__________ is the ethical principle of respecting the privacy and confidentiality of information shared online or through digital communication.
Netiquette
A strong ________ should be a mix of letters, numbers, and symbols to protect your online accounts from unauthorized access.
password
Ignoring _______updates can leave your computer vulnerable to new security threats.
software
___________ laws protect the original works of creators, such as authors, musicians, and artists, from being used without permission.
Copyright
The purpose of the ____ _____ _____ is to enable limited use of copyrighted material for educational or research purposes.
fair use laws
Before sending an email, it’s important to ______________ your message to ensure clarity and avoid misunderstandings.
proofread
A ________ is a type of malicious software designed to replicate itself and spread to other computers, often causing damage.
Virus
The use of _______ software helps to detect and remove malware from your computer.
antivirus
Posting _________ content on social media can result in disciplinary consequences, such as suspension or expulsion from school.
inappropriate
Cyberbullying consequences can lead to ______ ______ and school disciplinary measures.
legal action
Using all capital letters in an email is often considered______ because it can be interpreted as shouting.
rude, improper netiquette
Downloading software or media without paying for it or obtaining the proper permissions is considered as ______ and is illegal.
Piracy
Unauthorized access to someone else’s computer or online account is an example of _______ behavior.
hacking
__________ is a form of unethical behavior where someone copies or uses someone else’s work and claims it as their own without proper acknowledgment.
Plagiarism
Sharing private information without permission can be a breach of _______ and have potential legal consequences.
trust
When using social media, it’s crucial to respect others’ _______ by not sharing their private information without permission.
privacy
The practice of sending fraudulent emails to trick people into providing personal information is known as _________.
phishing
_______ ___ ______ is the practice of intentionally disrupting online services, such as websites, by overwhelming them with traffic.
Denial of Service (DoS)
The principle of _____________ensures that sensitive business-related information is only accessible to authorized individuals.
confidentiality
A company must comply with ______ protection regulations.
data
___________ is a form of online harassment where someone uses technology to bully or intimidate another person.
Cyberbullying
Opening email attachments from unknown senders can put your computer at risk of being infected with ________.
malware
When working with sensitive business information, it’s important to use __________ to protect files and communications from unauthorized access.
encryption
The ______ ______ _______ allows limited use of copyrighted material without requiring permission from the rights holders, typically for educational or commentary purposes.
Fair Use Doctrine
If a company fails to protect customer's credit card information, the company could face __________ and fines.
lawsuits