What term describes the ability to effectively use digital tools and technologies?
What is Digital Literacy?
What is a digital identity?
What is the online representation of a person or entity?
What is the term for using someone else’s work without giving credit?
What is plagiarism?
What is Web 2.0?
What is the interactive (social media) and user-driven web?
Define the term "cybersecurity."
What is the practice of protecting systems and information from digital attacks?
Name one organization associated with governing the internet.
What is ICANN, ISOC, WSIS, IGF, CTU, or ITU?
Name a the main social media tool used to create a professional digital profile.
What is LinkedIn?
Name one way to evaluate the reliability of online information.
What is checking the credibility of the source?
Name a tool used for online file sharing
What is Google Drive , Dropbox or Sharepoint?
Name one type of cybersecurity threat.
What is phishing, malware, or ransomware?
What is the key difference between digital literacy and digital citizenship?
What is digital literacy focuses on skills and tools, while digital citizenship emphasizes responsible use?
An applicant is using the email address badgirl_riri123@example.com to apply for a professional role. This email is flagged as unprofessional. Create a more professional email address for Rihanna while still maintaining her identity.
rihanna.fenty@example.com or r.fenty@example.com)
Define "digital copyright."
What is the legal protection of intellectual property in the digital world?
What is the difference between collaboration and cooperation?
What is collaboration involves working together on shared goals, while cooperation involves individual contributions to a common goal?
What is one way to create a strong password?
What is using a combination of letters, numbers, and symbols?
List three elements of digital citizenship.
What are Digital Access, Digital Commerce, Digital Communication, Digital Etiquette, Digital Literary, Digital Health & Welfare, Digital Law, Digital Rights & Responsibility and Digital Security & Privacy?
What are the two types of digital footprints?
What are active and passive digital footprints?
Name two Creative Commons license permissions?
CC BY, CC BY-SA, CC BY-NC, CC BY-ND, CC BY-NC-SA, CC BY-NC-ND
What is one constraint of technology-based collaboration?
What is the lack of face-to-face communication?
A user receives an email claiming to be from their bank, requesting immediate action to prevent their account from being locked. The email includes a link to a website that looks identical to the bank's official site. Once the user enters their login credentials, the website shows an error and redirects them to the actual bank's site. Meanwhile, their login details are silently sent to an attacker.
What is a phishing attack?
Define the term "digital natives."
Who are individuals born and raised in the digital era?
What are the potential risks of not maintaining separation between personal and professional digital identities?
What is sharing personal information to individuals who are not meant to see it?
List the and explain the function of Boolean operators in internet searches?
What are tools like AND, OR, NOT to refine search results?
List five tools used for virtual collaboration?
What are Google Docs, Zoom, Teams, Slack, Discord?
What is the difference between a worm and a virus?
A worm spreads autonomously, while a virus attaches to and depends on a host file to propagate.