Digital Citizenship
Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an attachment. What should Ryan do?
Ask Mike if he sent the email
If your friends are involved in cyber bullying, you should:
Ask them to stop
The "A" in the D.E.A.L. acronym stands for
Authenticate
To whom should you report cyber bullying?
Authority figures
Asking questions are important to determining the best use of digital communication because they help me think _____, which helps me make better decisions.
Before taking action
Company email should only be used for _____ purposes.
Business
A _____ conviction in a cyber bullying case may result in the offender paying restitution to the victim's family.
Civil
A _____ attaches itself to a file or program, enabling it to spread from one computer to another.
Computer virus
If you participate in the bad digital communication choices of others, you may put yourself at risk for _____.
Consequences
The free distribution of copyrighted work with the proper credit to the creator.
Creative Commons-Attribution
A _____ conviction in a cyber bullying case may result in fines and jail time.
Criminal
Julia receives an email from an unknown source. The subject of the mail looks strange and it has an attachment. What should Julia do?
Delete the email
Cyber bullying is the use of Information Technology to harm or harass other people in a _____, repeated, and hostile manner.
Deliberate
Antivirus software is a computer program that _____. prevents, and takes action to disarm or remove malicious software programs.
Detects
Can contain textual content, images, and multimedia
Digital asset
How are digital assets and digital footprints related?
Digital assets create digital footprints
Though there are no specific federal laws for cyber bullying, in some cases cyber bullying overlaps with _____ harassment.
Discriminatory
Before I post something online that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _____?"
Emotional reaction
The "E" in the D.E.A.L. acronym stands for:
Evaluate
In severe cases of cyber bullying, students that are involved can get _____ from school.
Expulsion
This law explains when the free use of copyrighted material is acceptable.
Fair Use rule of Copyright Law
A copyright gives the creator of an original work exclusive right to that work, usually for an unlimited time.
False
Cyber bullying is protected by Freedom of Speech.
False
If you do not personally know the bully in a situation, you should still approach them directly and tell them to stop.
False
In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords (t/f)
False
Public domain represents works whose intellectual property rights have extended or works that have been released by the creator (t/f)
False
The global digital divide is a digital dive between cities (t/f)
False
What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?
Financial
Protecting what is added to your digital footprint is important because potentially embarrassing information can remain online _____.
Forever
What is software that is available for use at no cost, but usually has some restricted usage rights?
Freeware
What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or reap other benefits?
Government
_____ is the act of breaking into a computer to steal information.
Hacking
The digital divide is an economic _____ between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies.
Inequality
A digital footprint is all of the information online about a person posted by that person or others, _____
Intentional
Malware is software that has _____.
Malicious intent
What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?
Medical
Changing technology is one of the _____ impacts of technology in the workplace.
Negative
Dependency on technology is one of the _____ impacts of technology in the workplace.
Negative
Lack of downtime is one of the _____ impacts of technology on the workplace.
Negative
Is "WS1979" a strong password?
No
Is the following an example of cyber bullying: Amanda has a crush on Joseph. She regularly likes his posts and always says something nice about his pictures.
No
_____ is the stealing of copyrighted work by downloading or copying it in order to keep, sell, or give away without permission and without paying.
Piracy
Efficiency is one of the _____ impacts of technology on the workplace.
Positive
Having a skilled labor force is one of the _____ impacts of technology in the workplace.
Positive
Staying connected is a _____ impact of technology on society.
Positive
Social networking sites are usually _____ during work hours unless the activity is work-related.
Prohibited
What is a license that is paid for by number of machines or number of people using the software?
Purchased license
What is software that is provided to others with restrictions or for a certain limited trial basis?
Shareware
Confidential and proprietary information is information that _____ be shared outside of the company without prior consent.
Should not
Plagiarism is the _____ of someone else's words or ideas and presenting them as your own.
Stealing
A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software (t/f)
True
Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment (t/f)
True
Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain (t/f)
True
Illegal sharing of confidential and propriety information can cause a company to lose business, money, and possibly its competitive advantage.
True
Intellectual property is the works, inventions or creations of an individual, group or business (t/f)
True
One of the questions I should ask myself before using digital communication is, "Would I like for someone to share that about me?"
True
The primary goal of an Internet scam is to gain access to someone's personal information or their finances (t/f)
True
Visiting Internet sites that are prohibited by an employer could result in consequences up to and including termination.
True
Free WiFi is typically offered on a(n) _____ network.
Unencrypted
A _____ spreads from one machine to another, rapidly without human action.
Worm
Can music be protected by copyright?
Yes
Does a company have the right to monitor all your digital communications if you are using their equipment?
Yes
Is "Ih@%eC@ts!" a strong password?
Yes
Is an image you do not have the right to use NOT considered a digital asset?
Yes
Is making hateful comments about someone through emails, blogs, online profiles, or chat rooms considered a method of cyber bullying?
Yes
Is the following an example of cyber bullying; chad secretly posts mean messages in response to all of William's status updates. Chad had also created a whole website for other classmates to post lies about William.
Yes
A digital native is a person who has been exposed to technology at a(n) _____ and is comfortable using it.
Young age