phishing

¡Supera tus tareas y exámenes ahora con Quizwiz!

what is the punishment for plagiarism, according to the chariho plagiarism policy

academic word for copying grade reduction grade complete 0 with no opportunity to make up esd redoing the assignment provide parenthetical citations need works cited page

what information needs to be sited

anything taken off the internet anything taken out of books or movies or songs

what is the best action to take when your not sure if an email is real or a scam

do not click on any links, go directly to the real website/phone number

list several appropriate ways to respond to cyber bullying

do not engage keep evidence/record dates and times report to an adult

what are some examples of software that chariho allows you to use when you want to download content

hulu itunes netflix

what is a good general guideline to keep in mind about downloading content

if it was published in the last 75 years, it is probably copyrighted

how can you tell of it is legal to down load content from a particular sight

if published in the last 75 years it is most likely illegal asks you yo download a vpn

what are the prohibited uses of your computer

illegally downloaded copyrighted material harassment racist material no pornography no configuration changes no stickers no financial activities no promoting political or religious activities

what is charihos policy on using a vpn on school computers

it is not allowed

what is charihos policy on using torrent software

it is not allowed

what is the district policy about personalizing your computer

not allowed

what is the district policy on the use of social media during the school day

not allowed

what does not require a citation

original ideas common knowledge

what are examples of software that chariho does not allow you to use to download content

the pirate bay limetorrents demonoid

how is the district allowed to monitor what you do on your computer

they can view everything you do

what are some ways to keep a positive digital footprint

turn on privacy settings dont do anything illegal

what are the legal consequences of violating copyright law

up to five years in jail or fines and charges up to $150,000 per file

how is the district allowed to monitor your own device when you are connected to the district wifi

view everything you do, such as texts sent, emails sent

define cyber bullying

when you intentionally attack or harass someone on line

why is your digital footprint important

you are legally responsible for everything you do online jobs and colleges can see everything you do online

what is a digital footprint

your trail online from all the things you do collection of your personal information including location

what are the red flags of scam emails

-calls you something other than your name -links to verify information -grammar mistakes -familiar adresses and logos -may try to scare you by telling you you are at risk -credit card numbers are required

what steps can you take to protect yourself and your computer when you use public wifi

-do not log into sensitive places while on public wifi -use a vpn - verify connection - turn off sharing -log out of each site you visit - don't use the same password everywhere

what is the fair use provision of copyright law? how does it allow people to use copyrighted material without paying

-fair use are situations where you can use copyrighted material without paying -use a small amount -transform the original -for a school project - obtained the original legally -parody -30 second rule

what is phishing and why is it dangerous

-phishing is an email scam that tricks you into handing over information -ages 18-24 are most likely -these scammers want your money

why can using public wifi be risky

-public wifi can create an opportunity for criminals to intercept your information -it can be an opportunity for people to install malware on your device -security issues -fake wifi networks -trick and confusing you

what makes for a weak password

-simple words -information about you -pets names/ phone number

what is copyright and what does it protect

-the protection from thievery of your own ideas -protects your ability to have something as yours and no one else can steal it - intellectual properties

what makes for a strong password

-using uppercase letters -using numbers -using special characters -not in the dictionary -placement of letters and numbers -phrases -hard to guess


Conjuntos de estudio relacionados

NCLEX Study Questions-Health Assessment

View Set

LIFE INSURANCE, POLICY PROVISIONS, OPTIONS AND RIDERS

View Set

Starting Out with Python, 3e Ch 5

View Set

AZ-800: Administering Windows Server Hybrid Core Infrastructure

View Set

ISDS 3115 Chapter 11 Concept Questions

View Set

MGMT 371 Iowa State- Quiz 5 Ch 11-12

View Set

Intrapartal Period: Fetal Heart Rate Assessment (Ch 9)

View Set

Introductory: Reading and Vocabulary

View Set