Java Games: Flashcards, matching, concentration, and word search.

Living Online Textbook, Unit 2: Using the Internet, Lesson 8: Using the Internet Responsibly (pages 169-177)

In this lesson you will look at considerations for working on the Internet in a legal and safe manner.

AB
There is no quality control of the information on the Internet, so therefore we may need to restrict access to specific information.True
Firewall softwareControls access to company resources from the outside and employee access to Internet resources
Internet filter softwareBlocks access based on keywords entered
Internet filter software cannot be set up on computers to prevent access to questionable sites.False
CopyrightRefers to the protection of any material, published or unpublished, created by an individual.
The same copyright rules apply to Internet as any other media.True
Copyright rules do not extend to book material, music, video, essays, white papers, pictures, software programs, Web sites, etc.False
You can only use material if the creator grants you rights to use it.True
TrademarksItem registered by organization with intent to distinguish it from competitors
Copyright laws do not apply to trademarks.False
Copyright implicitly belongs to owner of Web site or published material, even if no © symbol or text appears on product.True
To use information, send an e-mail to the Web site owner asking for permission.True
LibelWhen an untrue statement is made in public that defames another person’s character or reputation.
For a statement to be considered libel it must be in print.False
Ethically, libel is wrong under any circumstancesTrue
When using information created by someone and presenting it as your ownPlagiarism
Stealing intellectual propertyPlagiarism
This occurs when you use online information, not in it's original formPlagiarism
Sending questionable or controversial informationCriminal Activity
Pretending to be someone else while onlineCriminal Activity
Exchanging controversial materialCriminal Activity
Hosting sites that incite hatred of any kind illegal in most countriesCriminal Activity
Hacking into another computer with intent to destroy or cripple company’s businessCriminal Activity
Creating viruses and sending to people so computers or information destroyed or disruptedCriminal Activity
Unethical BehaviorActions not directly illegal but considered wrong.
Always keep the golden rule of Netiquette (and real life) in mind:Do unto others as you would have them do unto you!
Who owns any original work you do on the school's computer?In general, anything you do during school time on the school's computer belongs to the school.
If not aware of rules and guidelines:Always ask someone who may have the answer or direct to where you might find information.
You are responsible to ensure you are not violating rules in any wayTrue
Never give credit card information indiscriminatelyBuying Online Rule
Be sure Web site is valid company with good reputationBuying Online Rule
If deal seems too good to be true, research that dealBuying Online Rule
Always research and check validity of charity or causeBuying Online Rule
Do not share login ids or passwords with anyoneBuying Online Rule
Do not share information with anyone onlineBuying Online Rule
Switch between login id’s and passwords for different sitesBuying Online Rule
For sites where you purchase frequently, occasionally change profile information and passwordBuying Online Rule
Look for privacy statement or policy and read it firstWays to protect your privacy
Don’t fill in any forms unless you really want somethingWays to protect your privacy
Set up browser to limit types of information that can be trackedWays to protect your privacy
Delete cookies from system if receive lots of junk mailWays to protect your privacy
Delete history for those sites you visitedWays to protect your privacy
Have separate e-mail address for non-personal items, or use aliasWays to protect your privacy
Purchase third party software to address privacy issuesWays to protect your privacy
Never update anti-virus or other protection softwareFalse
Operating system updates enhance how computer works and may prevent security breachesTrue
Dispose in environmentally friendly mannerA way of disposing of consumables
Donate old working computers to charitable organization.A way of disposing of consumables
Refill or recycle ink cartridgesA way of disposing of consumables
An advantage of using Internet is ability to find information shared by others.True
Volunteering to teach technology courses.A way of sharing your computer knowledge.
Working with charitable organizations for data entry or technical supportA way of sharing your computer knowledge.
Teaching or supporting family and friendsA way of sharing your computer knowledge.


Business and Information Technology, Marketing Education Teacher
Hermitage High School
VA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities