using the Internet to bully, harass, insult, and verbally harm someone is called?
cyberbullying
What is it called when you claim another person's work as your own?
plagiarism
What is a long number that's used to identify electronic devices?
IP address/Internet Protocol address
Virus protection software is called...
antivirus
an illegal and unethical act of stealing a person's personal information for theft/fraud
identity theft
a code of polite conduct, behavior, and good manners?
etiquette
Illegally downloading/using files and protected material when you're not supposed to?
piracy
What are bits of data that store information about your visited websites called?
cookies
Software that spies on a computer is called...
Spyware
To be safe, what should you do to your computer in case a virus invades or the hard disk crashes?
back up your computer
a data record of all an individual's online activites?
digital footprint
What acknowledges ownership of a work and specifies that only the owner has rights to it?
copyright
What is it called when someone attempts to exploit a computer system inside a computer?
hacking
A computer program designed to harm systems by infecting files is?
software virus
What software prevents pop-up ads that might contain malware?
pop-up blocker
somebody that frequently and skillfully uses technology like the Internet, computers, and other digital devices?
digital citizen
What is material owned by anybody, and open to the public for free use?
public domain
What is a set of rules that explains what is acceptable to be doing on company owned equipment?
acceptable use policy
Malware disguised as useful apps to confuse people to download the program are?
trojan horses
What kind of plan should you create to make sure your computer, databases, and devices are safe?
security plan
the ability to navigate the internet skillfully to locate/evaluate information? Examples such as: using a keyboard, searching Google, using social media, etc.
digital literacy
What gives a person or company the right to be the sole producer of a product for a defined period of time?
patent
Using a network of private servers to use the Internet instead of personal servers is called?
Cloud computing
What is a program that blocks unauthorized access and information coming into a computer?
firewall
Stealing physical mail to commit identity fraud is called...
dumpster diving