Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
Chapter 23: Digital Citizenship
Part 1: Content Review
Matching Choose the letter of the correct term for each definition. Terms: A. digital communication B. digital literacy C. digital footprint D. piracy E. public domain F. authentication G. hacking H. cookies I. spyware J. firewall 1. The unethical and illegal copying or downloading of software, files, and other protected material. Answer: D 2. The process of verifying a user’s identity. Answer: F 3. The exchange of information through electronic means. Answer: A 4. The ability to use technology to locate, evaluate, communicate, and create information. Answer: B 5. Software that spies on a computer. Answer: J 6. A program that monitors information coming into a computer. Answer: I 7. Material that is not owned by anybody and can be used without permission. Answer: E 8. Illegally accessing or altering digital devices, software, or networks. Answer: G 9. A data record of all an individual’s online activities. Answer: C 10. Bits of data stored on your computer that record information about the websites you have visited. Answer: H Multiple Choice Choose the letter of the correct answer to each question. 1. Using the Internet to harass or threaten an individual is _____. A. plagiarism B. hacking C. cyberbullying D. spamming Answer: 2. _____ is sending unwanted mass e-mails or intentionally flooding an individual’s social media site or e-mail inbox with unwanted messages. A. Plagiarism B. Hacking C. Cyberbullying D. Spamming Answer: 3. Crimes of defamation are _____. A. slander and libel B. flaming and spamming C. plagiarism and piracy D. infringement and phishing Answer: 4. Which of the following protects intellectual property? A. Copyright B. Patent C. Trademark D. All of the above. Answer: 5. The legal permission to use a software program is a _____. A. patent B. license C. trademark D. All of the above. Answer: 6. A set of rules concerning the use of company-owned and company-operated equipment is found in a(n) _____. A. Electronic User’s Bill of Rights B. acceptable use policy C. Internet protocol address D. General Public License Answer: 7. The use of fraudulent e-mails and copies of valid websites to trick people into providing private and confidential data is _____. A. phishing B. hacking C. piracy D. infringement Answer: 8. Which of the following is not a form of malware? A. Spyware B. Cookies C. Worms D. Trojan horse Answer: 9. An illegal act that involves stealing someone’s personal information and using that information to commit theft or fraud is _____. A. phishing B. hacking C. identify theft D. defamation Answer: 10. Companies and schools can use _____ to prevent unauthorized Internet surfing or visiting selected websites during working hours. A. pop-up blockers B. firewalls C. filters D. regular backups Answer: Completion Choose the word(s) that best completes each of the following statements. 1. Someone who regularly and skillfully engages in the use of technology, such as the Internet, computers, and other digital devices, is a(n) _____. Answer: Digital citizen 2. The standard of appropriate behavior when using technology to communicate is _____. Answer: Digital citizenship 3. The art of using good manners in any situation is _____. Answer: Etiquette 4. Something that comes from a person’s mind, such as an idea, invention, or process, is considered _____. Answer: Intellectual Property 5. The unethical and illegal practice of claiming another person’s material as your own is _____. Answer: Plagiarism 6. Many websites list rules, called the _____, which must be followed for downloaded files. Answer: Term of use 7. _____ is the use of multiple authentication techniques to verify a person’s identity. Answer: Authentication 8. _____ is a term that refers to software programs that are intended to damage, destroy, or steal data. Answer: Virus 9. _____ are malware usually disguised to appear as a useful or common application in order to convince people to download or use the program. Answer: Trojan 10. A computer program designed to negatively impact a computer system by infecting other files is a(n) _____. Answer: Malware