1/99
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What is the primary difference between Privacy and Security?
Privacy is the control an individual has over their information; Security is the protection of that information from unauthorized access.
What term defines an event where sensitive, protected, or confidential data is copied, transmitted, viewed, or stolen by an unauthorized individual?
Data Breach
What is the primary purpose of a Virtual Private Network (VPN)?
To create a secure, encrypted connection that blocks internet service providers and others from tracking personal information.
What is the primary reason why limiting information shared on social media is a key security strategy?
Once information is shared online, it is no longer under the person’s control.
Why is it important to shred personal documents before discarding them?
To prevent identity thieves from finding private data through 'dumpster diving.'
What is the term for an individual who uses technology to commit crimes such as identity theft or financial fraud?
Cybercriminal
Which of the following is an example of an Internet Scam (A18)?
A pop-up stating you've won a large prize and asking for your bank information to claim it.
What is a primary strategy for safeguarding personal data and devices (A14)?
Using a combination of strong, unique passwords and multi-factor authentication.
Why must a Social Security Number (SSN) be highly protected?
Because it is a crucial key that cybercriminals can use to steal an individual’s entire identity.
What happens to information that a person shares online (A15)?
It is often permanent and is no longer under the person’s exclusive control, as others can copy or save it.
All individuals who use the Internet have the right to be protected from what, according to the rubric (B5)?
Cyber bullying and harassment.
A core responsibility of an Internet user is to separate what from what (B3)?
Fact from non-fact (opinion, propaganda, falsehoods).
What is the difference between Content and Advertising on the Internet (B4)?
Content is intended to inform, educate, or entertain; Advertising is intended to persuade you to buy something.
Individuals have the right to legally seek help if they feel threatened in cyberspace from whom (B11)?
From their teachers, parents, or legal authorities.
What is a student's right, according to the rubric (B12)?
The right to go to schools, teachers, parents, and authorities with concerns about online behavior.
What is an individual's responsibility regarding the Internet work of others (B16)?
The responsibility of not modifying the Internet work of others without permission.
Which statement best defines the personal right to engage and interact on social media and websites (B9)?
The right to engage, as long as it adheres to the platform’s rules and does not violate digital law or threaten others.
Individuals have the right to remain safe in which three ways while interacting online (B14)?
Physically, Mentally, and Emotionally.
What is the right that individuals have regarding their own posts on sites (B15)?
The right to have those items posted without fear of them being manipulated or stolen by others who claim ownership.
What is the user's right regarding education and information (B13)?
The right to education and information about what is available online.
Which statement best defines a Digital Footprint (C1)?
The trail, record, or traces that people leave online from every email, post, photo, and click they make.
What is the relationship between a Digital Footprint and specialized advertising (C9)?
Your digital footprint is used by advertisers to gather information and target you with specialized ads.
How can a Digital Footprint negatively affect job offers (C10)?
Employers and colleges may find posts, comments, or images that reveal poor judgment, illegal activity, or unprofessional behavior.
How is digital information collected (C8) for your footprint?
Through the use of cookies, which track your activity and preferences.
What is the definition of the Digital Economy (C7)?
The entire ecosystem built from our online connectivity, where business is conducted and information is collected.
What is the best way to ensure you deliver a strong positive digital footprint (C14)?
Make sure your public-facing online content reflects responsibility, skills, and professionalism.
Why is thinking before posting so important (C11)?
Because every email, post, photo, and click leaves a trail that is difficult to remove.
Which of the following is a way an individual makes a digital footprint (C3)?
By sending an email, posting a photo, commenting on a video, or using a search engine.
How does your digital footprint get gathered by advertisers, employers, and companies (C6)?
Through data collected by your web browser, IP address, and third-party tracking (cookies).
Why is it important to know that every email, post, photo, and click leaves a trail (C5)?
Because it means all online activity contributes to your permanent, public digital footprint.
What is the best way to conduct an Internet search to get relevant results (D1)?
By using the minimum number of key terms to precisely define the topic.
When conducting an Internet search, what is a crucial step in the process of evaluating information (D3, D5)?
Checking if the information is backed by research and separating fact from opinion.
What does understanding political persuasion mean when conducting Internet searches (D4)?
Recognizing that search results and articles may be biased and intended to influence your beliefs.
How can you tell the difference between a fact and an opinion on a website (D11)?
A fact is a statement that can be proven true; an opinion is a personal belief or judgment that cannot be proven.
What is the main reason that different search terms can result in very different websites (D10)?
Search engines interpret slight variations in terms as completely distinct topics, providing specialized results.
What is the rationale for selecting a reputable Internet search engine (D6)?
To ensure search results are unbiased, comprehensive, and protect user privacy.
How can Internet searches be traced (D9)?
They can be traced through your IP address, cookies, and search history tied to your user account.
Which of the following is an example of a popular search engine (D7)?
Google, Bing, or DuckDuckGo
What does Plagiarism mean (E2)?
The illegal activity of using someone else’s work, ideas, or words as your own without giving proper credit.
What does Copyright legally define (E1)?
The legal right granted to an author or creator for their original work, which includes the right to copy and distribute that work.
What is the responsibility of a user regarding copyright laws (E3)?
To be aware of and obey copyright laws before using work produced by others.
What does Fair Use of information mean (E5)?
The legal allowance for the limited use of copyrighted material without permission for purposes like criticism, news reporting, or education.
What is appropriate citation of work produced by others (E6)?
Providing proper credit to the original author, creator, or source using an accepted format (like MLA or APA).
How do copyright laws also involve protection of images (E8)?
Images, photos, and graphics are considered artistic or creative works and are legally protected just like text and music.
What is one of the rights of individuals who have copyright protection (E10)?
The right to sue anyone who uses their work without authorization, outside the scope of Fair Use.
What is the main reason the Internet has magnified copyright laws (E9)?
Because the ease of copying and sharing digital content makes infringement faster, easier, and harder to track.
What is the primary consequence associated with breaking copyright laws (E4)?
Potential legal action, including fines and criminal charges.
What is the illegal activity associated with plagiarism (E2)?
It is the illegal activity of taking credit for someone else's original work.
What is the best way to avoid the consequences of breaking copyright laws?
Obey copyright laws, use works under Fair Use guidelines, or seek permission from the creator.
Which of the following is an example of an original work that is protected by copyright?
A photograph you took with your cell phone camera.
What is the definition of Cyber Bullying (F1)?
Bullying that takes place using digital devices like cell phones, computers, and tablets.
Why is social networking and interaction ripe for cyber bullying (F2)?
Because the screens and distance reduce empathy and allow users to act without fear of immediate physical confrontation.
What is the Internet lingo (F3) or informal rules of politeness and behavior when communicating online?
Netiquette
What is the primary negative impact of cyber bullying (F5)?
It causes significant emotional and mental harm to the victim, often leading to depression, anxiety, and social isolation.
What is the main reason why cyber bullying should be confronted and reported (F4)?
To stop the offense, get the victim help, and ensure that the bully faces consequences for their permanent public record.
How does Digital Law protect users of the Internet (F8)?
It establishes rules, consequences, and the legal framework for crimes like harassment, identity theft, and fraud.
Why can it be difficult for children experiencing cyber bullying to find relief (F12)?
Because digital devices offer an ability to immediately and continuously communicate 24 hours a day, making escape difficult.
Which forms of communication are explicitly mentioned in the rubric as being used for cyber bullying (F9)?
E-mail, social media, chatrooms, and text messages.
What is the mental impact (F7) of cyber bullying on the victim?
Emotional and psychological harm, including anxiety, depression, and lowered self-esteem.
How does the content an individual shares online create a kind of permanent public record (F11)?
Because most information communicated electronically is permanent and public if not immediately reported and removed.
The right of individuals to not be diminished or bullied by others in cyberspace is related to which other right (B7)?
The right to protection from violence and harassment (B6).
Which statement best explains the far-reaching negative effects from cyber bullying (F15)?
The negative impacts can affect a victim’s relationships, education, mental health, and even future employment.
What is the right that individuals have to participate in online discussions and forums (B8)?
The right to participate, provided they follow the community guidelines (Netiquette) and digital law.
What is the primary way that personal privacy is compromised (A2)?
By a combination of data breaches, social engineering scams, and users oversharing information.
Why is it important to limit information shared on social media (A10)?
Because the content is often permanent and can be used against an individual (A13).
What is the purpose of blocking Internet sites and cellphone numbers (A16)?
To prevent cyber bullying, spam, or unwanted contact from known threats.
How can information shared by an individual be used against them (A13)?
By identity thieves, scammers, or harassers who use the data for impersonation, targeting, or blackmail.
Which statement best explains the right to acknowledge how the Internet works (B1)?
The right to understand the basic technical and functional principles of the Internet, including data transmission and services.
How is information accessed on the Internet (B2)?
Through web browsers, search engines, direct links (URLs), and application interfaces (APIs).
The use of Internet alerts (C12) is a strategy to protect your personal digital footprint by doing what?
Notifying you when your name, email, or other information appears online in unexpected places.
Why is research backing important for information found from Internet searches (D5)?
It verifies the source’s credibility and ensures the information is factual and not just opinion or persuasion.
What is the key parameter for selecting the best honest search engine (D8)?
It must prioritize user privacy, minimize personalized tracking, and present results without excessive bias or political persuasion.
What is a major consequence associated with plagiarism (E4)?
Failing grades, expulsion from school, and potential legal action if copyrighted material is used.
What does the statement 'most information communicated electronically is permanent and public' mean for a cyber bully (F13)?
That their negative online reputation can impact their own college admissions, employment, and other areas of life.
What is an appropriate step to take if you receive an email that looks like it's from a bank but asks for your password (A18)?
Recognize it as a potential phishing scam and contact the bank directly through their official website or phone number to verify.
The right to have an opinion without fear of violence or harassment (B10) is protected by which other right?
The right to protection from violence (B6) and to not be diminished or bullied (B7).
Which type of personal home security (A17) can help safeguard digital devices?
Installing anti-virus software, firewalls, and securing your Wi-Fi network with a strong password.
How does using a Virtual Private Network (VPN) protect access of personal data (A9)?
By encrypting data, making it unreadable to hackers, ISPs, and third-party trackers.
Which of these contributes most to a negative digital footprint (C4)?
Posting mean or hurtful comments about another student in a public forum.
Which of these contributes most to a positive digital footprint (C4)?
Posting examples of academic achievement, community service, or creative work.
Why is it important to use a precise process for choosing the best search engine (D2)?
Because the search engine you choose directly impacts the quality, impartiality, and privacy of your results.
What is the illegal activity associated with plagiarism (E2)?
Theft of intellectual property.
What is the key reason for cyber bullying occurring on the Internet, as opposed to in person (F6)?
The distance, anonymity, and lack of accountability can embolden users to engage in mean or hurtful behavior.
How can a digital footprint be used to make a positive first impression (C13)?
By maintaining public profiles that showcase desirable skills, achievements, and professional interests.
What does the right to protection from violence (B6) mean in the digital context?
The right to be free from threats of physical harm and severe verbal or emotional abuse online.
What is the goal of a cybercriminal when targeting an individual's personal data (A13)?
To exploit the information for financial gain, identity theft, or to compromise accounts and privacy.
What is the primary way that cyber bullying occurs through e-mail, social media, chatrooms, and text messages (F9)?
By sending mean, threatening, false, or embarrassing messages and images repeatedly or publicly.
What must an Internet user understand about their responsibility to obey copyright laws (E7)?
That the laws are federal statutes that apply to all digital content and that breaking them has serious consequences.
The fact that digital forums, comments, and photos shared by individuals can often be viewed by strangers as well as acquaintances (F10) emphasizes what concept?
The wide public reach and lack of complete control over one's digital footprint.
What is the primary way that security is compromised (A6) (as opposed to privacy)?
By unauthorized access to a system or data, often due to a technical vulnerability or weak passwords.
Why is it important to have research backing information from Internet searches (D5)?
To confirm that the information is fact and not opinion or political persuasion.
Which of these is a direct consequence of a negative online reputation for a bully (F13)?
The inability to get a good job or be accepted into a college.
What is the right of the individual regarding posting things on sites (B15)?
The right to post without those items being manipulated or stolen by others who claim ownership.
What is the best way to separate fact from non-fact (B3) when you are not sure about a source?
Cross-reference the information with multiple reliable, reputable sources to see if they confirm the finding.
What is the primary way that the digital footprint is important (C2)?
It creates a permanent online image that will influence future academic, personal, and professional opportunities.
The right to protection from cyber bullying and harassment (B5) is reinforced by what other part of the rubric?
The requirement to learn Netiquette (F3) and the right to seek help (B11).
What is the best way to ensure that your use of copyrighted material falls under the principle of Fair Use (E5)?
Use a small portion of the work, and use it for non-profit educational, news reporting, or critical purposes.
What is the difference between a Security Breach (A6) and a Data Breach (A4)?
A Security Breach is a breakdown of the system’s defense; a Data Breach is the specific event of information being stolen.
Which statement best explains how a VPN blocks internet browsers, cable companies, and ISPs from tracking personal information (A8)?
It hides your true IP address and encrypts your traffic so they cannot see your destination or the content of your browsing.
How can students go to schools, teachers, parents, and authorities with concerns about online behavior (B12)?
By following the legal right to report cyber bullying or any threatening online behavior to trusted, responsible adults and authorities.