Digital communication
Intellectual Property
Using the internet
Virus Protection
Copyright
100

Digital citizenship is the appropriate behavior when using technology. True or false?

True

100

What doctrine allows individuals to use work without permission in limited situations?

 The fair use doctrine

100

Your company and another company collaborate on a business idea. What is this an example of?

Cloud computing

100

What is an illegal act that involves taking someone’s personal information?

Identity theft

100

Referring to material that is not owned by anyone that can be used without permission is a product of _______.

 Public domain

200

The ability to use technology to locate, evaluate, communicate, and create information

Digital literacy

200

An employee is illegally copying files from the company. what is this an example of?

Piracy

200

What is used to identify an electronic device connected to the internet?

An ip address

200

A software that can capture private information like usernames, passwords, bank account information, and other credit card information is called _______.

 Spyware

200

what gives a person permission to be a sole producer of a product?

A patent

300

Someone who regularly and skillfully engages in the use of technology is what

A digital citizen

300

Your coworker is asking you for your work to present to their boss as their own. You deny the offer. What is the coworker’s action an example of?

Plagiarism

300

Bits of data stored on your computer that record your information on a website are called ______.

Cookies

300

What is a computer program that is designed to negatively impact a computer system by stealing files and data?

A software virus

300

A trademark only protects taglines and slogans. True or false?

False

400

 An employee is using the internet to conduct searches and access emails and websites. What is this an example of?

Digital literacy

400

Your company gets its symbol and slogan copyrighted. What type of copyright is this?

A trademark

400

A coworker has gotten some strange emails from websites on their computer requesting their information. What is this an example of?

Phishing

400

Your boss gets a program on all computers in the office to monitor the information going through the computers to ensure only safe information goes through. What is this program called?

firewall

400

What is a contract for one-party permission to market, produce, or use the product or service owned by another party

A license agreement

500

In digital citizenship, Is cyberbullying an example of an ethical activity or a non-ethical activity?

Nonethical activity

500

You use a picture on your company website that you found online. When you show your boss they tell you to remove it immediately because of _______.

Infringement

500

There are software programs that are intended to steal or destroy data. What do we call these software programs?

Malware

500

Virus protection can also be referred to as what?

 Antimalware or antivirus

500

The term ________ applies to software that's source code is available to the public at no cost.

Open source