0% found this document useful (0 votes)
65 views

Chapter 23

Uploaded by

evelynhrdz32
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Chapter 23

Uploaded by

evelynhrdz32
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 23: Digital Citizenship

Part 1: Content Review


Matching
Choose the letter of the correct term for each definition.
Terms:
A. digital communication
B. digital literacy
C. digital footprint
D. piracy
E. public domain
F. authentication
G. hacking
H. cookies
I. spyware
J. firewall
1. The unethical and illegal copying or downloading of software, files, and other protected
material.
Answer: D
2. The process of verifying a user’s identity.
Answer: F
3. The exchange of information through electronic means.
Answer: A
4. The ability to use technology to locate, evaluate, communicate, and create information.
Answer: B
5. Software that spies on a computer.
Answer: J
6. A program that monitors information coming into a computer.
Answer: I
7. Material that is not owned by anybody and can be used without permission.
Answer: E
8. Illegally accessing or altering digital devices, software, or networks.
Answer: G
9. A data record of all an individual’s online activities.
Answer: C
10. Bits of data stored on your computer that record information about the websites you have
visited.
Answer: H
Multiple Choice
Choose the letter of the correct answer to each question.
1. Using the Internet to harass or threaten an individual is _____.
A. plagiarism
B. hacking
C. cyberbullying
D. spamming
Answer:
2. _____ is sending unwanted mass e-mails or intentionally flooding an individual’s social
media site or e-mail inbox with unwanted messages.
A. Plagiarism
B. Hacking
C. Cyberbullying
D. Spamming
Answer:
3. Crimes of defamation are _____.
A. slander and libel
B. flaming and spamming
C. plagiarism and piracy
D. infringement and phishing
Answer:
4. Which of the following protects intellectual property?
A. Copyright
B. Patent
C. Trademark
D. All of the above.
Answer:
5. The legal permission to use a software program is a _____.
A. patent
B. license
C. trademark
D. All of the above.
Answer:
6. A set of rules concerning the use of company-owned and company-operated equipment is
found in a(n) _____.
A. Electronic User’s Bill of Rights
B. acceptable use policy
C. Internet protocol address
D. General Public License
Answer:
7. The use of fraudulent e-mails and copies of valid websites to trick people into providing
private and confidential data is _____.
A. phishing
B. hacking
C. piracy
D. infringement
Answer:
8. Which of the following is not a form of malware?
A. Spyware
B. Cookies
C. Worms
D. Trojan horse
Answer:
9. An illegal act that involves stealing someone’s personal information and using that
information to commit theft or fraud is _____.
A. phishing
B. hacking
C. identify theft
D. defamation
Answer:
10. Companies and schools can use _____ to prevent unauthorized Internet surfing or visiting
selected websites during working hours.
A. pop-up blockers
B. firewalls
C. filters
D. regular backups
Answer:
Completion
Choose the word(s) that best completes each of the following statements.
1. Someone who regularly and skillfully engages in the use of technology, such as the Internet,
computers, and other digital devices, is a(n) _____.
Answer: Digital citizen
2. The standard of appropriate behavior when using technology to communicate is _____.
Answer: Digital citizenship
3. The art of using good manners in any situation is _____.
Answer: Etiquette
4. Something that comes from a person’s mind, such as an idea, invention, or process, is
considered _____.
Answer: Intellectual Property
5. The unethical and illegal practice of claiming another person’s material as your own is
_____.
Answer: Plagiarism
6. Many websites list rules, called the _____, which must be followed for downloaded files.
Answer: Term of use
7. _____ is the use of multiple authentication techniques to verify a person’s identity.
Answer: Authentication
8. _____ is a term that refers to software programs that are intended to damage, destroy, or steal
data.
Answer: Virus
9. _____ are malware usually disguised to appear as a useful or common application in order to
convince people to download or use the program.
Answer: Trojan
10. A computer program designed to negatively impact a computer system by infecting other files
is a(n) _____.
Answer: Malware

You might also like