Lack of downtime is one of the ______ impacts of technology on the workplace.
negative
positive
2. Multiple Choice
30 seconds
1 pt
The Fair Use rule of copyright law explains ________.
when free use of copyrighted material is acceptable
when free use of copyrighted material is unacceptable
3. Multiple Choice
30 seconds
1 pt
Dependency on technology is one of the _________ impacts of technology on the workplace.
positive
negative
4. Multiple Choice
30 seconds
1 pt
Which of the following is a positive impact of technology on society?
Global deterioration
Decreased human interaction
Staying connected
Inactive lifestyles
5. Multiple Choice
30 seconds
1 pt
Efficiency is one of the _________ impacts of technology on the workplace
positive
negative
6. Multiple Choice
30 seconds
1 pt
Public domain represents works whose intellectual property rights have extended or works that have been released by the creator.
True
False
7. Multiple Choice
30 seconds
1 pt
The digital decide is an economic _____ between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies.
abnormality
normalcy
equality
inequality
8. Multiple Choice
30 seconds
1 pt
Plagiarism is the _______ of someone else's words or ideas and presenting them as your own.
rewording
remixing
stealing
borrowing
9. Multiple Choice
30 seconds
1 pt
Select the item below that can be protected by a copyright:
Ideas
Music
Facts
10. Multiple Choice
30 seconds
1 pt
A digital native is a person who has been exposed to technology at a(n) ___________ and is comfortable using it.
old age
school
home
young age
11. Multiple Choice
30 seconds
1 pt
What is software that is provided to others with restrictions or for certain limited trial basis?
Freeware
Shareware
Purchased license
12. Multiple Choice
30 seconds
1 pt
Intellectual property is the works, inventions or creations of an individual, group or business.
True
False
13. Multiple Choice
30 seconds
1 pt
A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software.
True
False
14. Multiple Choice
30 seconds
1 pt
The "A" in the D.E.A.L. acronym stands for
Authenticate
Assess
Ascertain
Applaud
15. Multiple Choice
30 seconds
1 pt
A ______ conviction in a cyberbullying case may result in the offender paying restitution to the victim's family.
civil
criminal
16. Multiple Choice
30 seconds
1 pt
Cyberbullying is the use of Information Technology to harm or harass other people in a ________ repeated, and hostile manner.
deliberate
inappropriate
unconscious
accidental
17. Multiple Choice
30 seconds
1 pt
To whom should you report cyberbullying?
classmates
church members
authority figures
friends
18. Multiple Choice
30 seconds
1 pt
Does a company have the right to monitor all your digital communications if you are using their equipment?
Yes
No
19. Multiple Choice
30 seconds
1 pt
If your friends are involved in cyberbullying, you should
hope it goes away
join in the fun
ignore it
ask them to stop
20. Multiple Choice
30 seconds
1 pt
Asking questions are important to determining the best use of digital communication because they help me think _____, which helps me make better decisions.
while taking action
after taking action
about past actions
before taking action
21. Multiple Choice
30 seconds
1 pt
Visiting Internet sites that are prohibited by an employer could result in consequences up to and including termination.
False
True
22. Multiple Choice
30 seconds
1 pt
Cyberbullying is protected by Freedom of Speech.
True
False
23. Multiple Choice
30 seconds
1 pt
Confidential and proprietary information is information that _____ be shared outside of the company without prior consent.
can
should
should not
is allowed to
24. Multiple Choice
30 seconds
1 pt
Is making hateful comments about someone through emails, blogs, on-line profiles, or chat rooms considered a method of cyberbullying?
No
Yes
25. Multiple Choice
30 seconds
1 pt
Before I post something on-line that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _________?"
peer pressuring me
rumor
emotional reaction
great idea
26. Multiple Choice
30 seconds
1 pt
What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or real other benefits?
Financial
Medical
Criminal
Governmental
27. Multiple Choice
30 seconds
1 pt
Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?
Respond to the email
Delete the email
Forward the email
Open the attachment
28. Multiple Choice
30 seconds
1 pt
A ________ attaches itself to a file or program, enabling it to spread from one computer to another.
worm
computer virus
29. Multiple Choice
30 seconds
1 pt
What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?
Criminal
Financial
Medical
Governmental
30. Multiple Choice
30 seconds
1 pt
____________ is the act of breaking into a computer to steal information.
hacking
lifting
safe-cracking
identity theft
31. Multiple Choice
30 seconds
1 pt
Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment.
False
True
32. Multiple Choice
30 seconds
1 pt
How are digital assets and digital footprints related?
Digital footprints create digital assets.
Digital assets and digital footprints are the same
Digital assets create digital footprints
Digital assets and digital footprints are not related
33. Multiple Choice
30 seconds
1 pt
A digital footprint is all of the information online about a person posted by that person or others, ____________.
unintentionally or accidently
recklessly
intentionally
intentionally or unintentionally
34. Multiple Choice
30 seconds
1 pt
Malware is software that has ____________.
faster speed
poor behavior
positive intent
malicious intent
35. Multiple Choice
30 seconds
1 pt
Protecting what is added to your digital footprint is important because potentially embarrassing information can remain online _________.
forever
until it is forgotten
until removed
up to 6 months
36. Multiple Choice
30 seconds
1 pt
Free Wi-Fi is typically offered on a(n) __________ network.
encrypted
unencrypted
open
private
37. Multiple Choice
30 seconds
1 pt
Identity theft is when someone wrongfully otains and uses another person's personal data, typically for economic gain.
False
True
38. Multiple Choice
30 seconds
1 pt
Is "lh@%eC@ts!" a strong password?
No
Yes
39. Multiple Choice
30 seconds
1 pt
Antivirus software is a computer program that _______, prevents, and takes action to disarm or remove malicious software programs.
avoids
approves
detects
deters
40. Multiple Choice
30 seconds
1 pt
Ryan receives an email from his cousin Mike. The subject of the email look strange and it has an attachment. What should Ryan do?