Being a responsible and respectful user online is called _________________.
Digital Citizenship
Employers and colleges may look at your _______________ before making decisions about you.
Digital Footprint
Repeated online harassment that scares or threatens someone is called _______________.
Cyberstalking
You should never share your _______________, _______________, or _______________ online.
name, address, phone number
Which is an example of instant messenger?
A) Facebook Messenger
B) Google Chrome
C) Roblox
D) Wikipedia
A) Facebook Messenger
A step-by-step set of instructions for a computer is called an _______________.
Algorithm
Early online messaging systems were called:
A) World Wide Web
B) Bulletin Board Systems
C) Social Media
D) Instant Messenger
B) Bulletin Board Systems
A type of malware that spreads from computer to computer is called a _______________.
Virus
Online spaces where players interact with avatars are called _______________ _______________.
Virtual Worlds
Hackers who fall in between legal and illegal are called _______________ _______________.
Hackers who break the law are called _______________ _______________.
Black hat hackers
Early forms of money included _______________ and _______________.
Bartering and coins
Digital money like Bitcoin is stored in:
A) Bank vaults
B) Digital wallets
C) Wallets with coins
D) Credit cards
Digital wallets
Which is a form of online currency?
Bitcoin
A person who finds security problems in programs is called a _______________ _______________.
White hat hacker
Copyright protects:
A) Only music
B) Any creator’s original work
C) Public domain work
D) Your personal posts
B) Any creator’s original work
Which digital safety step is MOST effective when using public Wi-Fi?
A. Turning up screen brightness
B. Logging into banking apps first
C. Using a VPN to encrypt data
D. Disabling airplane mode
C. Using a VPN to encrypt data
A user edits a digital image they found online and reposts it without credit. Which copyright principle is being violated?
A. Public domain
B. Fair use
C. Attribution
D. Open license
C. Attribution
Something that doesn’t follow the expected pattern in data is called an _______________.
Anomaly
A metaverse platform that uses blockchain for in-game purchases is focusing on which benefit?
A. Stronger encryption and transparent ownership
B. Faster loading times
C. Easier login methods
D. Free content for all users
A. Stronger encryption and transparent ownership
A student’s search results suddenly show strange links and ads that don’t match their usual browsing behavior. This is most likely an example of:
A. A high-quality algorithm
B. A tracking pixel
C. A browser anomaly
D. A secure connection
C. A browser anomaly
The main purpose of online safety is to:
1) Make friends faster
2) Post as much as possible
3) Protect personal information and prevent harm
Protect personal information and prevent harm
The _______________ _______________ _______________ was invented by Tim Berners-Lee.
WWW - World wide web
A student is debugging code for a 3D metaverse object but cannot find the issue. Which strategy is MOST effective?
A. Ignore the bug and publish the object
B. Rewrite the project from scratch
C. Run the code in small sections to isolate the error
D. Add more random lines of code
C. Run the code in small sections to isolate the error
_______________ allows limited use of copyrighted material for school projects.
Fair Use