This term describes "the ability to select and responsibly use technology tools to access, manage, evaluate, and communicate information."
Answer format: What is ____?
What is CC (or "To" if addressing direct recipient)? — Use "To" for primary recipients; use "CC" to copy visible recipients. Typical use case: CC a manager to keep them informed.
Which email field should you use when you want recipients to be visible to all recipients? (From the chapter content: To, CC, or BCC?) Provide the correct field and one typical use case.
What is CC (or "To" if addressing direct recipient)? — Use "To" for primary recipients; use "CC" to copy visible recipients. Typical use case: CC a manager to keep them informed.
What are the basic structural components of an email as defined in the chapter? List them.
What is the basic structure of an email? — To, From, Subject, Greeting, message body, signature, and possibly attachments.
What is a computer file, based on the chapter definitions?
What is a computer file? — A resource for storing information available on a computer program and usually based on durable storage.
What is "netiquette" as defined in the source?
What is netiquette? — The etiquette governing communication on the internet.
This is "a hierarchy of directories that consists of a single directory called the parent directory, or top-level directory, and all levels of its subdirectories." Give the term and briefly explain how it helps you organize files.
What is a directory tree? — It helps by grouping folders and subfolders logically so you can find files quickly.
List three rules you should follow to be a responsible digital citizen (draw from the Test Your Knowledge answers). For each rule give one short workplace example.
Possible answers include: Get permission before posting others' media; Use respectful language and appropriate grammar; Do not hide behind anonymity. Workplace examples: (a) Ask a coworker for permission before sharing their photo on social media. (b) Write professional emails to clients. (c) Use real account names for internal discussion boards.
Give two examples of appropriate workplace language or tone when writing a professional email and explain why they are important.
Examples: Use clear, professional language (e.g., "Please review the attached report") and polite closings (e.g., "Sincerely, [Name]") — they maintain respect and clarity.
Describe a simple troubleshooting step you should take first when a computer malfunctions, according to the chapter.
First troubleshooting step: Restart your computer.
What agency registers copyrights in the United States?
The US Copyright Office.
This legal concept "signifies that others must have permission to use the work" created by someone else and gives the creator exclusive rights. Name it and give one example of what it protects.
What is copyright? — Example: protects a written article, a photo, or a digital design.
The chapter lists several components that make up a strong foundation in tech literacy. Name three of these components and explain why each is important for a 10th‑grade student preparing for the workplace.
Examples: understanding computer hardware and software; creating documents/spreadsheets/presentations; recognizing responsible technology use. Importance: enables productivity, communication, data handling.
Explain the difference between the primary recipient and a copied recipient in email communication and how that affects expected responses.
Primary recipients (To) are expected to take action or respond; copied recipients (CC) are informed but not usually expected to reply.
Explain why consistent and meaningful file names and logically labeled folders help with file access. Give one concrete example of a good file-naming convention.
Consistent names and labeled folders make files searchable and easy to locate. Example naming convention: YYYY-MM-DD_ProjectName_Version (e.g., 2025-11-24_Budget_v2).
Identify two types of intellectual property protection besides copyright (from the documents) and give a short workplace example for each.
Patent — example: exclusive rights to produce a new device; Trademark — example: company logo protection.
Define "plagiarism" as given in the source, and describe one workplace consequence an employee might face for committing it.
What is plagiarism? — Plagiarism is using someone else's words, ideas, or work and presenting them as your own without giving credit to the original source
Consequence example: disciplinary action, loss of credibility, or termination in a workplace.
Give two examples of how an employee could use Creative Commons resources correctly in a workplace project. Be specific about attribution or permissions.
Examples: (a) Find a Creative Commons–licensed image labeled for commercial use and include the proper attribution line (creator name, license, link). (b) Use music under a CC license that allows reuse and provide required credits in the project.
Describe one scenario where using casual language in a digital workplace communication would be inappropriate, and suggest an alternative phrasing.
Scenario: Sending a casual joke about a client in an email to company leadership is inappropriate. Alternative: Keep tone formal and factual, e.g., "I recommend we proceed with the proposed timeline because..."
Define "directory tree" and draw (describe) a short example structure with a parent directory, two subfolders, and a file in one subfolder.
What is a directory tree? — A hierarchy with a parent directory and levels of subdirectories. Example: Parent: "ClassProjects" → Subfolder "Research" (contains "report.docx") and Subfolder "Presentations".
What is the "fair use doctrine" and when might it allow limited use of copyrighted material? Give one classroom-appropriate example.
Fair use doctrine — allows limited use of copyrighted works in specific situations (e.g., classroom quotation of a short passage for analysis).
Compare and contrast "patent," "trademark," and "copyright" — give a one‑sentence description of each and an example of what each protects.
Patent — legal right to be sole producer of a product (example: a new device design). Trademark — protection of symbols, words, phrases unique to a product/company (example: a logo). Copyright — legal right of a creator to use or sell a work (example: a book, song, or photo).
A coworker suggests posting a customer testimonial with a photo without asking permission. Using the chapter's guidance about ethics and intellectual property, write a short response you could give that explains whether this is appropriate and what steps to take before posting.
Example response: Explain that posting customer photos without permission may violate privacy and copyright; recommend obtaining written permission from the customer, check company code of conduct, and follow any terms of use or Creative Commons/license restrictions. If unsure, consult the organization's code of ethics and legal or communications team before posting.
Draft a short professional email (2–3 sentences) you could send to request permission to use a coworker’s photo in a publication. Include which email components from the chapter you used.
Example email:
To: [Coworker]
Subject: Permission to Use Photo for Publication
Greeting: Hi [Name],
Body: I’m preparing a project that includes staff photos and would like to include the photo you took at the event. May I have your permission to use it in our upcoming brochure? I will include your name in the credit line.
Signature: Thank you, [Your Name]
List three tech literacy skills required for many professionals and match each to a real workplace task (e.g., spreadsheets → budgeting).
Examples: Touch typing → faster document creation; Word processing → preparing reports; Spreadsheets → analyzing budgets.
Provide three questions employees can ask themselves to distinguish between ethical and unethical practices, as suggested in the chapter.
Examples of questions: Does the action violate the company’s code of conduct? Does it break any laws? Would someone you respect be embarrassed if they saw you doing this?