Digital Footprint and Reputation
Internet Safety
Privacy and Security
Cyberbullying
Creative Credit and Copyright
100

The information about a particular person that exists on the Internet as a result of their online activity is called what?

What is Digital footprint?

100

True or False: you should seek help from a trusted adult when feeling unsafe.

True

100

What is the minimum length most experts say a password should be...

8 characters

100

Girls are more likely to be bullied online than boys. True or false

False

100

What is the term for giving credit to the creator of a work?

Attribution

200

Its important that your digital footprint tell a __________ story about who you are

Positive

200

What action involves sending suspicious emails requesting personal information or posing as legitimate entities?

Phishing

200

True or false: A company can legally use your data/information in all ways no matter what

False

200

A person who is aware of cyberbullying but doesn't intervene is called a?

Bystander

200

What is the legal right that creators have to control how their work is used?

Copyright

300

What might employers look at before hiring someone?

Social Media

300

Safety Guidelines includes be wary when communicating with people you don't know in real life, block/Report if you are being harassed, ask a trusted adult if you need help, Don't disclose _________ _________

Personal Information

300

Experts say a strong password should include uppercase and lowercase letters and also a mix of numbers and what other type of character

Symbols

300

A person who tries to break the cycle of cyberbullying is called a?  

Upstander

300

What is the term for using someone else's work as if it were your own without giving them credit?

Plagiarism

400

What can you use to control who sees your posts?

Privacy settings.

400

if you feel uncomfortable with an interaction, stop communition. Block communication if needed. If person continues to reach out, do what to them?

Report

400

Legal documents on websites that disclose the ways they can store and share your data are called what? Hint: They are typically long and many users don't read them.

Privacy policies

400

The intentional use of technology to harass, threaten, or intimidate others is called _______

Cyberbullying

400

What is the process called when a creator gives permission for others to use their work under certain conditions?

Licensing

500

To maintain your digital footprint and make sure it just has positive stuff on it, one thing you should do on a regular basis is ________ yourself.

Google

500

If a situation doesn't feel right, trust your instincts. This is called using __________

Common Sense

500

What tool helps you to manage and diversify your passwords?

Password Manager

500

Victims of cyberbullying may experience isolation, low self-esteem, and what else?

Depression

500

What is the legal doctrine that allows limited use of copyrighted material without permission, such as for education or commentary?

Fair use

M
e
n
u