Digital Citizenship - UNIT 3 Lessons 1&2 Review PDF

Title Digital Citizenship - UNIT 3 Lessons 1&2 Review
Author EUGENE DEXTER NONES
Course BS Accountancy
Institution Saint Louis University Philippines
Pages 2
File Size 43.6 KB
File Type PDF
Total Downloads 9
Total Views 192

Summary

This may help you in your studies in the future...


Description

Password

"WS1979" is NOT a good online ________________?

forever Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line_________. Medical What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud? Criminal Which type of identity theft occurs when a thief uses someone else's identity to commit a crime? computer virus A __________ attaches itself to a file or program, enabling it to spread from one computer to another. scam The primary goal of an Internet ___________ is to gain access to someone's personal information or their finances. malware Email attachments, fictitious websites, pop-up ads, and spam are all ways _____________can be shared. Social Media Hiring managers and college admissions officers are some of the people who use _________ ________ and othe Internet resources to research candidates employment. Delete the email Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do? password In order to protect your _________, don't use easy-to-guess information, don't share your _________, and ALWAYS change your ____________ Digital assets create digital footprintsHow are digital assets and digital footprints related? An image you do not have the right to use

This is NOT considered a digital asset?

Digital Asset A ____________ ____________ can contain textual content, images, and multimedia. Hacking

_____________ is the act of breaking into a computer to steal information.

Identity Theft _____________ __________ is when someone wrongfully obtains and uses another person's personal data, typically for economic gain. intentionally or unintentionally A digital footprint is all of the information on-line about a person posted by that person or others, ____________________________.

unencrypted

Free Wi-Fi is typically offered on a(n) __________ network.

worm A ___________ spreads from one machine to another, rapidly, without human action....


Similar Free PDFs