Digital citizenship is the appropriate behavior when using technology. True or false?
True
What doctrine allows individuals to use work without permission in limited situations?
The fair use doctrine
Your company and another company collaborate on a business idea. What is this an example of?
Cloud computing
What is an illegal act that involves taking someone’s personal information?
Identity theft
Referring to material that is not owned by anyone that can be used without permission is a product of _______.
Public domain
The ability to use technology to locate, evaluate, communicate, and create information
Digital literacy
An employee is illegally copying files from the company. what is this an example of?
Piracy
What is used to identify an electronic device connected to the internet?
An ip address
A software that can capture private information like usernames, passwords, bank account information, and other credit card information is called _______.
Spyware
what gives a person permission to be a sole producer of a product?
A patent
Someone who regularly and skillfully engages in the use of technology is what
A digital citizen
Your coworker is asking you for your work to present to their boss as their own. You deny the offer. What is the coworker’s action an example of?
Plagiarism
Bits of data stored on your computer that record your information on a website are called ______.
Cookies
What is a computer program that is designed to negatively impact a computer system by stealing files and data?
A software virus
A trademark only protects taglines and slogans. True or false?
False
An employee is using the internet to conduct searches and access emails and websites. What is this an example of?
Digital literacy
Your company gets its symbol and slogan copyrighted. What type of copyright is this?
A trademark
A coworker has gotten some strange emails from websites on their computer requesting their information. What is this an example of?
Phishing
Your boss gets a program on all computers in the office to monitor the information going through the computers to ensure only safe information goes through. What is this program called?
firewall
What is a contract for one-party permission to market, produce, or use the product or service owned by another party
A license agreement
In digital citizenship, Is cyberbullying an example of an ethical activity or a non-ethical activity?
Nonethical activity
You use a picture on your company website that you found online. When you show your boss they tell you to remove it immediately because of _______.
Infringement
There are software programs that are intended to steal or destroy data. What do we call these software programs?
Malware
Virus protection can also be referred to as what?
Antimalware or antivirus
The term ________ applies to software that's source code is available to the public at no cost.
Open source