Travels Pvt Ltd
 
Resumen La Paradoja de James Hunter por omarling granda
Resumen La Paradoja de James Hunter por omarling grandaResumen La Paradoja de James Hunter por omarling granda
Resumen La Paradoja de James Hunter por omarling granda
 
Scuola milano legno è innovazione 11 marzo 2017
Scuola milano legno è innovazione 11 marzo 2017Scuola milano legno è innovazione 11 marzo 2017
Scuola milano legno è innovazione 11 marzo 2017
 

Similar to Internet Safety Jeopardy Game

Similar to Internet Safety Jeopardy Game (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
School presentation
School presentationSchool presentation
School presentation
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Chatter
ChatterChatter
Chatter
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Internet safety
Internet safety Internet safety
Internet safety
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet safety
Internet safetyInternet safety
Internet safety
 

More from cynthia.warner

Cyber Bullying Student Presentation
Cyber Bullying Student PresentationCyber Bullying Student Presentation
Cyber Bullying Student Presentationcynthia.warner
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenshipcynthia.warner
 
Stop Cyberbullying Parent Presentation
Stop Cyberbullying Parent PresentationStop Cyberbullying Parent Presentation
Stop Cyberbullying Parent Presentationcynthia.warner
 
Netiquette By S Brown At Bbe
Netiquette By S Brown At BbeNetiquette By S Brown At Bbe
Netiquette By S Brown At Bbecynthia.warner
 

More from cynthia.warner (7)

Compass Ky
Compass KyCompass Ky
Compass Ky
 
Do U Txt Msg
Do U Txt MsgDo U Txt Msg
Do U Txt Msg
 
Cyber Bullying Student Presentation
Cyber Bullying Student PresentationCyber Bullying Student Presentation
Cyber Bullying Student Presentation
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
 
Stop Cyberbullying Parent Presentation
Stop Cyberbullying Parent PresentationStop Cyberbullying Parent Presentation
Stop Cyberbullying Parent Presentation
 
Four Stage Cycle Ky
Four Stage Cycle KyFour Stage Cycle Ky
Four Stage Cycle Ky
 
Netiquette By S Brown At Bbe
Netiquette By S Brown At BbeNetiquette By S Brown At Bbe
Netiquette By S Brown At Bbe
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Internet Safety Jeopardy Game