The ability to communicate, evaluate, and create information through technology.
What is digital literacy?
True or False: Infringement is any use of copyrighted material without permission.
True.
The unethical and illegal copying of downloading software, files, and other protected materials:
What is Piracy?
You keep getting spam emails and emails from addresses you don't know. This action is called _____________.
Phishing
A program that monitors information coming into a computer:
What is a Firewall?
When you text, call, or email someone it is an example of ______ _______________.
Digital communication
True or False: Spyware are bits of data stored on your computer that record information about websites you visited.
False. Answer: Cookies
Your friend didn’t do their assignment and used your work as their own. What is this an example of?
Plagiarism
Someone is harassing or threatening a person online. What should you report them for?
Cyberbullying
A hacker creates a computer program to destroy or negatively impact your computer system by infecting other files. What is this program usually called?
A software Virus
If a person uses technology daily or regularly they would be considered a _____ ______.
Digital citizen
True or False: An illegal act that involves stealing someone's personal information and using that information to commit theft or fraud is hacking.
False. Answer: Identity Theft
Your friend had an idea for a business and planned out a whole marketing campaign. What is that an example of?
Intellectual property
At an office, someone spreads a rumor by mouth, about one of your bosses. What is that an example of?
A slander
Imagine you lose your phone but you have an app on another device to track its location. What would the location app use to track your phone?
An IP address (Intellectual property address)
A person sends an email with proper grammar and spelling. What is this an example of?
Netiquette
True or False: Fair use of doctrine is to prevent individuals to use copyrighted works without permission in limited circumstances under very strict guidelines.
False. Answer: Fair use of doctrine is to ALLOW individuals to use copyrighted works without permission
If a photographer's copyright contract is expired for a photo, meaning it won't be owned by anyone, then anyone is permitted to use that picture. The photo would be considered as ________ _________.
Public Domain
A person makes a negative post or propaganda about your friend online to stir up drama in your friend group. What is this an example of?
A Libel
You are not comfortable with having your work files share a server with your personal data so you decide to use a remote server to separate them. This is an example of ________
Cloud computing
Your friend comments on a picture and then posts something on her story but later deletes it. Where is all this information stored and saved?
A digital footprint
True or False: If a baker files and claims copyright for a recipe they created, then they have the right to sell the recipe, use it, or do with it however they please.
True.
A software developer created software that anyone could use without permission and without charge/fee. The software would be considered as ______ ______.
Open source
Something was downloaded or installed on your computer that is stealing and damaging your data. What is this type of software called?
Malware
At a workplace, there are filters to prevent unwanted sites during office hours. What policy would you find this information in?
An acceptable use policy