Netiquette
Internet Safety
Threats
Sharing
Legal
100

__________ is the ethical principle of respecting the privacy and confidentiality of information shared online or through digital communication.

Netiquette  

100

A strong ________ should be a mix of letters, numbers, and symbols to protect your online accounts from unauthorized access.

password

100

Ignoring _______updates can leave your computer vulnerable to new security threats.

software

100

___________ laws protect the original works of creators, such as authors, musicians, and artists, from being used without permission.

Copyright

100

The purpose of the ____ _____ _____ is to enable limited use of copyrighted material for educational or research purposes.

fair use laws

200

 Before sending an email, it’s important to ______________ your message to ensure clarity and avoid misunderstandings.

proofread

200

 A ________ is a type of malicious software designed to replicate itself and spread to other computers, often causing damage. 

Virus

200

The use of _______ software helps to detect and remove malware from your computer.

antivirus

200

Posting _________ content on social media can result in disciplinary consequences, such as suspension or expulsion from school.

inappropriate

200

Cyberbullying consequences can lead to ______ ______ and school disciplinary measures.

legal action

300

Using all capital letters in an email is often considered______ because it can be interpreted as shouting.

rude, improper netiquette 

300

Downloading software or media without paying for it or obtaining the proper permissions is considered as ______ and is illegal.

Piracy

300

Unauthorized access to someone else’s computer or online account is an example of _______ behavior.

hacking

300

__________ is a form of unethical behavior where someone copies or uses someone else’s work and claims it as their own without proper acknowledgment.

Plagiarism 

300

Sharing private information without permission can be a breach of _______ and have potential legal consequences.

trust

400

When using social media, it’s crucial to respect others’ _______ by not sharing their private information without permission.

privacy

400

The practice of sending fraudulent emails to trick people into providing personal information is known as _________.

phishing

400

_______ ___ ______ is the practice of intentionally disrupting online services, such as websites, by overwhelming them with traffic.

Denial of Service (DoS)

400

The principle of _____________ensures that sensitive business-related information is only accessible to authorized individuals.

confidentiality

400

A company must comply with ______ protection regulations.

data

500

___________ is a form of online harassment where someone uses technology to bully or intimidate another person.

Cyberbullying

500

Opening email attachments from unknown senders can put your computer at risk of being infected with ________.

malware

500

When working with sensitive business information, it’s important to use __________ to protect files and communications from unauthorized access.

encryption

500

The ______ ______ _______ allows limited use of copyrighted material without requiring permission from the rights holders, typically for educational or commentary purposes.

Fair Use Doctrine

500

If a company fails to protect customer's credit card information, the company could face __________ and fines.

lawsuits

M
e
n
u