Digital Communication
Online Safety
Random
100

Company email should only be used for _________ purposes.

Business

100

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.

forever

100

If someone is being bullied, you should _________________ it

report

200

In severe cases of cyberbullying, students that are involved can get ____________ from school.

Expulsion

200

Free Wi-Fi is typically offered on a(n) __________ network

unencrypted

200

Though there are no specific federal laws for cyberbullying, in some cases cyberbullying overlaps with ________________ harassment.

discriminatory

300

A ________________ conviction in a cyberbullying case may result in fines and jail time.

Criminal

300

Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?

Criminal


300

Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own.

stealing

400

To whom should you report cyberbullying?

Authority figures

400

A __________ attaches itself to a file or program, enabling it to spread from one computer to another.

computer virus

400

What is a license that is paid for by number of machines or number of people using the software?

Purchased license

500

Cyberbullying is the use of Information Technology to harm or harass other people in a _______________, repeated, and hostile manner.

deliberate

500

Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?

Delete the email

500

What is software that is provided to others with restrictions or for a certain limited trial basis?

Shareware

M
e
n
u