Digital Citizenship Test
Which of the following is NOT considered a digital asset?
An image that you do not have the right to use
To whom should you report cyberbullying?
Authority figures
How are digital assets and digital footprints related?
Digital assets create digital footprints
A copyright gives the creator of an original work exclusive right to that work, usually for an unlimited time. True or False
False
Cyberbullying is protected by Freedom of Speech. True or False
False
If you do not personally know the bully in a situation, you should still approach them directly and tell them to stop. True or False
False
In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords. True or False
False
Making decisions about using digital communication when I am angry is a good idea. True or False
False
The global digital divide is a digital divide between cities. True or False
False
What is software that is available for use at no cost, but usually has some restricted usage rights?
Freeware
___________________ is the act of breaking into a computer to steal information.
Hacking
Which of the following is a negative impact of technology on society?
Inactive lifestyles
What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?
Medical
Is "WS1979" a strong password?
No
What is a license that is paid for by number of machines or number of people using the software?
Purchased liscense
What is software that is provided to others with restrictions or for a certain limited trial basis?
Shareware
A digital asset can contain textual content, images, and multimedia. True or False
True
A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software. True or False
True
Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared. True or False
True
Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment. True or False
True
Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain. True or False
True
Illegal sharing of confidential and proprietary information can cause a company to lose business, money, and possibly its competitive advantage. True or False
True
Intellectual property is the works, inventions or creations of an individual, group or business. True or False
True
One of the questions I should ask myself before using digital communication is, "Would I like for someone to share that about me?" True or False
True
The primary goal of an Internet scam is to gain access to someone's personal information or their finances. True or False
True
Does a company have the right to monitor all your digital communications if you are using their equipment?
Yes
Is the following an example of cyberbullying: Chad secretly posts mean messages in response to all of William's status updates. Chad has also created a whole website for other classmates to post lies about William.
Yes
Asking questions are important to determining the best use of digital communication because they help me think _______________________, which helps me make better decisions.
before taking action
Company email should only be used for _________ purposes.
business
A ____________ attaches itself to a file or program, enabling it to spread from one computer to another.
computer virus
If you participate in the bad digital communication choices of others, you may put yourself at risk for __________________.
consequences
A ________________ conviction in a cyberbullying case may result in fines and jail time.
criminal
Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?
criminal
Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?
delete the email
Cyberbullying is the use of Information Technology to harm or harass other people in a _______________, repeated, and hostile manner.
deliberate
Though there are no specific federal laws for cyberbullying, in some cases cyberbullying overlaps with ________________ harassment.
discriminatory
Before I post something on-line that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _______________________?"
emotional reaction
The "E" in the D.E.A.L. acronym stands for
evaluate
In severe cases of cyberbullying, students that are involved can get ____________ from school.
expulsion
Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line _________________________.
forever
A digital footprint is all of the information on-line about a person posted by that person or others, ________________________.
intentionally or unintentionally
Changing technology is one of the ________________ impacts of technology on the workplace.
negative
Is the following an example of cyberbullying: Amanda has a crush on Charlie. She regularly likes his posts and always says something nice about his pictures.
no
___________________ is the stealing of copyrighted work by downloading or copying it in order to keep, sell, or give away without permission and without paying.
piracy
Connectivity is one of the ________________ impacts of technology on the workplace.
positive
Efficiency is one of the ________________ impacts of technology on the workplace.
positive
Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
positive
Social networking sites are usually ________________ during work hours unless the activity is work-related.
prohibited
If someone is being bullied, you should _________________ it.
report
Which of the following is a positive impact of technology on society?
staying connected
Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own.
stealing
Free Wi-Fi is typically offered on a(n) _____________ network.
unecrypted
The Fair Use rule of copyright law explains __________.
when free use of copyrighted material is acceptable.
"Creative Commons-Attribution" is the free distribution of copyrighted work _____________ the proper credit to the creator.
with
A ____________ spreads from one machine to another, rapidly, without human action.
worm
A digital native is a person who has been exposed to technology at a(n) ____________________ and is comfortable using it.
young age