digital citizenship and cyber hyhiene Flashcards

1
Q

true or false. the info abt a particular person that exists on the internet is a result of only a portion of their online activity. some things dont matter or are not part of a persons digital footprint.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a persons digital footprint consists of the following
1. comments u leave
2.pictures u post
3.topics you search
4.apps u use
5.music u download
6.emails u send

A

all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can help you to maintain your digital footprint?
I. Using privacy settings to limit your exposure
II. Posting long rants when you are angry about something
III. Reviewing posts you are tagged in and taking action if needed
IV. Googling yourself on a regular basis

A

I, III, and IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements are true about cyberbullying:
I. Cyberbullying uses electronic communication to bully a person.
II. Cyberbullying is a crime in many states.
III. Instances of cyberbullying do not affect the digital footprint of the victim.
IV. Cyberbullying hurts real people even though we can’t always see their reactions online.

A

I, II, and IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Victims of cyberbullying may experience which of the following?
Isolation
Low self-esteem
Depression
All of the above

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can’t see or overhear cyberbullying).

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are safety guidelines when socializing online?

I. Be wary when communicating with people you don’t know in real life
II. Don’t disclose personal information–even if it doesn’t seem important
III. Don’t have any social media accounts
IV. Block/report if you are being harassed
V. Don’t send or receive any emails
VI. Ask a trusted adult if you need help

A

I, II, IV, and VI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are best practices for having a secure password?
1Creating a password that is long in length
2Creating a password that has a combination of letters, numbers, and special characters
3Using a password manager
4 all of the above

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.

A

False. It depends if the privacy policy allows you to opt in or out of sharing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what describes a credible source?

A

The domain is .edu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?

A

“wind power” +Germany

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following actions will help you avoid violation of copyright laws?

Always cite sources

Check the copyright to make sure it can be used by others without permission

Use public domain media

All of these answers

A

all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following lists the types of copyright license from most restrictive to least restrictive?

Public Domain, All Rights Reserved, Some Rights Reserved

Public Domain, Some Rights Reserved, All Rights Reserved

All Rights Reserved, Some Rights Reserved, Public Domain

All Rights Reserved, Public Domain, Some Rights Reserved

A

All Rights Reserved, Some Rights Reserved, Public Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what describes an instance of legal hacking?

A

Penetration testing for a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity.

A

false

17
Q

What is not true of white hat hackers?

A

They are breaking the law and are at risk of legal repercussions

18
Q

Which of the following best describes a person’s digital footprint?

A person’s digital footprint is permanent, and the person has no control over its maintenance.

A person’s digital footprint is not usually permanent, and the person has some control over its maintenance.

A person’s digital footprint is permanent, and the person has some control over its maintenance.

A

A person’s digital footprint is permanent, and the person has some control over its maintenance.

19
Q

Which of the following people can access your digital footprint?
Teachers, colleges, and scholarship committees

I. Potential employers

III. Family, friends, and acquaintances

I only
I and II only
III only
I-III All

A

all