Digital Citizenship

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Positive

Having a skilled labor force is one of the _____ impacts of technology in the workplace.

True

A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software (t/f)

Detects

Antivirus software is a computer program that _____. prevents, and takes action to disarm or remove malicious software programs.

Before taking action

Asking questions are important to determining the best use of digital communication because they help me think _____, which helps me make better decisions.

Emotional reaction

Before I post something online that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _____?"

Unencrypted

Free WiFi is typically offered on a(n) _____ network.

True

Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment (t/f)

Digital assets create digital footprints

How are digital assets and digital footprints related?

True

Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain (t/f)

False

If you do not personally know the bully in a situation, you should still approach them directly and tell them to stop.

Consequences

If you participate in the bad digital communication choices of others, you may put yourself at risk for _____.

Ask them to stop

If your friends are involved in cyber bullying, you should:

True

Illegal sharing of confidential and propriety information can cause a company to lose business, money, and possibly its competitive advantage.

False

In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords (t/f)

Expulsion

In severe cases of cyber bullying, students that are involved can get _____ from school.

True

Intellectual property is the works, inventions or creations of an individual, group or business (t/f)

Yes

Is "Ih@%eC@ts!" a strong password?

No

Is "WS1979" a strong password?

Yes

Is an image you do not have the right to use NOT considered a digital asset?

Yes

Is making hateful comments about someone through emails, blogs, online profiles, or chat rooms considered a method of cyber bullying?

No

Is the following an example of cyber bullying: Amanda has a crush on Joseph. She regularly likes his posts and always says something nice about his pictures.

Yes

Is the following an example of cyber bullying; chad secretly posts mean messages in response to all of William's status updates. Chad had also created a whole website for other classmates to post lies about William.

Delete the email

Julia receives an email from an unknown source. The subject of the mail looks strange and it has an attachment. What should Julia do?

Negative

Lack of downtime is one of the _____ impacts of technology on the workplace.

Malicious intent

Malware is software that has _____.

True

One of the questions I should ask myself before using digital communication is, "Would I like for someone to share that about me?"

True

Visiting Internet sites that are prohibited by an employer could result in consequences up to and including termination.

Purchased license

What is a license that is paid for by number of machines or number of people using the software?

Freeware

What is software that is available for use at no cost, but usually has some restricted usage rights?

Shareware

What is software that is provided to others with restrictions or for a certain limited trial basis?

Financial

What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?

Medical

What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?

Government

What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or reap other benefits?

Hacking

_____ is the act of breaking into a computer to steal information.

Piracy

_____ is the stealing of copyrighted work by downloading or copying it in order to keep, sell, or give away without permission and without paying.

Ask Mike if he sent the email

Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an attachment. What should Ryan do?

Computer virus

A _____ attaches itself to a file or program, enabling it to spread from one computer to another.

Criminal

A _____ conviction in a cyber bullying case may result in fines and jail time.

Civil

A _____ conviction in a cyber bullying case may result in the offender paying restitution to the victim's family.

Worm

A _____ spreads from one machine to another, rapidly without human action.

False

A copyright gives the creator of an original work exclusive right to that work, usually for an unlimited time.

Intentional

A digital footprint is all of the information online about a person posted by that person or others, _____

Young age

A digital native is a person who has been exposed to technology at a(n) _____ and is comfortable using it.

Positive

Efficiency is one of the _____ impacts of technology on the workplace.

Digital asset

Can contain textual content, images, and multimedia

Yes

Can music be protected by copyright?

Negative

Changing technology is one of the _____ impacts of technology in the workplace.

Business

Company email should only be used for _____ purposes.

Should not

Confidential and proprietary information is information that _____ be shared outside of the company without prior consent.

False

Cyber bullying is protected by Freedom of Speech.

Deliberate

Cyber bullying is the use of Information Technology to harm or harass other people in a _____, repeated, and hostile manner.

Negative

Dependency on technology is one of the _____ impacts of technology in the workplace.

Yes

Does a company have the right to monitor all your digital communications if you are using their equipment?

Stealing

Plagiarism is the _____ of someone else's words or ideas and presenting them as your own.

Forever

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain online _____.

False

Public domain represents works whose intellectual property rights have extended or works that have been released by the creator (t/f)

Authenticate

The "A" in the D.E.A.L. acronym stands for

Evaluate

The "E" in the D.E.A.L. acronym stands for:

Prohibited

Social networking sites are usually _____ during work hours unless the activity is work-related.

Positive

Staying connected is a _____ impact of technology on society.

Inequality

The digital divide is an economic _____ between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies.

Creative Commons-Attribution

The free distribution of copyrighted work with the proper credit to the creator.

False

The global digital divide is a digital dive between cities (t/f)

True

The primary goal of an Internet scam is to gain access to someone's personal information or their finances (t/f)

Fair Use rule of Copyright Law

This law explains when the free use of copyrighted material is acceptable.

Discriminatory

Though there are no specific federal laws for cyber bullying, in some cases cyber bullying overlaps with _____ harassment.

Authority figures

To whom should you report cyber bullying?


Set pelajaran terkait

Intro to Business - Chapter 2 Vocab & Concepts

View Set

Solving quadratic equations in factored form

View Set