What does AI stand for?
AI (Artificial Intelligence).
What do we call it when someone changes a photo on the computer?
Digital Manipulation.
What’s the polite way to behave when communicating online?
Netiquette.
What does the term “URL” stand for?
Uniform Resource Locator.
What’s the most common online scam where someone tries to steal your personal information?
Phishing.
Which AI tool can you chat with to get answers to your questions in a natural, conversational way?
ChatGPT.
What popular software is used to edit photos?
Adobe Photoshop.
How quickly should you respond to a professional email?
Within 24 hours.
What tool helps you find academic articles and papers online?
Google Scholar.
What extra step can you add to your account to make it more secure?
Two-Factor Authentication (2FA).
What kind of “learning” lets computers get better at tasks by looking at lots of examples?
Machine Learning.
How can you check where a picture originally came from online?
Reverse Image Search.
What should you avoid using too much in professional emails?
Emojis.
What do we call information that comes directly from the person or event involved?
Primary Source.
What type of software protects your computer from viruses?
Antivirus Software.
What is the term for a robot or software that can perform tasks usually done by humans?
Automation.
What’s the term for a video that’s been changed to make it look like someone is saying something they didn’t?
Deepfake.
What is the appropriate way to start an email to your teacher or boss?
With a formal greeting, such as "Dear [Name]" or "Hello [Name]."
What is one way to determine if a website is trustworthy?
Check if the site has a valid domain, such as ".edu" or ".gov".
What’s it called when someone tries to trick you over the phone to steal your information?
Vishing (Voice Phishing).
What’s the AI technology that lets your phone unlock by recognizing your face?
Facial Recognition.
What do you call the act of changing or creating content to trick people?
Disinformation.
What should you use to hide other people’s email addresses when sending a group email?
BCC (Blind Carbon Copy).
Which citation style is often used in humanities papers?
MLA (Modern Language Association).
What’s the best way to protect your Wi-Fi network at home?
Use WPA3 encryption and a strong password.