Using the Internet to harass or threaten someone is known as ____.
Cyberbullying
The standard of appropriate behavior when using technology to communicate is digital ____.
Citizenship
The principles of what is right and wrong that help people make decisions are ____.
ethics
Spamming is ____.
A. illegal
B. Unethical
C. Both
D. Netiher
Both
An illegal act that involves stealing someone's personal information and using it to commit theft or fraud is ____.
Identity Theft
A program that monitors information coming into a computer and helps ensure that only safe information gets through is a(n) ____.
firewall
Which article(s) of the Electronic User's Bill of Rights provide the right of ownership for intellectual property?
I: Individual Rights, and III: Rights of Educational Institutions
A Creative Commons license is ____.
a specialized copyright license that allows free distribution of copyrighted work
If a website does not specifically state that the material is intended for others to reuse, you should assume that the material is ____.
under copyright and cannot be used without permission
All material, as soon as it is in tangible form, is automatically ____.
copyrighted
Claiming someone else’s material as your own.
plagiarism
Type of malware that seizes control of a computer and demands payment to unlock it.
ransomware
Software that captures private information by spying on a computer.
spyware
Verbally saying something false about someone that causes others to have a bad opinion of him or her.
slander
Illegally accessing or altering digital devices, software, or networks.
hacking
Unethical and illegal copying or downloading software, files, or other protected material.
piracy
General term for software programs intended to damage, destroy, or steal data.
malware
Using copyrighted material without the copyright holder’s permission.
infringement
Publishing a false statement about someone that causes others to have a bad or untrue opinion of him or her.
libel
Use of fraudulent e-mails and copies of valid websites to trick people into providing private and confidential data.
phishing
The exchange of information through electronic means is ______________________________ communication.
digital
Many companies have a(n) ______________________________ policy that explains what employees are and are not permitted to do with company-owned and company-operated equipment and networks.
acceptable use
Intentionally insulting someone on social media to incite an argument is considered ______________________________.
flaming
Another name for digital etiquette is ______________________________.
netiquette
Software that has had its source code made available to the public at no charge is called ______________________________ software.
open source