Sharing company confidential information is inappropriate or appropriate?
inappropriate
Posting racially sensitive comments and jokes is appropriate or inappropriate?
inappropriate
double!
Tweeting negative comments about your employer is inappropriate or appropriate?
inappropriate
Engaging in politically charged arguments in an online forum is inappropriate or appropriate?
inappropriate
Tripple!
Your d___________ r___________ is defined by your behavior in the online world and by the content that you post about yourself and others.
digital reputation
N________, means being respectful to others on the Internet.
Netiquette
I_________ C_________, countries control the information that their citizens can publish and view on the Internet.
Internet Censorship,
G________ is a free e-mail application provided by Google
GMAIL
What does 'netiquette' refer to?
The etiquette of using the internet
A type of internet security protocol
A software for managing online communication
A method of encrypting online data
The etiquette of using the internet
What does digital citizenship primarily involve?
Using technology responsibly and ethically
Avoiding all forms of technology
Creating only entertainment content online
Ignoring online safety measures
Using technology responsibly and ethically
double!
Your social media profiles, online activities, and the information you post online define your: ONLINE I...
Identity
if you apply for a job, employers are likely to review your L______ profile
You should exercise extra care when posting a negative comment online about someone since it can easily be misinterpreted and affect your d________ I_________ in a damaging way
Digital Identity
Tripple!
Every time you tweet or post a comment or picture on social media, you leave a trace of information called a d____________ f____________
digital footprint
You need to protect your digital reputation by following ethical standards. For example, whenever you are using another organization’s Wi-fi, such as your school’s, you need to comply with the terms of the A________ U___ P________ of your school.
Acceptable Use Policy
double!
___________ protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.
Copyright
TRIPPLE!
_____________, refers to using online communication tools such as e-mail, text messaging, and social networks to harass, intimidate, or humiliate a person.
Cyberbullying
You can have a copy of the message sent to someone else, by adding a C______ C_______ recipient
Carbon Copy
What is internet censorship?
The restriction or control of access to information on the internet
The promotion of free access to all online content
The creation of new websites and online platforms
The monitoring of internet speed and bandwidth
The restriction or control of access to information on the internet
Which of the following is an example of good netiquette?
Using all caps in an email to emphasize your point
Respecting others' opinions in an online discussion
Sharing someone's personal information without their consent
Posting offensive comments on social media
Respecting others' opinions in an online discussion
What does copyright law primarily protect?
Ideas and concepts
Original works of authorship
Inventions and patents
Trademarks and logos
Original works of authorship
double!
Which of the following is an example of maintaining digital wellness?
Spending all day on social media
Taking regular breaks from screens
Sharing personal information with strangers online
Ignoring cyberbullying
Taking regular breaks from screens
• Stay safe by practicing ergonomics and protecting against security threats.
• Manage the time you spend online.
• Respect copyright rules.
• Protect your privacy.
• Respect others.
• Stand up to cyberbullying.
Are all part of being a good D_________ C________
digital citizen or Digital Citizenship
TRIPPLE!
Many people spend a lot of time in front of a digital screen such as a computer, tablet or smartphone. The amount of time spent viewing a digital screen is referred to as S_______ T____
Screen time
People who work with computers frequently and continuously may experience physical stress and health issues such as repetitive motion injury, back strain, or eye strain. You can reduce physical stress when working with computers by following basic E___________ principles
ergonomic OR ergonomics
TRIPPLE!
D_________ W________ means using technology safely and following proper standards of conduct online. To be a good digital citizen, you should do the following:
Digital wellness
Too much screen time can lead to a form of addiction called I_______ A_________
Internet addiction
C______ C_________ is a nonprofit organization that helps people share knowledge and creativity through legal means
Creative commons
______________ refers to presenting the work of someone else as your own. Some students copy information from the Internet into their school projects without citing its source, implying it's their own creation
Plagiarism
You can also have a copy of the message sent to someone, without the other recipients knowing about it, by adding a B________ C______ C_____ recipient
lind Carbon Copy
With the standard Copyright terms, the phrase “A____ R_____ R_____” applies.
all rights reserved
Why is it important to avoid using all caps in online communication?
It makes the message harder to read
It is considered shouting and can be seen as rude
It is against most online platform rules
It takes longer to type
It is considered shouting and can be seen as rude
double!
What is the best way to handle disagreements in online discussions?
Ignore the other person's point of view
Respond with insults to defend your opinion
Politely explain your perspective and listen to theirs
Leave the discussion immediately
Politely explain your perspective and listen to theirs
double!
What is the best way to protect your personal information online?
Using strong and unique passwords
Sharing passwords with friends
Posting personal details on social media
Ignoring privacy settings
Using strong and unique passwords
Any information you copy or refer to in any document should be appropriately C________
credited or credit
double!
C__________ exists from the moment work is created
Copyright
The copyright laws include a F____U___ doctrine that allows copying materials freely for certain purposes such as news reporting, research, and teaching
Fair Use
What is Fair Use?
A. It gives you a free pass to use someone else’s copyrighted work if you’re not doing it to make money
B. It lets you use someone else’s copyrighted work without permission if the right factors are met
C. It’s a catch-all defense to copyright infringement
D. It makes creators lose their copyrights so other artists can use their work
B. It lets you use someone else’s copyrighted work without permission if the right factors are met
double!
Materials that are labeled as P_______ D_________ are not protected by intellectual property laws such as copyright, trademark, or patent laws
public domain
These 6 main sections are part of what?
Acceptable Use Policy
When you want to send a copy of an email you have received to someone who was not on the list of recipients, you can “f______” the email to that person.
FOWARD
If you use R____ A___ to reply to a message that has been sent to multiple people, your reply will be sent to the message's sender as well as all the other recipients
Reply All
Tripple!
Which of the following is a common reason for internet censorship?
To improve internet speed
To protect national security
To increase advertising revenue
To promote online gaming
To protect national security
double!
What should you do before sharing a link or file online?
Ensure it is relevant and safe for the recipient
Share it immediately without checking
Send it to multiple people to get feedback
Post it publicly without context
Ensure it is relevant and safe for the recipient
Which of the following is a sign of unhealthy digital habits?
Feeling anxious without your phone
Using technology to learn new skills
Taking breaks during screen time
Setting boundaries for online usage
Feeling anxious without your phone
The “” license is the most restrictive of the six Creative Common Licenses.
CC BY-NC-DN
CC BY-NC-ND
CC BY-NC-CD
CC BY-NC-ND
Which of the following is NOT an exclusive right granted to copyright holders?
The right to reproduce the work
The right to distribute copies of the work
The right to perform the work publicly
The right to patent the work
The right to patent the work
if the owner assigns the “” license to the material, other users can use the material for free and redistribute the work, as long as credit is given to the original owner
CC BY
CC BB
CC BY
What is the doctrine of 'fair use' in copyright law?
A rule that allows the free use of any copyrighted material
A limitation that permits limited use of copyrighted material without permission under certain conditions
A law that requires payment for all uses of copyrighted material
A principle that applies only to educational institutions
A limitation that permits limited use of copyrighted material without permission under certain conditions
The “” license is the least restrictive of the six Creative Common Licenses
CC BY
CC BB
CC BY
Question: Which of the following is the primary difference between the CC and BCC fields in an email?
A) CC recipients receive a copy of the email, but BCC recipients do not.
B) CC recipients can see all other recipients, while BCC recipients' addresses are hidden.
C) CC recipients can reply to the email thread, while BCC recipients cannot.
D) CC recipients are considered the primary recipients, while BCC recipients are secondary.
B) CC recipients can see all other recipients, while BCC recipients' addresses are hidden.
Question: What is the primary purpose of forwarding an email?
a) To reply to the sender with a comment.
b) To share the email with a new recipient.
c) To save the email in a different folder.
d) To archive the email for future reference.
b) To share the email with a new recipient.
What is the doctrine of 'fair use' in copyright law?
A rule that allows the free use of any copyrighted material
A limitation that permits limited use of copyrighted material without permission under certain conditions
A law that requires payment for all uses of copyrighted material
A principle that applies only to educational institutions
A limitation that permits limited use of copyrighted material without permission under certain conditions
How long does copyright protection last for works created after January 1, 1978, in the United States?
50 years after the author's death
70 years after the author's death
100 years after the author's death
Indefinitely
70 years after the author's death
Why is it important to verify the credibility of online information?
To avoid spreading misinformation
To increase the number of followers
To save time while browsing
To ignore critical thinking skills
To avoid spreading misinformation