1
2
3
4
5
6
7
8
9
10
11
12
100

Sharing company confidential information is inappropriate or appropriate?

inappropriate

100

Posting racially sensitive comments and jokes is appropriate or inappropriate?

inappropriate

100

double!


Tweeting negative comments about your employer is inappropriate or appropriate?

inappropriate

100

Engaging in politically charged arguments in an online forum is inappropriate or appropriate?

inappropriate

100

Tripple!

Your d___________ r___________ is defined by your behavior in the online world and by the content that you post about yourself and others.

digital reputation

100

N________, means being respectful to others on the Internet.

Netiquette

100

I_________ C_________, countries control the information that their citizens can publish and view on the Internet.

Internet Censorship,

100

G________ is a free e-mail application provided by Google

GMAIL

100


What does 'netiquette' refer to?

The etiquette of using the internet

A type of internet security protocol

A software for managing online communication

A method of encrypting online data




The etiquette of using the internet

100

What does digital citizenship primarily involve?

Using technology responsibly and ethically

Avoiding all forms of technology

Creating only entertainment content online

Ignoring online safety measures



Using technology responsibly and ethically

200

double!

Your social media profiles, online activities, and the information you post online define your: ONLINE I...

Identity

200

if you apply for a job, employers are likely to review your L______ profile

LinkedIn

200

You should exercise extra care when posting a negative comment online about someone since it can easily be misinterpreted and affect your d________ I_________ in a damaging way

Digital Identity

200

Tripple!

Every time you tweet or post a comment or picture on social media, you leave a trace of information called a d____________ f____________

digital footprint

200

You need to protect your digital reputation by following ethical standards. For example, whenever you are using another organization’s Wi-fi, such as your school’s, you need to comply with the terms of the A________ U___ P________ of your school.

Acceptable Use Policy

200

double!

___________ protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.

Copyright

200

TRIPPLE!


_____________, refers to using online communication tools such as e-mail, text messaging, and social networks to harass, intimidate, or humiliate a person.

Cyberbullying 

200

You can have a copy of the message sent to someone else, by adding a C______ C_______ recipient

Carbon Copy

200

What is internet censorship?

The restriction or control of access to information on the internet

The promotion of free access to all online content

The creation of new websites and online platforms

The monitoring of internet speed and bandwidth





The restriction or control of access to information on the internet

200

Which of the following is an example of good netiquette?

Using all caps in an email to emphasize your point

Respecting others' opinions in an online discussion

Sharing someone's personal information without their consent

Posting offensive comments on social media



Respecting others' opinions in an online discussion

200

What does copyright law primarily protect?

Ideas and concepts

Original works of authorship

Inventions and patents

Trademarks and logos

Original works of authorship

200

double!

Which of the following is an example of maintaining digital wellness?

Spending all day on social media

Taking regular breaks from screens

Sharing personal information with strangers online

Ignoring cyberbullying

Taking regular breaks from screens

300

•    Stay safe by practicing ergonomics and protecting against security threats.

•    Manage the time you spend online.

•    Respect copyright rules.

•    Protect your privacy.

•    Respect others.

•    Stand up to cyberbullying.

Are all part of being a good D_________ C________

digital citizen or Digital Citizenship

300

TRIPPLE!


Many people spend a lot of time in front of a digital screen such as a computer, tablet or smartphone. The amount of time spent viewing a digital screen is referred to as S_______ T____

Screen time

300

People who work with computers frequently and continuously may experience physical stress and health issues such as repetitive motion injury, back strain, or eye strain. You can reduce physical stress when working with computers by following basic E___________ principles

ergonomic OR ergonomics

300

TRIPPLE!


D_________ W________ means using technology safely and following proper standards of conduct online. To be a good digital citizen, you should do the following:

Digital wellness

300

Too much screen time can lead to a form of addiction called I_______ A_________

Internet addiction

300

C______ C_________ is a nonprofit organization that helps people share knowledge and creativity through legal means

Creative commons

300

______________ refers to presenting the work of someone else as your own. Some students copy information from the Internet into their school projects without citing its source, implying it's their own creation

Plagiarism

300

You can also have a copy of the message sent to someone, without the other recipients knowing about it, by adding a B________ C______ C_____  recipient

lind Carbon Copy

300

With the standard Copyright terms, the phrase “A____ R_____ R_____” applies.

all rights reserved

300

Why is it important to avoid using all caps in online communication?

It makes the message harder to read

It is considered shouting and can be seen as rude

It is against most online platform rules

It takes longer to type



It is considered shouting and can be seen as rude

300

double!

What is the best way to handle disagreements in online discussions?

Ignore the other person's point of view

Respond with insults to defend your opinion

Politely explain your perspective and listen to theirs

Leave the discussion immediately

Politely explain your perspective and listen to theirs

300

double!

What is the best way to protect your personal information online?

Using strong and unique passwords

Sharing passwords with friends

Posting personal details on social media

Ignoring privacy settings



Using strong and unique passwords

400

Any information you copy or refer to in any document should be appropriately C________

credited or credit

400

double!

C__________ exists from the moment work is created

Copyright

400

The copyright laws include a F____U___ doctrine that allows copying materials freely for certain purposes such as news reporting, research, and teaching

Fair Use

400
Name 3 PIIs
  • Name: full name, maiden name, mother’s maiden name, or alias
  • Social security number (SSN)
  • Driver’s license number
  • Telephone number
  • Patient identification number
  • Bank or credit card account numbers
  • Street address
  • E-mail address
  • Internet Protocol or MAC address
400

What is Fair Use? 

A. It gives you a free pass to use someone else’s copyrighted work if you’re not doing it to make money 

B. It lets you use someone else’s copyrighted work without permission if the right factors are met

C. It’s a catch-all defense to copyright infringement 

D. It makes creators lose their copyrights so other artists can use their work

B. It lets you use someone else’s copyrighted work without permission if the right factors are met

400

double!

Materials that are labeled as P_______  D_________ are not protected by intellectual property laws such as copyright, trademark, or patent laws

public domain

400

These 6 main sections are part of what? 

  • Introduction
  • Definition
  • Policy Statement
  • Acceptable Uses
  • Unacceptable Uses
  • Sanctions

Acceptable Use Policy

400

When you want to send a copy of an email you have received to someone who was not on the list of recipients, you can “f______” the email to that person.

FOWARD

400

If you use R____ A___ to reply to a message that has been sent to multiple people, your reply will be sent to the message's sender as well as all the other recipients

Reply All

400

Tripple!

Which of the following is a common reason for internet censorship?

To improve internet speed

To protect national security

To increase advertising revenue

To promote online gaming





To protect national security

400

double!

What should you do before sharing a link or file online?

Ensure it is relevant and safe for the recipient

Share it immediately without checking

Send it to multiple people to get feedback

Post it publicly without context



Ensure it is relevant and safe for the recipient

400

Which of the following is a sign of unhealthy digital habits?

Feeling anxious without your phone

Using technology to learn new skills

Taking breaks during screen time

Setting boundaries for online usage



Feeling anxious without your phone

500

The “” license is the most restrictive of the six Creative Common Licenses.

CC BY-NC-DN

CC BY-NC-ND

CC BY-NC-CD

CC BY-NC-ND

500

Which of the following is NOT an exclusive right granted to copyright holders?

The right to reproduce the work

The right to distribute copies of the work

The right to perform the work publicly

The right to patent the work



The right to patent the work

500

if the owner assigns the “” license to the material, other users can use the material for free and redistribute the work, as long as credit is given to the original owner

CC BY

CC BB 

CC BY

500

What is the doctrine of 'fair use' in copyright law?

A rule that allows the free use of any copyrighted material

A limitation that permits limited use of copyrighted material without permission under certain conditions

A law that requires payment for all uses of copyrighted material

A principle that applies only to educational institutions



A limitation that permits limited use of copyrighted material without permission under certain conditions

500

The “” license is the least restrictive of the six Creative Common Licenses

CC BY

CC BB

CC BY

500

Question: Which of the following is the primary difference between the CC and BCC fields in an email?

A) CC recipients receive a copy of the email, but BCC recipients do not.

B) CC recipients can see all other recipients, while BCC recipients' addresses are hidden.

C) CC recipients can reply to the email thread, while BCC recipients cannot.

D) CC recipients are considered the primary recipients, while BCC recipients are secondary.

B) CC recipients can see all other recipients, while BCC recipients' addresses are hidden.

500

Question: What is the primary purpose of forwarding an email? 


a) To reply to the sender with a comment.
b) To share the email with a new recipient.
c) To save the email in a different folder.
d) To archive the email for future reference.

b) To share the email with a new recipient.

500

What is the doctrine of 'fair use' in copyright law?

A rule that allows the free use of any copyrighted material

A limitation that permits limited use of copyrighted material without permission under certain conditions

A law that requires payment for all uses of copyrighted material

A principle that applies only to educational institutions

A limitation that permits limited use of copyrighted material without permission under certain conditions

500

How long does copyright protection last for works created after January 1, 1978, in the United States?

50 years after the author's death

70 years after the author's death

100 years after the author's death

Indefinitely

70 years after the author's death

500

Why is it important to verify the credibility of online information?

To avoid spreading misinformation

To increase the number of followers

To save time while browsing

To ignore critical thinking skills


To avoid spreading misinformation