Digital Citizenship Unit Test Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

malware

software that has malicious intent

worms

spreads from one machine to another, rapidly, without human action

digital asset

textual content, images, and multimedia, that the creator, must have the right to use

cyber bullying

the use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner

financial identity theft

thief that spends another person's or opens a line of credit in their name

criminal identity theft

thief that uses someone else's identity to commit a crime

governmental identity theft

thief uses SSN to file taxes or reap other governmental benefits

medical identity theft

thief uses identity to gain medical treatment or commit insurance fraud

Global Deterioration, Inactive Lifestyles, Decreased. Human Interaction

3 Negative impacts of technology on society

Staying connected, important medical improvements, unlimited access to knowledge

3 positive impacts of technology on society

Creator; limited

A copyright gives the __________ of an original work exclusive right to the work, usually for a ______ time

detects, prevents, takes action

Antivirus software is a computer program that _________, ___________, and ____________ to disarm or remove malicious software programs

policy; conduct

Company ___________ and a personal code of digital ____________ will help you determine what websites are allowed on company provided hardware/software

work

Company email should only be used for ___________ purposes

Handango

Company that introduced the first on-device application store

Hapifork

Device created to help people monitor food intake and pace of consumption(2013)

Digital Divide

Economic inequality between groups, broadly constructed, in terms of access to, use of, or knowledge of information and communication technologies

Creative Commons Attribution

Fee distribution of copyrighted work WITH the proper credit to the creator is called

unencrypted

Free Wi-Fi is typically offered on a(n) _______________

acted upon

Harassment that is captured via digital communication must still be ________________, whether the person being harassed reports it or not

digital assets make digital footprints

How are digital footprints and digital assets related?

$899

How much did the first smartphone cost

hiring mangers and college admissions officers

who are some of the people who use social media and other internet resources to research candidates

report

If someone is being bullied, you should ___________ it

ask them to stop

If your friends are involved in cyber bullying, you should:

money;customers; advantage

Illegal sharing of confidential and proprietary information can cause a company to lose _______, _________, and possibly its competitive _____________

expulsion

In severe cases of cyber bullying, students that are involved can get __________from school

Plagrism

Is the stealing of someone else's words or ideas and presenting them as your own

Purchased license

License that is paid for by number of machines or number of people using the software

email, status updates, and social media profile

List examples of digital assets

1)personal information should be kept personal 2)never provide your SSN 3)know who you are communicating with 4) if you are receiving some type of deal or offer, get the facts before making any commitments

List the ways to avoid internet scams

contestant wins, dating schemes, and bank or credit card company

List three common internet scams

Dependency, No downtime, and Changing Technology

List three negative impacts of technology in the workplace

Connectivity, Efficiency, and Skilled Labor force

List three positive impacts of technology in the work place

email attachments and pop up ads

List two ways malware can be shared

2003;2013

MySpace was born in __________ and revived in ____________

forever

Once information is added to a digital footprint, it may remain there

Digital Native

Person who has been expressed to technology from a young age and is pretty comfortable using it

Keep, sell, give away

Piracy is the stealing of copyrighted work by downloading or copying it in order to ________,_________, or _____________ without permission or without paying

Software

Program used by a computer

Expired; released

Public domain represents works whose intellectual property rights have _________ or works that have been _________ by the creator

networking

Social _____________ sites are usually prohibited during work hours unless the activity is work-related

shareware

Software belonging to a person or company that is provided to others with restrictions or for a certain limited trail base

Freeware

Software that is available for use at no cost, but usually have some restricted

upper and lower case letters, numbers, and symbols

Strong Passwords include:

When free use of copyrighted material is acceptable

The Fair Use of copyrighted law explains

discriminatory harassment

Though there are no specific federal laws for cyber bullying, in some cases cyber bullying overlaps with

parents and teachers

To whom should you report cyber bullying

False

True or False: A copyright can cover facts, ideas, systems, or methods of operation

True

True or False: A software license is an agreement between you and the owner of a software program that allows you to preform certain tasks with the software

False

True or False: Companies do not have the right to monitor all digital communication that is sent and received using company provided hardware/software

True

True or False: Cyber Bullying is not protected by Freedom of Speech

True

True or False: Hacking is the act of cracking into a computer to steal information

True

True or False: Identify theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain

False

True or False: If you do not know the bully in a situation, you should still approach them directly and tell them to stop

True

True or False: If you participate, in the bad digital communication choices of others, you may put yourself at risk for consequences.

True

True or False: In addition to internet usage and email, instant messaging or chatting may also be monitored by a company

True

True or False: Intellectual property is the works, inventions, or creations of an individual, group, or business

False

True or False: It is appropriate to use company time for personal social networking

False

True or False: Making decisions about using digital communication when i am angry is a good idea.

True

True or False: The global digital divide is a digital divide between countries.

False

True or False: The primary goal of an internet scam is just to tease someone with fake information

True

True or False: These questions are important to determining the best use of digital communication because they help me think before taking action, which helps me make better decisions.

termination of employment

Visiting internet sites that are prohibited (off-limits) by an employer could result in consequences up to and including ___________________

Criticism and comment, news reporting, research and scholarship, Nonprofit Education Uses, and Parody

What are five general terms of the Fair Use rule:

1) sending insulting and /or threatening emails, texts, or instant messages directly to Alica's computer computer, cell phone, and other e-communications devices 2) hateful commits about someone through emails, blogs, online profiles, or chat rooms 3)stealing passwords and sending threatening message using a false identity 4)building a web site targeting specific people

What are methods of cyber bullying?

1)don't use information that is personal or easy to guess 2) don't share your passwords with anyone 3) change your password frequently or use a different one for each site you visit

What are some steps you can take to protect your passwords?

1)Do not open emails or attachments from unfamiliar email addresses 2) Question suspicious attachments from people you know 3) Right click the pop up task bar or use the task manager to close pop up ads 4) Use tools to prevent viewing potentially dangerous sites

What are some ways to avoid hacking or malware attacks?

1) Would I️ like someone to share that about me? 2) Do I️ know this person well enough to know if he or she will mind me sharing this information? 3) Would I️ do it say this in person, or if my family were watching? 4) Am is doing this because of an emotional reaction? 5) Am I️ breaking the law or violating school policy? 6) Does this behavior really represent who I️ am?

What are the 6 questions that will help you monitor your own behavior with digital communication.

Computer games, Apps, and Email

What are three items that are considered software on your computer

certain members of the company shouldn't be allowed to see it

What does it mean when company information is confidential and proprietary?

D- Determine if the material is relevant and appropriate E- Evaluate whether the information is current A- Authenticate that the information is accurate L- Look at why the resource was created

What is the acronym for DEAL?

rules;law;rules

When visiting websites, you should consider whether you are breaking school __________, the _________, and your parents __________

1999

Wi-Fi was introduced in

1990

Year the first portable MP3 player launched

digital footprint

all of the information online about a person either posted by that person or others, intentionally or unintentionally

computer virus

attaches itself to a file or program, enabling it to spread from one computer to another

criminal convictions

includes fines and jail time

Civil convictions

including restitution ( compensation for loss, damage, or injury caused)


Ensembles d'études connexes

Physical Science Electron Dot Diagram

View Set

SSC101 - Chapter 3, SSC101 - Chapter 6, SSC101 - Chapter 5, SSC101 - Chapter 4, SSC101 - Chapter 2, SSC101 - Chapter 1, SSC102 - Chapter 1, SSC102 - Chapter 2, SSC102 - Chapter 3, SSC102 - Chapter 4, SSC102 - Chapter 5, SSC102 - Chapter 6, SSC102 - C...

View Set

CH-13 Encryption and Hashing Concepts

View Set

Compensation; The Benefit Determination Process (Chapter 12)

View Set