One
Two
Three
Four
Five
100

You need money. Your close friend has a lot of it and they also have the same password for everything. You know that they wouldn't mind and may not notice if you took some money. Should you log into their account and take some money?

No because you should not take advantage of people with bad passwords.

100

Is is ethical to participate on personal accounts when using a work or school device or when present in work of school?

No

100

True or false: Digital culture is based on participation.

True

100

Get verification symbols and or be consistent contributors?

No

100

True or False: There are many ways to be unethical through online participation.

True

200

How must managers handle terminating employees?

It should be handled ethically and with sensitivity.

200

How can you protect other's privacy?

Not sharing passwords, locations, or other information wihtout consent

200

 What types of cases are authorization very much important in?

 Artwork, music, poetry and photos

200

 True or False: Credit and benefits are main factors in authorship and ownership.

True

200

How can one establish credibility on social media platforms?

Get verification symbols and or be consistent contributors

300

How many people does it take to spread something you posted on social media?

One person

300

What is an example of an offline identify?

Everything except a computer

300

What is credbility closely tied to?

Trustworthiness

300

 What is the definition of online identity?

A one-to-one relationship between a human and their digital presence

300

Should you trust anyone who claims a certain level of expertise or position?

No

400

True or false? Many questions will be asked during an interview, so it is acceptable not to ask permission questions.

False

400

What is personal privacy?

The protection of personal information such as name, address, email, financial information, and other sensitive data.

400

What helps to establish credibility?

Using good grammar, being informed about the topic and citing sources.

400

What can you do to help someone online if you witness cyberbullying?

Report it, stand up for that person.

400

Why is the work of certain individuals such as doctors and chefs trusted?

 Due to the position they hold.

500

Name one of the characteristics of an ethical evaluation.

- Expectations must be clear.
- Feedback must be frequent and constructive.
- Issues must be addressed right away.

500

What is something that can protect authors when putting out creative work to the public?

 Creative Common Licenses

500

What are examples of further protection online that can keep information safe?

Firewalls and multiple level authorization.

500

Liz is a student at GCIT. She received an email from someone from out of the district. Should she click on the link attached to the email?

NO!!

500

Brianna is a student at GCIT and has to send personal and confidential information before the end of the day. Should she send it while at school why or why not, (you need the correct answer AND correct explanation)?

 She should not send it while at school because she would be using GCEC-Public, a public network that is not secure and her information could get leaked.

M
e
n
u