Communicating digitally
True or False
Ownership and Property
Negative impacts and Hacking
Technology
100

The ability to communicate, evaluate, and create information through technology.

What is digital literacy?

100

True or False: Infringement is any use of copyrighted material without permission.

True.

100

The unethical and illegal copying of downloading software, files, and other protected materials:

What is Piracy?

100

 You keep getting spam emails and emails from addresses you don't know. This action is called _____________.

Phishing

100

A program that monitors information coming into a computer:

What is a Firewall?

200

 When you text, call, or email someone it is an example of ______ _______________.

Digital communication

200

True or False: Spyware are bits of data stored on your computer that record information about websites you visited.

False. Answer: Cookies

200

Your friend didn’t do their assignment and used your work as their own. What is this an example of?

Plagiarism

200

Someone is harassing or threatening a person online. What should you report them for?

Cyberbullying

200

A hacker creates a computer program to destroy or negatively impact your computer system by infecting other files. What is this program usually called?

A software Virus

300

If a person uses technology daily or regularly they would be considered a _____ ______.

Digital citizen

300

True or False: An illegal act that involves stealing someone's personal information and using that information to commit theft or fraud is hacking.

False. Answer: Identity Theft

300

Your friend had an idea for a business and planned out a whole marketing campaign. What is that an example of?

Intellectual property

300

At an office, someone spreads a rumor by mouth, about one of your bosses. What is that an example of?

A slander

300

Imagine you lose your phone but you have an app on another device to track its location. What would the location app use to track your phone?

An IP address (Intellectual property address)

400

A person sends an email with proper grammar and spelling. What is this an example of?

Netiquette

400

True or False: Fair use of doctrine is to prevent individuals to use copyrighted works without permission in limited circumstances under very strict guidelines.

False. Answer: Fair use of doctrine is to ALLOW individuals to use copyrighted works without permission

400

If a photographer's copyright contract is expired for a photo, meaning it won't be owned by anyone, then anyone is permitted to use that picture. The photo would be considered as ________ _________.

Public Domain

400

A person makes a negative post or propaganda about your friend online to stir up drama in your friend group. What is this an example of?

 A Libel

400

You are not comfortable with having your work files share a server with your personal data so you decide to use a remote server to separate them. This is an example of ________

Cloud computing

500

Your friend comments on a picture and then posts something on her story but later deletes it. Where is all this information stored and saved?

A digital footprint

500

True or False: If a baker files and claims copyright for a recipe they created, then they have the right to sell the recipe, use it, or do with it however they please.

True.

500

A software developer created software that anyone could use without permission and without charge/fee. The software would be considered as ______ ______.

Open source

500

Something was downloaded or installed on your computer that is stealing and damaging your data. What is this type of software called?

Malware

500

At a workplace, there are filters to prevent unwanted sites during office hours. What policy would you find this information in?

An acceptable use policy

M
e
n
u