Digital Citizenship Test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is NOT considered a digital asset?

An image that you do not have the right to use

To whom should you report cyberbullying?

Authority figures

How are digital assets and digital footprints related?

Digital assets create digital footprints

A copyright gives the creator of an original work exclusive right to that work, usually for an unlimited time. True or False

False

Cyberbullying is protected by Freedom of Speech. True or False

False

If you do not personally know the bully in a situation, you should still approach them directly and tell them to stop. True or False

False

In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords. True or False

False

Making decisions about using digital communication when I am angry is a good idea. True or False

False

The global digital divide is a digital divide between cities. True or False

False

What is software that is available for use at no cost, but usually has some restricted usage rights?

Freeware

___________________ is the act of breaking into a computer to steal information.

Hacking

Which of the following is a negative impact of technology on society?

Inactive lifestyles

What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?

Medical

Is "WS1979" a strong password?

No

What is a license that is paid for by number of machines or number of people using the software?

Purchased liscense

What is software that is provided to others with restrictions or for a certain limited trial basis?

Shareware

A digital asset can contain textual content, images, and multimedia. True or False

True

A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software. True or False

True

Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared. True or False

True

Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment. True or False

True

Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain. True or False

True

Illegal sharing of confidential and proprietary information can cause a company to lose business, money, and possibly its competitive advantage. True or False

True

Intellectual property is the works, inventions or creations of an individual, group or business. True or False

True

One of the questions I should ask myself before using digital communication is, "Would I like for someone to share that about me?" True or False

True

The primary goal of an Internet scam is to gain access to someone's personal information or their finances. True or False

True

Does a company have the right to monitor all your digital communications if you are using their equipment?

Yes

Is the following an example of cyberbullying: Chad secretly posts mean messages in response to all of William's status updates. Chad has also created a whole website for other classmates to post lies about William.

Yes

Asking questions are important to determining the best use of digital communication because they help me think _______________________, which helps me make better decisions.

before taking action

Company email should only be used for _________ purposes.

business

A ____________ attaches itself to a file or program, enabling it to spread from one computer to another.

computer virus

If you participate in the bad digital communication choices of others, you may put yourself at risk for __________________.

consequences

A ________________ conviction in a cyberbullying case may result in fines and jail time.

criminal

Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?

criminal

Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?

delete the email

Cyberbullying is the use of Information Technology to harm or harass other people in a _______________, repeated, and hostile manner.

deliberate

Though there are no specific federal laws for cyberbullying, in some cases cyberbullying overlaps with ________________ harassment.

discriminatory

Before I post something on-line that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _______________________?"

emotional reaction

The "E" in the D.E.A.L. acronym stands for

evaluate

In severe cases of cyberbullying, students that are involved can get ____________ from school.

expulsion

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line _________________________.

forever

A digital footprint is all of the information on-line about a person posted by that person or others, ________________________.

intentionally or unintentionally

Changing technology is one of the ________________ impacts of technology on the workplace.

negative

Is the following an example of cyberbullying: Amanda has a crush on Charlie. She regularly likes his posts and always says something nice about his pictures.

no

___________________ is the stealing of copyrighted work by downloading or copying it in order to keep, sell, or give away without permission and without paying.

piracy

Connectivity is one of the ________________ impacts of technology on the workplace.

positive

Efficiency is one of the ________________ impacts of technology on the workplace.

positive

Having a skilled labor force is one of the ________________ impacts of technology on the workplace.

positive

Social networking sites are usually ________________ during work hours unless the activity is work-related.

prohibited

If someone is being bullied, you should _________________ it.

report

Which of the following is a positive impact of technology on society?

staying connected

Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own.

stealing

Free Wi-Fi is typically offered on a(n) _____________ network.

unecrypted

The Fair Use rule of copyright law explains __________.

when free use of copyrighted material is acceptable.

"Creative Commons-Attribution" is the free distribution of copyrighted work _____________ the proper credit to the creator.

with

A ____________ spreads from one machine to another, rapidly, without human action.

worm

A digital native is a person who has been exposed to technology at a(n) ____________________ and is comfortable using it.

young age


संबंधित स्टडी सेट्स

Segment 8 - The Mortgage Loan Application

View Set

MIS 441: Clustering and K-means Clustering

View Set

Iggy chapter 45 Review questions

View Set

Healthy Wealthy Wise-Last 3 quizzes

View Set

Ch 1 Introducing Gov. True or False

View Set