Digital Citizenship and Cyber Hygiene

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

A person's digital footprint consists of the following:

I. Comments you leave
II. Pictures you post
III. Topics you search
IV. Apps you use
V. Music you download
VI. Emails you send

I - VI all

2
New cards

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.

False

3
New cards

Which of the following can help you to maintain your digital footprint?
I. Using privacy settings to limit your exposure
II. Posting long rants when you are angry about something
III. Reviewing posts you are tagged in and taking action if needed
IV. Googling yourself on a regular basis

I, III, and IV

4
New cards

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying).

True

5
New cards

Which of the following statements are true about cyberbullying:
I. Cyberbullying uses electronic communication to bully a person.
II. Cyberbullying is a crime in many states.
III. Instances of cyberbullying do not affect the digital footprint of the victim.
IV. Cyberbullying hurts real people even though we can't always see their reactions online.

I, II, and IV

6
New cards

Victims of cyberbullying may experience which of the following?

Isolation, Low self-esteem, and Depression

7
New cards

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

False

8
New cards

Which of the following are safety guidelines when socializing online?

I. Be wary when communicating with people you don't know in real life
II. Don't disclose personal information-even if it doesn't seem important
III. Don't have any social media accounts
IV. Block/report if you are being harassed
V. Don't send or receive any emails
VI. Ask a trusted adult if you need help

I, II, IV, and VI

9
New cards

Which of the following are best practices for having a secure password?

Creating a password that is long in length, Creating a password that has a combination of letters, numbers, and special characters, and Using a password manager

10
New cards

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

11
New cards

A privacy policy discloses:

How a company uses your data, How a company shares your data, How a company gathers your data

12
New cards

Which of the following describes a credible source?

The domain is .edu

13
New cards

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?

"wind power" +Germany

14
New cards

Which of the following actions will help you avoid violation of copyright laws?

Always cite sources, Check the copyright to make sure it can be used by others without permission, Use public domain media

15
New cards

Which of the following lists the types of copyright license from most restrictive to least restrictive?

All Rights Reserved, Some Rights Reserved, Public Domain

16
New cards

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity.

False

17
New cards

Which of the following describes an instance of legal hacking?

Penetration testing for a company

18
New cards

What is not true of white hat hackers?

They are breaking the law and are at risk of legal repercussions

19
New cards

Bug Bounty Programs

Companies pay individuals who report vulnerabilities before malicious hackers can exploit them.

20
New cards

Illegal hacking can lead to

Felony charges, Prison time (up to 20 years), and fines (up to $15,000).