No student devices needed. Know more
40 questions
Lack of downtime is one of the ________________ impacts of technology on the workplace.
Positive
Negative
Public domain represents works whose intellectual property rights have extended or works that have
been released by the creator.
True
False
Dependency on technology is one of the ________________ impacts of technology on the workplace.
Positive
Negative
The Fair Use rule of copyright law explains ________.
when free use of copyrighted material is unacceptable.
when free use of copyrighted material is acceptable.
A digital native is a person who has been exposed to technology at a(n) ____________________ and is
comfortable using it.
Young Age
Old Age
School
Home
Efficiency is one of the ________________ impacts of technology on the workplace.
Positive
Negative
Which of the following is a positive impact of technology on society?
Global deterioration
Inactive lifestyles
Staying connected
Decreased human interaction
Select the item below that can be protected by a copyright:
Ideas
Facts
Music
What is software that is provided to others with restrictions or for a certain limited trial basis?
Freeware
Purchased license
Shareware
Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own.
stealing
remixing
rewording
borrowing
The "A" in the D.E.A.L. acronym stands for
applaud
authenticate
ascertain
assess
The digital divide is an economic ________________ between groups, broadly construed, in terms of access
to, use of, or knowledge of information and communication technologies.
equality
inequality
abnormality
normalcy
A software license is an agreement between you and the owner of a software program that allows you
to perform certain tasks with software.
True
False
Intellectual property is the works, inventions or creations of an individual, group or business.
True
False
Asking questions are important to determining the best use of digital communication because they help
me think _______________________, which helps me make better decisions.
while taking action
before taking action
about past actions
after taking action
To whom should you report cyberbullying?
authority figures
friends
church members
classmates
Confidential and proprietary information is information that ______________ be shared outside of the company without prior consent.
can
is allowed to
should not
should
Does a company have the right to monitor all your digital communications if you are using their
equipment?
no
yes
Cyberbullying is protected by Freedom of Speech.
true
false
Cyberbullying is the use of Information Technology to harm or harass other people in a _______________,
repeated, and hostile manner.
inappropriate
unconscious
accidental
deliberate
If your friends are involved in cyberbullying, you should
ignore it
hope it goes away
ask them to stop
join in the fun
Is making hateful comments about someone through emails, blogs, on-line profiles, or chat rooms
considered a method of cyberbullying?
no
yes
A ____________ conviction in a cyberbullying case may result in the offender paying restitution to the
victim's family.
civil
criminal
Before I post something on-line that is critical about someone, one of the questions I should ask myself
is, "Am I doing this because of a(n) _______________________?"
great idea
peer pressuring me
emotional reaction
rumor
Visiting Internet sites that are prohibited by an employer could result in consequences up to and
including termination.
true
false
Free Wi-Fi is typically offered on a(n) __________ network.
unencrypted
private
encrypted
open
A digital footprint is all of the information on-line about a person posted by that person or others,
_______________.
recklessly
intentionally
intentionally or unintentionally
unintentionally or accidentally
What type of identity theft occurs when a thief spends another person's money or opens a line of credit
in their name?
criminal
financial
governmental
medical
Protecting what is added to your digital footprint is important because potentially embarrassing
information can remain on-line ___________.
until removed
up to 6 months
until it is forgotten
forever
How are digital assets and digital footprints related?
Digital assets and digital footprints are not related
Digital assets and digital footprints are the same
Digital footprints create digital assets
Digital assets create digital footprints
Julia receives an email from an unknown source. The subject of the email looks strange and it has an
attachment. What should Julia do?
open the attachment
respond to the email
delete the email
forward the email
Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an
attachment. What should Ryan do?
delete the email
ask Mike if he sent the email
Respond to the email
Open the attachment
Is "Ih@%eC@ts!" a strong password?
No
yes
Malware is software that has _______________.
faster speed
positive intent
malicious intent
poor behavior
Hiring managers and college admissions officers are some of the people who use social media and
other Internet resources to research candidates for employment.
true
false
Identity theft is when someone wrongfully obtains and uses another person's personal data, typically
for economic gain.
true
false
____________ is the act of breaking into a computer to steal information.
hacking
safe-cracking
lifting
identity theft
What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file
taxes or reap other benefits?
criminal
medical
governmental
financial
A ____________ attaches itself to a file or program, enabling it to spread from one computer to another.
computer virus
worm
Antivirus software is a computer program that _____________, prevents, and takes action to disarm or
remove malicious software programs.
deters
approves
detects
avoids
Explore all questions with a free account