Digital Citizenship and Cyber Hygiene

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this? wind +power "wind" +Germany "wind power" -Spain "wind power" +Germany

"wind power" +Germany

Which of the following lists the types of copyright license from most restrictive to least restrictive? Public Domain, All Rights Reserved, Some Rights Reserved Public Domain, Some Rights Reserved, All Rights Reserved All Rights Reserved, Some Rights Reserved, Public Domain All Rights Reserved, Public Domain, Some Rights Reserved

All Rights Reserved, Some Rights Reserved, Public Domain

A privacy policy discloses: How a company uses your data How a company shares your data How a company gathers your data All of the above

All of the above

Victims of cyberbullying may experience which of the following? Isolation Low self-esteem Depression All of the above

All of the above

Which of the following actions will help you avoid violation of copyright laws? Always cite sources Check the copyright to make sure it can be used by others without permission Use public domain media All of the above

All of the above

Which of the following are best practices for having a secure password? Creating a password that is long in length Creating a password that has a combination of letters, numbers, and special characters Using a password manager All of the above

All of the above

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint. True False

False

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity. True False

False

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

False

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what. True. This is always the case. True. Changing your settings does not affect the privacy policy. False. It depends if the privacy policy allows you to opt in or out of sharing data. False. Companies do not give you the option to update your settings.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

A person's digital footprint consists of the following: I. Comments you leave II. Pictures you post III. Topics you search IV. Apps you use V. Music you download VI. Emails you send

I - VI all

Which of the following are safety guidelines when socializing online? I. Be wary when communicating with people you don't know in real life II. Don't disclose personal information-even if it doesn't seem important III. Don't have any social media accounts IV. Block/report if you are being harassed V. Don't send or receive any emails VI. Ask a trusted adult if you need help

I, II, IV, and VI

Which of the following statements are true about cyberbullying: I. Cyberbullying uses electronic communication to bully a person. II. Cyberbullying is a crime in many states. III. Instances of cyberbullying do not affect the digital footprint of the victim. IV. Cyberbullying hurts real people even though we can't always see their reactions online.

I, II, and IV

Which of the following can help you to maintain your digital footprint? I. Using privacy settings to limit your exposure II. Posting long rants when you are angry about something III. Reviewing posts you are tagged in and taking action if needed IV. Googling yourself on a regular basis I and IV I, II and III I, III, and IV All of the above.

I, III, and IV

Which of the following describes an instance of legal hacking? Looking for security risks on a product that is excluded from a bug bounty program. Penetration testing for a company Grey hat hacking Security hacking is never legal

Penetration testing for a company

Which of the following describes a credible source? The author is not listed There are no sources cited The page is poorly designed and confusing to navigate The domain is .edu

The domain is .edu

What is a digital footprint

The information about a particular person that exists on the internet as a result of their online activity

What is not true of white hat hackers? They contribute to robust security systems They use the same methods as black hat hackers They alert companies of security vulnerabilities They are breaking the law and are at risk of legal repercussions

They are breaking the law and are at risk of legal repercussions

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying). False True

True

true / false if you delete something no one can ever find it again

false


Ensembles d'études connexes

Chapter 7 Practice Questions - Mental Imagery & Cognitive Maps

View Set

Primavera Online - Geometry A - Unit 2

View Set

Soft Skills 8 - Effective Listening / Master In-Demand Professional Soft Skills / LinkedIn Learning Pathway

View Set

Chapter 9 - 14 Combined for Final, Management Final Combined Info Rev 1

View Set

infant & childhood development final

View Set