Key Terms
Digital Citizenship
Communication
Computers
Mixed Bag
100

This term describes "the ability to select and responsibly use technology tools to access, manage, evaluate, and communicate information."
Answer format: What is ____?

What is CC (or "To" if addressing direct recipient)? — Use "To" for primary recipients; use "CC" to copy visible recipients. Typical use case: CC a manager to keep them informed.

100

Which email field should you use when you want recipients to be visible to all recipients? (From the chapter content: To, CC, or BCC?) Provide the correct field and one typical use case.

What is CC (or "To" if addressing direct recipient)? — Use "To" for primary recipients; use "CC" to copy visible recipients. Typical use case: CC a manager to keep them informed.

100

What are the basic structural components of an email as defined in the chapter? List them.

What is the basic structure of an email? — To, From, Subject, Greeting, message body, signature, and possibly attachments.

100

What is a computer file, based on the chapter definitions?

What is a computer file? — A resource for storing information available on a computer program and usually based on durable storage.

100

What is "netiquette" as defined in the source?

What is netiquette? — The etiquette governing communication on the internet.

200

This is "a hierarchy of directories that consists of a single directory called the parent directory, or top-level directory, and all levels of its subdirectories." Give the term and briefly explain how it helps you organize files.

What is a directory tree? — It helps by grouping folders and subfolders logically so you can find files quickly.

200

List three rules you should follow to be a responsible digital citizen (draw from the Test Your Knowledge answers). For each rule give one short workplace example.

Possible answers include: Get permission before posting others' media; Use respectful language and appropriate grammar; Do not hide behind anonymity. Workplace examples: (a) Ask a coworker for permission before sharing their photo on social media. (b) Write professional emails to clients. (c) Use real account names for internal discussion boards.

200

Give two examples of appropriate workplace language or tone when writing a professional email and explain why they are important.

Examples: Use clear, professional language (e.g., "Please review the attached report") and polite closings (e.g., "Sincerely, [Name]") — they maintain respect and clarity.

200

Describe a simple troubleshooting step you should take first when a computer malfunctions, according to the chapter.

First troubleshooting step: Restart your computer.

200

What agency registers copyrights in the United States?

The US Copyright Office.

300

This legal concept "signifies that others must have permission to use the work" created by someone else and gives the creator exclusive rights. Name it and give one example of what it protects.

What is copyright? — Example: protects a written article, a photo, or a digital design.

300

The chapter lists several components that make up a strong foundation in tech literacy. Name three of these components and explain why each is important for a 10th‑grade student preparing for the workplace.

Examples: understanding computer hardware and software; creating documents/spreadsheets/presentations; recognizing responsible technology use. Importance: enables productivity, communication, data handling.

300

Explain the difference between the primary recipient and a copied recipient in email communication and how that affects expected responses.

Primary recipients (To) are expected to take action or respond; copied recipients (CC) are informed but not usually expected to reply.

300

Explain why consistent and meaningful file names and logically labeled folders help with file access. Give one concrete example of a good file-naming convention.  

Consistent names and labeled folders make files searchable and easy to locate. Example naming convention: YYYY-MM-DD_ProjectName_Version (e.g., 2025-11-24_Budget_v2).

300

Identify two types of intellectual property protection besides copyright (from the documents) and give a short workplace example for each.


Patent — example: exclusive rights to produce a new device; Trademark — example: company logo protection.

400

Define "plagiarism" as given in the source, and describe one workplace consequence an employee might face for committing it.


What is plagiarism? —  Plagiarism is using someone else's words, ideas, or work and presenting them as your own without giving credit to the original source 

Consequence example: disciplinary action, loss of credibility, or termination in a workplace.

400

Give two examples of how an employee could use Creative Commons resources correctly in a workplace project. Be specific about attribution or permissions.

Examples: (a) Find a Creative Commons–licensed image labeled for commercial use and include the proper attribution line (creator name, license, link). (b) Use music under a CC license that allows reuse and provide required credits in the project.

400

Describe one scenario where using casual language in a digital workplace communication would be inappropriate, and suggest an alternative phrasing.

Scenario: Sending a casual joke about a client in an email to company leadership is inappropriate. Alternative: Keep tone formal and factual, e.g., "I recommend we proceed with the proposed timeline because..."

400

Define "directory tree" and draw (describe) a short example structure with a parent directory, two subfolders, and a file in one subfolder.

What is a directory tree? — A hierarchy with a parent directory and levels of subdirectories. Example: Parent: "ClassProjects" → Subfolder "Research" (contains "report.docx") and Subfolder "Presentations".

400

What is the "fair use doctrine" and when might it allow limited use of copyrighted material? Give one classroom-appropriate example.

Fair use doctrine — allows limited use of copyrighted works in specific situations (e.g., classroom quotation of a short passage for analysis).

500

Compare and contrast "patent," "trademark," and "copyright" — give a one‑sentence description of each and an example of what each protects.

Patent — legal right to be sole producer of a product (example: a new device design). Trademark — protection of symbols, words, phrases unique to a product/company (example: a logo). Copyright — legal right of a creator to use or sell a work (example: a book, song, or photo).

500

A coworker suggests posting a customer testimonial with a photo without asking permission. Using the chapter's guidance about ethics and intellectual property, write a short response you could give that explains whether this is appropriate and what steps to take before posting.

Example response: Explain that posting customer photos without permission may violate privacy and copyright; recommend obtaining written permission from the customer, check company code of conduct, and follow any terms of use or Creative Commons/license restrictions. If unsure, consult the organization's code of ethics and legal or communications team before posting.

500

Draft a short professional email (2–3 sentences) you could send to request permission to use a coworker’s photo in a publication. Include which email components from the chapter you used.

Example email:
To: [Coworker]
Subject: Permission to Use Photo for Publication
Greeting: Hi [Name],
Body: I’m preparing a project that includes staff photos and would like to include the photo you took at the event. May I have your permission to use it in our upcoming brochure? I will include your name in the credit line.
Signature: Thank you, [Your Name]

500

List three tech literacy skills required for many professionals and match each to a real workplace task (e.g., spreadsheets → budgeting).

Examples: Touch typing → faster document creation; Word processing → preparing reports; Spreadsheets → analyzing budgets.

500

Provide three questions employees can ask themselves to distinguish between ethical and unethical practices, as suggested in the chapter.

Examples of questions: Does the action violate the company’s code of conduct? Does it break any laws? Would someone you respect be embarrassed if they saw you doing this?

M
e
n
u