The responsible and appropriate use of technology is called what?
Digital Citizenship
What is the best way to prevent unauthorized access to your online accounts?
Create a strong password.
The trail of information you leave behind when using the internet is called what?
Digital Footprint
By respecting others' privacy and not oversharing, you are ensuring healthy online __________________.
Boundaries
Name one factor of fair use.
Purpose
Amount
Nature
Effect
Finding equilibrium between online and offline activities is called what?
Media Balance
An attempt to trick people into revealing sensitive information is called what?
Phishing
What can a strong digital footprint contribute to in the future?
Better job
Better educational opportunities
Using technology to harass, threaten, or intimidate others is called ______________?
Cyberbullying
To balance the rights of copyright holders with the needs of users is the primary purpose of the four factors of _________ ______.
Fair Use
Features or aspects of a device or app that are intended to hook the user into frequent use are called
Addictive Design
Sharing your home address and phone number with strangers is considered an example of sharing ______________ information.
Private
Unknown or unanticipated people who can see information about you posted online are called?
Invisible Audience
People behaving more recklessly or rudely online than they would in person is called what?
Online Disinhibition
If you want to determine the credibility of online information so you open multiple tabs to search for other information to validate the site’s claims, what is this called?
Lateral Reading
If I make an app that prioritizes what's good for people's lives, I'm using ________________ design.
Humane
A website claiming you won a million dollars without entering a contest is an example of a __________.
Hoax or fake website
These are choices a website or app might give you about what information is visible to other users and third parties.
Privacy Settings
What is one way you can chat safely online?
Avoid sharing personal (private) information. Avoid meeting people in person without your parent's permission
Legal protection that creators have over the things they create is called?
Copyright
A type of crime in which your private information is stolen and used for criminal activity is called?
Identity theft
What is the best approach to take when encountering a suspicious email asking for personal information?
Delete it.
Or verify the email's legitimacy through other means before responding.
Use the acronym ASK (Ask, Shared, Known) to help you analyze the Privacy Policy and the _________ ____ _________ of a website or app.
Terms of Service
Someone who responds to a bullying situation by confronting the bully directly or by telling a trusted adult is what?
Upstander
False information shared with the intent to mislead is called?
Misinformation