Digital Footprint
Cyberbullying
Creative Credit
Privacy & Security
Hacking Ethics
100

This is the trail of all digital data that leads back to someone, whether good or bad

Digital Footprint

100
Are schools obligated to try and stop cyberbullying?

Yes

100

How can you know it is safe/legal to use a photo online?

Check the license usage for the photo.

100

What sensitive data could online privacy help protect?

Bank account, social security number, license, address, personal info
100

Is all hacking illegal?

No

200

Is your digital footprint permanent?

Yes, everything can be saved and shared indefinitely.

200

What is the difference in cyberbullying and a single mean comment?

Cyberbullying is repetitive

200

A method of easily sharing your work under special conditions.

Creative commons

200

What is 2-step verification?

Having two steps to authenticate a user (biometrics, password, verification code, etc.)

200

Name the three main types of hackers.

Black hat, white hat, grey hat

300

How would posting racial insults on your social media profile affect your digital footprint?

It would negatively impact it

300

Name a negative outcome that a victim may experience from cyberbullying.

Suicide, depression, self-harm, isolation/loneliness

300

What does the creative commons acronym 'NC' stand for?

Non-commercial

300

How can you protect your passwords?

-Use randomized numbers, symbols, uppercase and lowercase letters when creating
-Password manager
-Don't share your password
-Verify website legitimacy j
-Use encrypted connections

300

What is the only type of ethical hacker? (of the 3 main categories)

White hat

400

What are some effects of having a bad/negative digital footprint?

Losing scholarships, job opportunities, college admission, bad reputation

400

Name something you can do to stop cyberbullying.

Tell a trusted adult, block the bully, turn off the device/ignore communication, report it online, document it (screenshots)

400

Are creative commons the same as public domain?

No

400

What is MFA?

Having multiple steps to authenticate a user (biometrics, password, verification code, etc.)

400

Do bug bounties allow you to hack however you want?

No, you are bound to the rules of the bug bounty

500

Which of the following will not affect your digital footprint?
A. Visiting a website
B. Clearing your browser history
C. Watching a youtube video

B. your history is only stored on your computer

500

The difference in a bystander and an upstander.

Bystanders just watch/does nothing
Upstanders take action

500

What condition should an artist place on their Creative Common licence if they don't want remixes of their work?

ND (no-derivatives)

500

How does clearing browsing data and cookies help privacy and security?

-Hackers can't find out where you've visited

-Hackers can't steal your cookies

500

What constitutes legal hacking?

-Get permission
-Pen tester
-Bug bounty