Net 1
Net 2
Net 3
Net 4
Net 5
100

Using the Internet to harass or threaten someone is known as ____.

Cyberbullying

100

The standard of appropriate behavior when using technology to communicate is digital ____.

Citizenship

100

The principles of what is right and wrong that help people make decisions are ____.

ethics

100

Spamming is ____.

A. illegal

B. Unethical

C. Both

D. Netiher

Both

100

An illegal act that involves stealing someone's personal information and using it to commit theft or fraud is ____.

Identity Theft

200

A program that monitors information coming into a computer and helps ensure that only safe information gets through is a(n) ____.

firewall

200

Which article(s) of the Electronic User's Bill of Rights provide the right of ownership for intellectual property?

I: Individual Rights, and III: Rights of Educational Institutions

200

A Creative Commons license is ____.

a specialized copyright license that allows free distribution of copyrighted work

200

If a website does not specifically state that the material is intended for others to reuse, you should assume that the material is ____.

under copyright and cannot be used without permission

200

All material, as soon as it is in tangible form, is automatically ____.

copyrighted

300

Claiming someone else’s material as your own.

plagiarism

300

Type of malware that seizes control of a computer and demands payment to unlock it.

ransomware

300

Software that captures private information by spying on a computer.

spyware

300

Verbally saying something false about someone that causes others to have a bad opinion of him or her.

slander

300

Illegally accessing or altering digital devices, software, or networks.

hacking

400

Unethical and illegal copying or downloading software, files, or other protected material.

piracy

400

General term for software programs intended to damage, destroy, or steal data.

malware

400

Using copyrighted material without the copyright holder’s permission.

infringement

400

Publishing a false statement about someone that causes others to have a bad or untrue opinion of him or her.

libel

400

Use of fraudulent e-mails and copies of valid websites to trick people into providing private and confidential data.

phishing

500

The exchange of information through electronic means is ______________________________ communication.

digital

500

Many companies have a(n) ______________________________ policy that explains what employees are and are not permitted to do with company-owned and company-operated equipment and networks.

acceptable use

500

Intentionally insulting someone on social media to incite an argument is considered ______________________________.

flaming

500

Another name for digital etiquette is ______________________________.

netiquette

500

Software that has had its source code made available to the public at no charge is called ______________________________ software.

open source