Cryptic Web
Shadow Cipher
Conspiracy X
Unsolved Mystery
Shadow Figures
100

What term describes presenting someone else's work as your own?

Plagiarism

100

What law protects original works of authorship?

Copyright

100

What term describes the act of using electronic communication to bully someone?

Cyberbullying

100

 What is the term for evaluating sources for credibility and reliability?

Source Evaluation

100

What is the term for the unauthorized access or use of computer systems?

Hacking

200

What doctrine allows limited use of copyrighted material without permission?

 Fair use

200

What is the term for the exclusive right granted to inventors of new products or processes?

Patent

200

What is the act of publicly humiliating or shaming someone online?

Denigration

200

What is the ability to understand and analyze media messages?

Media Literacy

200

What term refers to keeping personal information private and secure?

Privacy

300

What is the term for false statements that harm someone's reputation?

Defamation

300

What type of intellectual property protects distinctive symbols used to identify products or services?

Trademark

300

Publishing false or damaging statements about someone, harming their reputation.

Defamation

300

 What term refers to analyzing the construction of media texts?

Media Analysis

300

What is the term for malicious software that damages or infiltrates computer systems?

Malware

400

What organization offers copyright licenses for specified usage permissions?

Creative Commons

400

What is the term for confidential information with commercial value?

Trade Secret

400

Fabricating or intentionally misrepresenting information.

Falsification

400

What is the term for using multiple sources to verify information?

Cross-referencing

400

What is the term for protecting digital information from unauthorized access or alteration?

Cybersecurity

500

 What term refers to the unauthorized use or distribution of copyrighted material?

Piracy

500

What is the term for protecting the visual appearance of products?

Industrial Design

500

Examples: respectful language, avoiding harmful content, protecting privacy.

Netiquette

500

What is the term for being skeptical of information until confirmed by multiple sources?

Critical Thinking

500

What is the act of sending deceptive emails to trick individuals into revealing personal information?

Phising

M
e
n
u