Digital Citizenship Unit Test Study Guide
malware
software that has malicious intent
worms
spreads from one machine to another, rapidly, without human action
digital asset
textual content, images, and multimedia, that the creator, must have the right to use
cyber bullying
the use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner
financial identity theft
thief that spends another person's or opens a line of credit in their name
criminal identity theft
thief that uses someone else's identity to commit a crime
governmental identity theft
thief uses SSN to file taxes or reap other governmental benefits
medical identity theft
thief uses identity to gain medical treatment or commit insurance fraud
Global Deterioration, Inactive Lifestyles, Decreased. Human Interaction
3 Negative impacts of technology on society
Staying connected, important medical improvements, unlimited access to knowledge
3 positive impacts of technology on society
Creator; limited
A copyright gives the __________ of an original work exclusive right to the work, usually for a ______ time
detects, prevents, takes action
Antivirus software is a computer program that _________, ___________, and ____________ to disarm or remove malicious software programs
policy; conduct
Company ___________ and a personal code of digital ____________ will help you determine what websites are allowed on company provided hardware/software
work
Company email should only be used for ___________ purposes
Handango
Company that introduced the first on-device application store
Hapifork
Device created to help people monitor food intake and pace of consumption(2013)
Digital Divide
Economic inequality between groups, broadly constructed, in terms of access to, use of, or knowledge of information and communication technologies
Creative Commons Attribution
Fee distribution of copyrighted work WITH the proper credit to the creator is called
unencrypted
Free Wi-Fi is typically offered on a(n) _______________
acted upon
Harassment that is captured via digital communication must still be ________________, whether the person being harassed reports it or not
digital assets make digital footprints
How are digital footprints and digital assets related?
$899
How much did the first smartphone cost
hiring mangers and college admissions officers
who are some of the people who use social media and other internet resources to research candidates
report
If someone is being bullied, you should ___________ it
ask them to stop
If your friends are involved in cyber bullying, you should:
money;customers; advantage
Illegal sharing of confidential and proprietary information can cause a company to lose _______, _________, and possibly its competitive _____________
expulsion
In severe cases of cyber bullying, students that are involved can get __________from school
Plagrism
Is the stealing of someone else's words or ideas and presenting them as your own
Purchased license
License that is paid for by number of machines or number of people using the software
email, status updates, and social media profile
List examples of digital assets
1)personal information should be kept personal 2)never provide your SSN 3)know who you are communicating with 4) if you are receiving some type of deal or offer, get the facts before making any commitments
List the ways to avoid internet scams
contestant wins, dating schemes, and bank or credit card company
List three common internet scams
Dependency, No downtime, and Changing Technology
List three negative impacts of technology in the workplace
Connectivity, Efficiency, and Skilled Labor force
List three positive impacts of technology in the work place
email attachments and pop up ads
List two ways malware can be shared
2003;2013
MySpace was born in __________ and revived in ____________
forever
Once information is added to a digital footprint, it may remain there
Digital Native
Person who has been expressed to technology from a young age and is pretty comfortable using it
Keep, sell, give away
Piracy is the stealing of copyrighted work by downloading or copying it in order to ________,_________, or _____________ without permission or without paying
Software
Program used by a computer
Expired; released
Public domain represents works whose intellectual property rights have _________ or works that have been _________ by the creator
networking
Social _____________ sites are usually prohibited during work hours unless the activity is work-related
shareware
Software belonging to a person or company that is provided to others with restrictions or for a certain limited trail base
Freeware
Software that is available for use at no cost, but usually have some restricted
upper and lower case letters, numbers, and symbols
Strong Passwords include:
When free use of copyrighted material is acceptable
The Fair Use of copyrighted law explains
discriminatory harassment
Though there are no specific federal laws for cyber bullying, in some cases cyber bullying overlaps with
parents and teachers
To whom should you report cyber bullying
False
True or False: A copyright can cover facts, ideas, systems, or methods of operation
True
True or False: A software license is an agreement between you and the owner of a software program that allows you to preform certain tasks with the software
False
True or False: Companies do not have the right to monitor all digital communication that is sent and received using company provided hardware/software
True
True or False: Cyber Bullying is not protected by Freedom of Speech
True
True or False: Hacking is the act of cracking into a computer to steal information
True
True or False: Identify theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain
False
True or False: If you do not know the bully in a situation, you should still approach them directly and tell them to stop
True
True or False: If you participate, in the bad digital communication choices of others, you may put yourself at risk for consequences.
True
True or False: In addition to internet usage and email, instant messaging or chatting may also be monitored by a company
True
True or False: Intellectual property is the works, inventions, or creations of an individual, group, or business
False
True or False: It is appropriate to use company time for personal social networking
False
True or False: Making decisions about using digital communication when i am angry is a good idea.
True
True or False: The global digital divide is a digital divide between countries.
False
True or False: The primary goal of an internet scam is just to tease someone with fake information
True
True or False: These questions are important to determining the best use of digital communication because they help me think before taking action, which helps me make better decisions.
termination of employment
Visiting internet sites that are prohibited (off-limits) by an employer could result in consequences up to and including ___________________
Criticism and comment, news reporting, research and scholarship, Nonprofit Education Uses, and Parody
What are five general terms of the Fair Use rule:
1) sending insulting and /or threatening emails, texts, or instant messages directly to Alica's computer computer, cell phone, and other e-communications devices 2) hateful commits about someone through emails, blogs, online profiles, or chat rooms 3)stealing passwords and sending threatening message using a false identity 4)building a web site targeting specific people
What are methods of cyber bullying?
1)don't use information that is personal or easy to guess 2) don't share your passwords with anyone 3) change your password frequently or use a different one for each site you visit
What are some steps you can take to protect your passwords?
1)Do not open emails or attachments from unfamiliar email addresses 2) Question suspicious attachments from people you know 3) Right click the pop up task bar or use the task manager to close pop up ads 4) Use tools to prevent viewing potentially dangerous sites
What are some ways to avoid hacking or malware attacks?
1) Would I️ like someone to share that about me? 2) Do I️ know this person well enough to know if he or she will mind me sharing this information? 3) Would I️ do it say this in person, or if my family were watching? 4) Am is doing this because of an emotional reaction? 5) Am I️ breaking the law or violating school policy? 6) Does this behavior really represent who I️ am?
What are the 6 questions that will help you monitor your own behavior with digital communication.
Computer games, Apps, and Email
What are three items that are considered software on your computer
certain members of the company shouldn't be allowed to see it
What does it mean when company information is confidential and proprietary?
D- Determine if the material is relevant and appropriate E- Evaluate whether the information is current A- Authenticate that the information is accurate L- Look at why the resource was created
What is the acronym for DEAL?
rules;law;rules
When visiting websites, you should consider whether you are breaking school __________, the _________, and your parents __________
1999
Wi-Fi was introduced in
1990
Year the first portable MP3 player launched
digital footprint
all of the information online about a person either posted by that person or others, intentionally or unintentionally
computer virus
attaches itself to a file or program, enabling it to spread from one computer to another
criminal convictions
includes fines and jail time
Civil convictions
including restitution ( compensation for loss, damage, or injury caused)