Which of the following was invented by Johannes Gutenberg?
Printing Press
A document that guides how business should be conducted is called a(n) ______.
Code of ethics
Using copyrighted material without permission is called ______.
Infringement
Spyware, Trojan horses, worms, and software viruses are examples of ______.
Malware
Speaking a false statement about an individual that causes others to have a bad opinion of the person is called ______.
Slander
Line-of-sight communication is real-time communication in which the sender and receiver have to be ______.
Visible to each other
______ is the fluency in which an individual can safely and effectively use digital technology and tools for learning, collaborating, and producing information.
Digital literacy
______ allows individuals to use copyrighted works without permission in limited situations under very strict guidelines.
Fair use doctrine
Which of the following describes the use of remote servers to store, access, manage, and process data over the Internet rather than on a personal computer or local server?
Cloud computing
Writing false statements online that damage a person’s reputation is called ______.
Libel
Early humans began to permanently record ideas using ______.
Cave drawings
Responsible and appropriate use of technology is known as ______.
Digital citizenship
Material that is free to use and owned by no one is called ______.
Public domain
Which of the following is not a category of authentication?
Something you think
Sending unwanted messages to many people is called ______.
Spamming
Johannes Gutenberg’s invention led to wider distribution and communication of ______.
Ideas
Any work created by employees that belongs to the company is called ______.
Proprietary information
A ______ protects a legally registered name or description of an organization’s services rather than its goods.
Service mark
Storing information on remote servers over the internet is known as ______.
Cloud computing
Posting mean or hateful messages online is known as ______.
Flaming
The first true alphabet was developed by the ______ around 1100 BC.
Phoenicians
Responsible and appropriate use of technology describes ______.
Digital citizenship
Using copyrighted works without permission in limited situations under strict rules is known as ______.
Fair use doctrine
“Something you know,” “something you have,” and “something you are” are all types of ______.
Authentication
Which of the following organizations did NOT help create the Career Cluster Initiative?
U.S. Department of Labor