Cybersecurity Basics
Cybersecurity #2
Cybersecurity #3
Cybersecurity #4
Cybersecurity #5
100
People can now connect to more people online than offline. This is an u_________ to digital life.
upside
100
Sharing a friend's song with permission is considered to be s _ _ _
safe
100

Illegal copying and selling of DVDs and CDs is called...

Piracy

100

A Creative Commons license lets people use an entire piece of work for educational purposes. True or False?

True

100

What is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet?

Caesar Cipher

200
Internet, video games, videos, and cell phones are examples of ________ _________.
digital media
200
One result of posting incorrect material/items online is that you could lose your job. True or False?
True
200

This is a common term used to describe a worm, digital virus, or other dangerous program. 

What is malware.

200
Marsha leaves a comment on Tonya's photo that says, "You look skinny and beautiful." This is in___________ online behavior.
appropriate
200

What you need to look for is you are to use a credit card online...

Encryption or being certified secure.

300
What is the opposite of F2F?
online
300

A method in which each letter in the plain text is replaced by a letter some 'fixed number of positions' down the alphabet?

What is a Caesar cipher

300

I want to protect my song legally from being copied or used without my permission. This is an example of:

copyright

300
Although anyone can spot bullying behavior in the real world, it’s much more difficult to detect it _________.
online
300
S_________ N________ S________ can magnify our desire to feel photogenic and “camera ready.
Social network sites
400
Giving someone a hard time online and being mean is called:
cyberbullying
400
A responsible way to use other people's work is to:
give credit to the creator.
400

The person being harassed or upset by the bully is often called a...

Target

400

_________ is someone who sees cyberbullying happening, but does nothing to help.

bystander
400

What is the digital trail you leave on the internet when you use social media? 

What is a digital footprint. 

500
Michael emails an inappropriate message to a friend. The next day, he is called into the principal's office to talk about it. He didn't tell anyone about this so how did the principal find out?
Michael left his email open on a school computer.
500

A(n) ________ helps to de-escalate, or lessen the impact of online cruelity by supporting and standing up for the person who is bullied. *

An upstander

500
Bram Stoker's Dracula is free for anyone to use. This is an example of:
public domain
500
A ______'s mean-spirited comments can spread widely through instant messaging (IM), phone texting, and by posts on social networking sites.
bully
500

The crime that involves copying someone else's creative work and claiming it's your own work? 

What is plagiarism?