Media Balance & Well-Being
Privacy & Security
Digital Footprint & Identity
Relationships and Communication
News and Media Literacy
100

The responsible and appropriate use of technology is called what?

Digital Citizenship

100

What is the best way to prevent unauthorized access to your online accounts?

Create a strong password.

100

The trail of information you leave behind when using the internet is called what?

Digital Footprint

100

By respecting others' privacy and not oversharing, you are ensuring healthy online __________________.

Boundaries

100

Name one factor of fair use. 

Purpose

Amount

Nature

Effect

200

Finding equilibrium between online and offline activities is called what?

Media Balance

200

An attempt to trick people into revealing sensitive information is called what?

Phishing

200

What can a strong digital footprint contribute to in the future?

Better job

Better educational opportunities

200

Using technology to harass, threaten, or intimidate others is called ______________?

Cyberbullying

200

To balance the rights of copyright holders with the needs of users is the primary purpose of the four factors of _________ ______.

Fair Use

300

Features or aspects of a device or app that are intended to hook the user into frequent use are called

Addictive Design

300

Sharing your home address and phone number with strangers is considered an example of sharing ______________ information.

Private

300

Unknown or unanticipated people who can see information about you posted online are called?

Invisible Audience

300

People behaving more recklessly or rudely online than they would in person is called what?

Online Disinhibition

300

If you want to determine the credibility of online information so you open multiple tabs to search for other information to validate the site’s claims, what is this called?

Lateral Reading

400

If I make an app that prioritizes what's good for people's lives, I'm using ________________ design.

Humane

400

A website claiming you won a million dollars without entering a contest is an example of a __________.

Hoax or fake website

400

These are choices a website or app might give you about what information is visible to other users and third parties.

Privacy Settings

400

What is one way you can chat safely online?

Avoid sharing personal (private) information. Avoid meeting people in person without your parent's permission

400

Legal protection that creators have over the things they create is called?

Copyright

500

A type of crime in which your private information is stolen and used for criminal activity is called?

Identity theft

500

What is the best approach to take when encountering a suspicious email asking for personal information?

Delete it.

Or verify the email's legitimacy through other means before responding.

500

Use the acronym ASK (Ask, Shared, Known) to help you analyze the Privacy Policy and the _________ ____ _________ of a website or app.

Terms of Service

500

Someone who responds to a bullying situation by confronting the bully directly or by telling a trusted adult is what?

Upstander

500

False information shared with the intent to mislead is called?

Misinformation