digital citizenship and cyber hyhiene Flashcards
true or false. the info abt a particular person that exists on the internet is a result of only a portion of their online activity. some things dont matter or are not part of a persons digital footprint.
false
a persons digital footprint consists of the following
1. comments u leave
2.pictures u post
3.topics you search
4.apps u use
5.music u download
6.emails u send
all
Which of the following can help you to maintain your digital footprint?
I. Using privacy settings to limit your exposure
II. Posting long rants when you are angry about something
III. Reviewing posts you are tagged in and taking action if needed
IV. Googling yourself on a regular basis
I, III, and IV
Which of the following statements are true about cyberbullying:
I. Cyberbullying uses electronic communication to bully a person.
II. Cyberbullying is a crime in many states.
III. Instances of cyberbullying do not affect the digital footprint of the victim.
IV. Cyberbullying hurts real people even though we can’t always see their reactions online.
I, II, and IV
Victims of cyberbullying may experience which of the following?
Isolation
Low self-esteem
Depression
All of the above
all of the above
True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can’t see or overhear cyberbullying).
true
True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.
false
Which of the following are safety guidelines when socializing online?
I. Be wary when communicating with people you don’t know in real life
II. Don’t disclose personal information–even if it doesn’t seem important
III. Don’t have any social media accounts
IV. Block/report if you are being harassed
V. Don’t send or receive any emails
VI. Ask a trusted adult if you need help
I, II, IV, and VI
Which of the following are best practices for having a secure password?
1Creating a password that is long in length
2Creating a password that has a combination of letters, numbers, and special characters
3Using a password manager
4 all of the above
all of the above
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.
False. It depends if the privacy policy allows you to opt in or out of sharing data.
what describes a credible source?
The domain is .edu.
Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?
“wind power” +Germany
Which of the following actions will help you avoid violation of copyright laws?
Always cite sources
Check the copyright to make sure it can be used by others without permission
Use public domain media
All of these answers
all
Which of the following lists the types of copyright license from most restrictive to least restrictive?
Public Domain, All Rights Reserved, Some Rights Reserved
Public Domain, Some Rights Reserved, All Rights Reserved
All Rights Reserved, Some Rights Reserved, Public Domain
All Rights Reserved, Public Domain, Some Rights Reserved
All Rights Reserved, Some Rights Reserved, Public Domain
what describes an instance of legal hacking?
Penetration testing for a company