Digital Literacy
Digital Citizenship
Intellectual Property
Internet use in the Workplace
Cybersecurity
100

Using your cell phone to message your boss is an example of what?

Digital Communication

100

What is the digital equivalent of etiquette that has to do with being well mannered online?

Netiquette

100

As Mrs. Baker was grading her students’ formal lab research papers, she noticed that a lot of students had the exact same sentences and even paragraphs despite the fact this was an individual project. She looked up the sentences online and found a formally published paper with the same exact lines and paragraphs. What illegal action had some of the students committed due to their excessive procrastination?

Plagiarism

100

Ian works in manufacturing, however, one day he gets bored and decides to look at the financial side of the company. He notices that some of the information regarding the company’s financials is behind sections that require passwords and keys. The company is ________ his ability to see the financial department because he is in manufacturing and has no business seeing what they are doing.

censoring

100

What is one way you can make sure any data that may be affected by digital viruses or malware is not completely lost?

Backup your data.

200

Is helping children learn to be responsible and make good choices online a form of digital literacy?

yes

200

One day Carl gets an unruly number of random emails from a bunch of random cities. He investigates them and discovers that they are all coming from one of his coworkers who has a not-so-well-hidden dislike for him. What is this type of cyberbullying called?

Spamming

200

Billy wants to create his own business. He has a slogan, a logo, a title, and all the necessary information to start a business. Not one year later, he gets a notice saying that he is infringing on someone else's company. He looks them up and sees that they were founded after his company was. What did Billy likely forget to do with his company’s unique features that allowed another person to steal them legally?

Trademark the company and its unique features.

200

What is the number that is used to identify an electronic device connected to the internet?

IP Address

200

Jack tries to hack into a company's main database to access some personal information, however, there is something that keeps his virus and malware from getting in. What might this be?

Firewall

300

What are some examples of digital literacy that pertain to the hardware?

Use of computer keyboard and mouse, touch screen, or controller

300

What are ways that people can express poor digital etiquette?

All capital letters, improper spelling, punctuation, or incorrect capitalization

300

Sam has an idea that he thinks will revolutionize his field of study. He has not drawn out any plans or sent a copyright or trademark notice yet. At this point in time the idea is only an ____________   ________ of Sam.

Intellectual property

300

Bob has been working on some code for many hours. Once he is happy with his progress, he saves it and logs out and leaves for the day. The next day when he has to log into a different computer, he sees that the file of code he was working on the day prior is already there. Why might this be?

Cloud computing.

300

While browsing through Amazon, Alex sees there have been purchases on his card that he did not make. No one else has the code to his card, so how could have someone gotten it?

Unsecure password.

400

What are some examples of digital literacy that pertain to the software?

Using word processors, spreadsheets, tables, icons, folders, and databases, conducting internet searches, email, and website registration

400

Mark makes a remark online but later realizes that it is not very encouraging, so he goes through and deletes, however, his boss had already seen the comment. What did Mark leave behind after he posted that comment that cannot be taken away?

Digital footprint

400

Sam has an idea that he thinks will revolutionize his field of study. He wants to be the only one who can distribute and sell this item. What should he do with this idea so that he is able to do that?

Copyright it.

400

When Gilma visited a new website, she noticed that there were advertisements from things she had previously searched. What invisible part of a website allows other websites to use your browsing history as filters to know what to advertise to you?

Cookies or Spyware

400

When criminals steal physical mail to access information to commit digital fraud or theft this is called what?

Dumpster diving

500

Suzen regularly uses a variety of electronic devices to perform her duty to the company. In order for Suzen to do this she must have…

Digital Literacy

500

John comes across an account solely dedicated to bad mouthing another person with no apparent motivation. What is this type of action called?

Slander

500

If Coca-Cola and Mt. Dew were to work together, what type of agreement would they first have to agree to?

License Agreement.

500

Tom noticed that his computer had started to act a little weird and buggy one day. It was a relatively new computer, so there were no hardware issues. After a while some systems started disappearing. What could have caused this unusual behavior?

Malware or software virus

500

What type of malware is programmed to replicate to spread to new computers, but doesn’t infect files outside of the intended file?

Worm

M
e
n
u