Social Media
Passive Digital Footprint
Active Digital Footprint
Online Safety and Privacy
Digital Footprint Consequences
100

This action involves intentionally publishing content such as photos, videos, or text for others to view online.

What is sharing content?

100

This type of digital footprint is created when data about you is collected without your direct input or awareness.

What is a passive digital footprint?

100

This type of footprint is created through deliberate online actions such as posting, liking, or commenting.

What is an active digital footprint?

100

Using complex, unique credentials for each account is a key strategy for preventing this type of security breach.

What is hacking?

100

Posting harmful or inappropriate content can negatively impact this aspect of your social standing.

What is your reputation?

200

These customizable platform controls determine the visibility and audience of your online posts.

What are privacy settings?

200

These small data files stored by websites track user behavior and preferences across browsing sessions.

What are cookies?

200

Posting photos, videos, or comments online is an example of engaging in this type of digital activity.

What is building an active digital footprint?

200

When contacted by unknown individuals requesting personal information, the safest response is this.

What is refusing to share personal information?

200

Sharing your real-time location publicly can increase the risk of this serious safety concern.

What is being tracked or put in danger?

300

This term describes content that spreads rapidly across users and platforms due to high engagement and sharing.

What is a viral post?

300

These platforms collect and analyze user search queries and browsing activity to improve services and target content.

What are search engines?

300

Frequent online sharing contributes to shaping this perception of you by others on the internet.

What is your online identity?

300

This type of cyber scam involves impersonating a trustworthy source to steal sensitive information.

What is phishing?

300

Inappropriate online behavior can result in the loss of this type of future opportunity.

What is a job, scholarship, or college acceptance?

400

Before making hiring decisions, employers often review this publicly available representation of your online presence.

What is your social media profile?

400

This category of data reveals the geographic position of a device, often collected through apps or services.

What is location data?

400

Because online content can be long-lasting and impactful, this habit is essential before sharing anything publicly.

What is thinking before posting?

400

These account features restrict who can view your posts and personal data online.

What are privacy settings?

400

Posting someone’s private information without consent may result in this ethical and legal issue.

What is cyberbullying or invasion of privacy?

500

Even after deletion, content may persist due to screenshots, downloads, or redistribution—illustrating this concept.

What is that others may have saved or shared it?

500

Companies use collected user data to deliver personalized marketing content known as this.

What are targeted ads?

500

When colleges or employers evaluate your posts, they are assessing this aspect of your digital presence.

What is your online presence?

500

Unsecured networks can expose login credentials to interception, making this activity particularly risky.

What is using public Wi-Fi for logins and personal information?

500

When old online content reappears and causes consequences years later, it demonstrates this phenomenon.

What is digital resurfacing?

M
e
n
u