Company email should only be used for _________ purposes.
Business
Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.
forever
If someone is being bullied, you should _________________ it
report
In severe cases of cyberbullying, students that are involved can get ____________ from school.
Expulsion
Free Wi-Fi is typically offered on a(n) __________ network
unencrypted
Though there are no specific federal laws for cyberbullying, in some cases cyberbullying overlaps with ________________ harassment.
discriminatory
A ________________ conviction in a cyberbullying case may result in fines and jail time.
Criminal
Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?
Criminal
Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own.
stealing
To whom should you report cyberbullying?
Authority figures
A __________ attaches itself to a file or program, enabling it to spread from one computer to another.
computer virus
What is a license that is paid for by number of machines or number of people using the software?
Purchased license
Cyberbullying is the use of Information Technology to harm or harass other people in a _______________, repeated, and hostile manner.
deliberate
Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?
Delete the email
What is software that is provided to others with restrictions or for a certain limited trial basis?
Shareware