If a person uses technology daily or regularly they would be considered as a _____ ______.
Digital citizen
True or False: Spyware are bits of data stored on your computer that record information about websites you visited.
False. Answer: Cookies
The unethical and illegal copying of downloading software, files, and other protected materials:
What is Piracy?
Your friend didn’t do their assignment and used your work as their own. What is this an example of?
Plagiarism
A program that monitors information coming into a computer:
What is a Firewall?
When you text, call, or email someone it is an example of ______ _______________.
Digital communication
True or False: Infringement is any use of copyrighted material without permission.
True
Your friend had an idea for a business and planned out a whole marketing campaign. What is that an example of?
Intellectual property
Someone is harassing or threatening a person online. What should you report them for?
Cyberbullying
Imagine you lose your phone but you have an app on another device to track it’s location. What would the location app use to track your phone?
An IP address (Intellectual property address)
A person sends an email with proper grammar and spelling. What is this an example of?
Netiquette
True or False: An illegal act that involves stealing someone's personal information and using that information to commit theft or fraud is hacking.
False. Answer: identity theft
A software developer created a software that anyone could use without permission and without charge/fee. The software would be considered as ______ ______.
Open source
At an office someone spreads a rumor by mouth, about one of your bosses. What is that an example of?
A slander
You are not comfortable with having your work files share a server with your personal data so you decide to use a remote server to separate them. This is an example of ____ ________.
Cloud computing
The ability to communicate, evaluate, and create information through technology.
What is digital literacy?
True or False: Fair use of doctrine is to prevent individuals to use copyrighted works without permission in limited circumstances under very strict guidelines.
False. Answer: Fair use of doctrine is to ALLOW individuals to use copyrighted works.
At a workplace there are filters to prevent unwanted sites during office hours. What policy would you find this information in?
An acceptable use policy
You keep getting spam emails and emails from addresses you don't know. This action is called _____________.
Phishing
Something was downloaded or installed on your computer that is stealing and damaging your data. What is this type of software called?
Malware
Your friend comments on a picture and then posts something on her story but later deletes it. Everything you do on your device is stored here. Where is all this information stored and saved?
A digital footprint
True or False: If a baker files and claims copyright for a recipe they created, then they have the right to sell the recipe, use it, or do with it however they please.
True
If a photographer's copyright contract is expired for a photo, meaning it won't be owned by anyone, then anyone is permitted to use that picture. The photo would be considered as ________ _________.
Public Domain
A person makes a negative post or propaganda about your friend online to stir up drama in your friend group. What is this an example of?
A Libel