What’s the Harm: Charting Your Course Version
Ready to put your cybersituational awareness skills to the test? Dive into “What’s the Harm: Charting Your Course,” a single and multiplayer flip card game designed to sharpen your knowledge about the risks of online practices. Challenge yourself and others to navigate the digital landscape safely while having fun. Are you up for the challenge? Enhance your cybersecurity skills and play today!
Learn more ways to keep safe online!
Check out our available courses down below.
![what's the harm, charting your course a teen learning on the laptop](https://knowledgeflow.org/wp-content/uploads/2024/07/charting-your-course-teen-learning-on-laptop.png)
1. Play Instructions
Get ready for a challenge that will sharpen your knowledge about the risks of online practices.
![Final Score Legend](https://knowledgeflow.org/wp-content/uploads/2024/02/Final-Score-Legend-731x1024.png)
A. Single Player
Here’s the game plan: Start by reading the questions on the front of each card and jotting down your answers. Then, flip the card to see if you hit the bullseye! Don’t forget to keep track of your score for each correct answer on the sleek scorecard provided.
B. Multi Player
Here’s the game plan: Divide your group into teams of 2 or more players. Team A starts by picking a card and reading the question on the front of that card. Team A gives their answer to Team B who flips the card to see the recommended answer and scores Team A’s answer on the scorecard based on how many points the answer included. Then Team B repeats the same steps and Team A scores their answer.
2. The Scorecard
Print as many scorecards are required based on the number of teams/individuals playing.
3. The Game: What’s the Harm: Charting Your Course
![Trusting Apps FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Trusting-Apps-FRONT.png)
![Trusting Apps BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Trusting-Apps-BACK.png)
![Reusing Passwords on Multiple Accounts FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Reusing-Passwords-on-Multiple-Accounts-FRONT.png)
![Reusing Passwords on Multiple Accounts BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Reusing-Passwords-on-Multiple-Accounts-BACK.png)
![Clicking on a Phishing Link or Email FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Clicking-on-a-Phishing-Link-or-Email-FRONT.png)
![Clicking on a Phishing Link or Email BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Clicking-on-a-Phishing-Link-or-Email-BACK.png)
![Chatting with Strangers Online FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Chatting-with-Strangers-Online-FRONT.png)
![Chatting with Strangers Online BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Chatting-with-Strangers-Online-BACK.png)
![Backup Contacts FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Backup-Contacts-FRONT.png)
![Backup Contacts BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Backup-Contacts-BACK.png)
![Oversharing on Social Media FRONT 2](https://knowledgeflow.org/wp-content/uploads/2024/02/Oversharing-on-Social-Media-FRONT-2.png)
![Oversharing on Social Media BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Oversharing-on-Social-Media-BACK.png)
![Seeing Online Ads FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Seeing-Online-Ads-FRONT.png)
![Seeing Online Ads BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Seeing-Online-Ads-BACK.png)
![Giving out Your Password FRONT 1](https://knowledgeflow.org/wp-content/uploads/2024/02/Giving-out-Your-Password-FRONT-1.png)
![Giving out Your Password BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Giving-out-Your-Password-BACK.png)
![Skipping Software Updates FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Skipping-Software-Updates-FRONT.png)
![Skipping Software Updates BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Skipping-Software-Updates-BACK.png)
![Click on Clickbait FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Click-on-Clickbait-FRONT.png)
![Click on Clickbait BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Click-on-Clickbait-BACK.png)
![Linking Multiple Devices FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Linking-Multiple-Devices-FRONT.png)
![Linking Multiple Devices BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Linking-Multiple-Devices-BACK.png)
![Sideloading Apps FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Sideloading-Apps-FRONT.png)
![Sideloading Apps BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Sideloading-Apps-BACK.png)
![Location Tracking FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Location-Tracking-FRONT.png)
![Location Tracking BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Location-Tracking-BACK.png)
![Filing Sharing FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Filing-Sharing-FRONT.png)
![Filing Sharing BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Filing-Sharing-BACK.png)
![Being Non Pseudonymous FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Being-Non-Pseudonymous-FRONT.png)
![Being Non Pseudonymous BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Being-Non-Pseudonymous-BACK.png)
![Digital Footprint FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Digital-Footprint-FRONT.png)
![Digital Footprint BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Digital-Footprint-BACK.png)
![Accepting Cookies FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Accepting-Cookies-FRONT.png)
![Accepting Cookies BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Accepting-Cookies-BACK.png)
![Attack Planes Vectors FRONT](https://knowledgeflow.org/wp-content/uploads/2024/02/Attack-Planes-Vectors-FRONT.png)
![Attack Planes Vectors BACK](https://knowledgeflow.org/wp-content/uploads/2024/02/Attack-Planes-Vectors-BACK.png)
platform for teachers
Cybersafety for your classroom
At KnowledgeFlow, we emphasize the significance of cybersafety education for both educators and students. Understanding and teaching essential cyber safety practices can protect both teachers and students from online risks. By fostering safe technology use in the classroom, students can learn to navigate the digital world securely. Learn how to create #UnHackable classrooms!