Digital Communication
Intellectual Property
Using the Internet
Electronic User's Bill of Rights
Digital Security
100

What is a data record of all an individual's online activities called?

Digital footprint

100

True or false. Plagiarism is claiming another person's material as your own, which is both unethical and illegal.

True

100
What is an acceptable use policy?

A set of rules that explains what is and is not acceptable use of company-owned and company-operated equipment and networks. 

100

What is the Electronic user's Bill of Rights?

Rights and responsibilities of both individuals and institutions regarding the treatment of digital information. 

100

What is the main reason for digital security?

To not be lulled into a false sense of security when communicating with other online.

200

What does good digital citizenship focus on?

Using technology in a positive manner rather than using it for negative or illegal purposes.

200

What is a contract that gives one party permission to market, produce, or use the product or service owned by another party.

A licensing agreement

200

 True or false. Cloud computing is using remote servers to store and access data over the Internet rather than on a personal computer or local server.

True

200

True or false. Article 2: Individual responsibilities states the right of educational institutions to access computers and informational resources. 

False

200

 What is a lost card or drivers license that provides thieves with with the information they need to steal a persons identity an example of?

A identity theft

300

What are some examples of digital netiquette?

Using correct capitalization, spelling, and grammar. 

300

Material created by federal, state, or local governments is often in the...

Public Domain 

300

Why is it bad if advertisers place cookies on your computer with out you knowing? 

The cookies could be used to steal your personal information you have entered on a website.

300

What do the 4 articles of the Electronic User's Bill of Rights contain?

Guidelines for the appropriate use of digital information.

300

What should you do to prevent a virus from invading your computer?

Regularly back up your files on the computer.

400

when using technology, what are some unethical actions that can be punishable by the law?

cyberbullying, flaming, and spamming. 

400

What does Intellectual property laws protect?

A person's or a company's inventions, artistic works, and other intellectual property.  

400

What is a common form of Phishing?

Sending a fraudulent e-mail that appears to be from a legitimate source.

400

What does article 1: Individual rights focus on?

The rights and freedoms of the users of computers and the internet.

400

What are some tips on creating a good secure password?

Do not use that can be easily guessed or something you use for multiple accounts.

500

Using a computer or mobile device, including the mouse, keyboard, icons, and folders is an example of...

 digital literacy skills

500

All of the code of open-source software may be owned by an.....

Individual or organization

500

Why is it important to beware of clicking on a website link for more information about an advertisement, triggering malware?

One click can activate a code, and your computer could be hacked or infected. 

500

List the names of the 4 articles of the Electronic User's Bill of Rights.

1. Individual rights

2. Individual Responsibilities

3. Rights of Educational Institutions 

4. Institutional Responsibilities  

500

Why should you consider downloading and running antivirus software for your mobile device?

Its important to guard them against virus that would disrupt a primary means of communication and expose personal data.