What is a data record of all an individual's online activities called?
Digital footprint
True or false. Plagiarism is claiming another person's material as your own, which is both unethical and illegal.
True
A set of rules that explains what is and is not acceptable use of company-owned and company-operated equipment and networks.
What is the Electronic user's Bill of Rights?
Rights and responsibilities of both individuals and institutions regarding the treatment of digital information.
What is the main reason for digital security?
To not be lulled into a false sense of security when communicating with other online.
What does good digital citizenship focus on?
Using technology in a positive manner rather than using it for negative or illegal purposes.
What is a contract that gives one party permission to market, produce, or use the product or service owned by another party.
A licensing agreement
True or false. Cloud computing is using remote servers to store and access data over the Internet rather than on a personal computer or local server.
True
True or false. Article 2: Individual responsibilities states the right of educational institutions to access computers and informational resources.
False
What is a lost card or drivers license that provides thieves with with the information they need to steal a persons identity an example of?
A identity theft
What are some examples of digital netiquette?
Using correct capitalization, spelling, and grammar.
Material created by federal, state, or local governments is often in the...
Public Domain
Why is it bad if advertisers place cookies on your computer with out you knowing?
The cookies could be used to steal your personal information you have entered on a website.
What do the 4 articles of the Electronic User's Bill of Rights contain?
Guidelines for the appropriate use of digital information.
What should you do to prevent a virus from invading your computer?
Regularly back up your files on the computer.
when using technology, what are some unethical actions that can be punishable by the law?
cyberbullying, flaming, and spamming.
What does Intellectual property laws protect?
A person's or a company's inventions, artistic works, and other intellectual property.
What is a common form of Phishing?
Sending a fraudulent e-mail that appears to be from a legitimate source.
What does article 1: Individual rights focus on?
The rights and freedoms of the users of computers and the internet.
What are some tips on creating a good secure password?
Do not use that can be easily guessed or something you use for multiple accounts.
Using a computer or mobile device, including the mouse, keyboard, icons, and folders is an example of...
digital literacy skills
All of the code of open-source software may be owned by an.....
Individual or organization
Why is it important to beware of clicking on a website link for more information about an advertisement, triggering malware?
One click can activate a code, and your computer could be hacked or infected.
List the names of the 4 articles of the Electronic User's Bill of Rights.
1. Individual rights
2. Individual Responsibilities
3. Rights of Educational Institutions
4. Institutional Responsibilities
Why should you consider downloading and running antivirus software for your mobile device?
Its important to guard them against virus that would disrupt a primary means of communication and expose personal data.