Chapter 10 Digital Citizenship
Copyright Goodheart-Willcox Co., Inc.
11. Program that monitors information coming in
to a computer
12. Exchange of information through electronic
13. Using remote servers to store and access
data over the Internet rather than on a
personal computer or local server
14. Illegal act that involves stealing someone’s
personal information and using it to commit
theft or fraud
15. Speaking a false statement about someone
that causes others to have a bad opinion of
him or her
16. Bits of data stored on your computer that record information about the
websites you have visited
17. Any use of copyrighted material without permission
18. Applies to software that has had its code made available to the public
at no charge
19. Data record of all of someone’s online activities
20. Something that comes from a person’s mind
Apply Your Knowledge
1. Create a list of acceptable behaviors that are considered to be good
examples of netiquette. Next to each, explain why these behaviors are
necessary in a digital society.
2. Select a topic related to digital citizenship, such as social media use
or identity theft. Prepare a presentation to illustrate the implications
of your topic on individuals, society, and businesses. Give your
presentation to the class.
3. Create a slideshow that answers the following questions. What is your
opinion of a friend photocopying a textbook chapter instead of buying the
textbook? Do you think that duplicating copyrighted materials is illegal,
6. Describe measures companies put in place to ensure their employees
use the Internet appropriately while at work.
7. How can a digital citizen protect his or her computer from cookies?
8. Describe the most common form of phishing.
9. How does virus protection software help safeguard a computer?
10. Why is it important to back up a computer?
On a separate sheet of paper or in a word processing document, match
each of the following terms with the definition that fits best.
A . cloud computing
B . cookies
C . digital
D . digital footprint
E . firewall
F . identity theft
G . infringement
H . intellectual
I . open source
J . slander
Previous Page Next Page