Digital Citizenship

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an attachment. What should Ryan do?

Ask Mike if he sent the email

If your friends are involved in cyber bullying, you should:

Ask them to stop

The "A" in the D.E.A.L. acronym stands for

Authenticate

To whom should you report cyber bullying?

Authority figures

Asking questions are important to determining the best use of digital communication because they help me think _____, which helps me make better decisions.

Before taking action

Company email should only be used for _____ purposes.

Business

A _____ conviction in a cyber bullying case may result in the offender paying restitution to the victim's family.

Civil

A _____ attaches itself to a file or program, enabling it to spread from one computer to another.

Computer virus

If you participate in the bad digital communication choices of others, you may put yourself at risk for _____.

Consequences

The free distribution of copyrighted work with the proper credit to the creator.

Creative Commons-Attribution

A _____ conviction in a cyber bullying case may result in fines and jail time.

Criminal

Julia receives an email from an unknown source. The subject of the mail looks strange and it has an attachment. What should Julia do?

Delete the email

Cyber bullying is the use of Information Technology to harm or harass other people in a _____, repeated, and hostile manner.

Deliberate

Antivirus software is a computer program that _____. prevents, and takes action to disarm or remove malicious software programs.

Detects

Can contain textual content, images, and multimedia

Digital asset

How are digital assets and digital footprints related?

Digital assets create digital footprints

Though there are no specific federal laws for cyber bullying, in some cases cyber bullying overlaps with _____ harassment.

Discriminatory

Before I post something online that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _____?"

Emotional reaction

The "E" in the D.E.A.L. acronym stands for:

Evaluate

In severe cases of cyber bullying, students that are involved can get _____ from school.

Expulsion

This law explains when the free use of copyrighted material is acceptable.

Fair Use rule of Copyright Law

A copyright gives the creator of an original work exclusive right to that work, usually for an unlimited time.

False

Cyber bullying is protected by Freedom of Speech.

False

If you do not personally know the bully in a situation, you should still approach them directly and tell them to stop.

False

In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords (t/f)

False

Public domain represents works whose intellectual property rights have extended or works that have been released by the creator (t/f)

False

The global digital divide is a digital dive between cities (t/f)

False

What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?

Financial

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain online _____.

Forever

What is software that is available for use at no cost, but usually has some restricted usage rights?

Freeware

What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or reap other benefits?

Government

_____ is the act of breaking into a computer to steal information.

Hacking

The digital divide is an economic _____ between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies.

Inequality

A digital footprint is all of the information online about a person posted by that person or others, _____

Intentional

Malware is software that has _____.

Malicious intent

What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?

Medical

Changing technology is one of the _____ impacts of technology in the workplace.

Negative

Dependency on technology is one of the _____ impacts of technology in the workplace.

Negative

Lack of downtime is one of the _____ impacts of technology on the workplace.

Negative

Is "WS1979" a strong password?

No

Is the following an example of cyber bullying: Amanda has a crush on Joseph. She regularly likes his posts and always says something nice about his pictures.

No

_____ is the stealing of copyrighted work by downloading or copying it in order to keep, sell, or give away without permission and without paying.

Piracy

Efficiency is one of the _____ impacts of technology on the workplace.

Positive

Having a skilled labor force is one of the _____ impacts of technology in the workplace.

Positive

Staying connected is a _____ impact of technology on society.

Positive

Social networking sites are usually _____ during work hours unless the activity is work-related.

Prohibited

What is a license that is paid for by number of machines or number of people using the software?

Purchased license

What is software that is provided to others with restrictions or for a certain limited trial basis?

Shareware

Confidential and proprietary information is information that _____ be shared outside of the company without prior consent.

Should not

Plagiarism is the _____ of someone else's words or ideas and presenting them as your own.

Stealing

A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software (t/f)

True

Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment (t/f)

True

Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain (t/f)

True

Illegal sharing of confidential and propriety information can cause a company to lose business, money, and possibly its competitive advantage.

True

Intellectual property is the works, inventions or creations of an individual, group or business (t/f)

True

One of the questions I should ask myself before using digital communication is, "Would I like for someone to share that about me?"

True

The primary goal of an Internet scam is to gain access to someone's personal information or their finances (t/f)

True

Visiting Internet sites that are prohibited by an employer could result in consequences up to and including termination.

True

Free WiFi is typically offered on a(n) _____ network.

Unencrypted

A _____ spreads from one machine to another, rapidly without human action.

Worm

Can music be protected by copyright?

Yes

Does a company have the right to monitor all your digital communications if you are using their equipment?

Yes

Is "Ih@%eC@ts!" a strong password?

Yes

Is an image you do not have the right to use NOT considered a digital asset?

Yes

Is making hateful comments about someone through emails, blogs, online profiles, or chat rooms considered a method of cyber bullying?

Yes

Is the following an example of cyber bullying; chad secretly posts mean messages in response to all of William's status updates. Chad had also created a whole website for other classmates to post lies about William.

Yes

A digital native is a person who has been exposed to technology at a(n) _____ and is comfortable using it.

Young age


Conjuntos de estudio relacionados

Evaluating Quadratic Functions, Set 3

View Set

business of law hw questions test 3

View Set

Western Civilization 1 CLEP: Cultures

View Set

C6: Functionalism: Antecedent Influences

View Set

Intro to coding: chapters 11,12,13

View Set

Common Sense Life Insurance Licensing Test

View Set

Chapter 4, Chapter 5, and Chapter 6

View Set