| A | B |
| There is no quality control of the information on the Internet, so therefore we may need to restrict access to specific information. | True |
| Firewall software | Controls access to company resources from the outside and employee access to Internet resources |
| Internet filter software | Blocks access based on keywords entered |
| Internet filter software cannot be set up on computers to prevent access to questionable sites. | False |
| Copyright | Refers to the protection of any material, published or unpublished, created by an individual. |
| The same copyright rules apply to Internet as any other media. | True |
| Copyright rules do not extend to book material, music, video, essays, white papers, pictures, software programs, Web sites, etc. | False |
| You can only use material if the creator grants you rights to use it. | True |
| Trademarks | Item registered by organization with intent to distinguish it from competitors |
| Copyright laws do not apply to trademarks. | False |
| Copyright implicitly belongs to owner of Web site or published material, even if no © symbol or text appears on product. | True |
| To use information, send an e-mail to the Web site owner asking for permission. | True |
| Libel | When an untrue statement is made in public that defames another person’s character or reputation. |
| For a statement to be considered libel it must be in print. | False |
| Ethically, libel is wrong under any circumstances | True |
| When using information created by someone and presenting it as your own | Plagiarism |
| Stealing intellectual property | Plagiarism |
| This occurs when you use online information, not in it's original form | Plagiarism |
| Sending questionable or controversial information | Criminal Activity |
| Pretending to be someone else while online | Criminal Activity |
| Exchanging controversial material | Criminal Activity |
| Hosting sites that incite hatred of any kind illegal in most countries | Criminal Activity |
| Hacking into another computer with intent to destroy or cripple company’s business | Criminal Activity |
| Creating viruses and sending to people so computers or information destroyed or disrupted | Criminal Activity |
| Unethical Behavior | Actions not directly illegal but considered wrong. |
| Always keep the golden rule of Netiquette (and real life) in mind: | Do unto others as you would have them do unto you! |
| Who owns any original work you do on the school's computer? | In general, anything you do during school time on the school's computer belongs to the school. |
| If not aware of rules and guidelines: | Always ask someone who may have the answer or direct to where you might find information. |
| You are responsible to ensure you are not violating rules in any way | True |
| Never give credit card information indiscriminately | Buying Online Rule |
| Be sure Web site is valid company with good reputation | Buying Online Rule |
| If deal seems too good to be true, research that deal | Buying Online Rule |
| Always research and check validity of charity or cause | Buying Online Rule |
| Do not share login ids or passwords with anyone | Buying Online Rule |
| Do not share information with anyone online | Buying Online Rule |
| Switch between login id’s and passwords for different sites | Buying Online Rule |
| For sites where you purchase frequently, occasionally change profile information and password | Buying Online Rule |
| Look for privacy statement or policy and read it first | Ways to protect your privacy |
| Don’t fill in any forms unless you really want something | Ways to protect your privacy |
| Set up browser to limit types of information that can be tracked | Ways to protect your privacy |
| Delete cookies from system if receive lots of junk mail | Ways to protect your privacy |
| Delete history for those sites you visited | Ways to protect your privacy |
| Have separate e-mail address for non-personal items, or use alias | Ways to protect your privacy |
| Purchase third party software to address privacy issues | Ways to protect your privacy |
| Never update anti-virus or other protection software | False |
| Operating system updates enhance how computer works and may prevent security breaches | True |
| Dispose in environmentally friendly manner | A way of disposing of consumables |
| Donate old working computers to charitable organization. | A way of disposing of consumables |
| Refill or recycle ink cartridges | A way of disposing of consumables |
| An advantage of using Internet is ability to find information shared by others. | True |
| Volunteering to teach technology courses. | A way of sharing your computer knowledge. |
| Working with charitable organizations for data entry or technical support | A way of sharing your computer knowledge. |
| Teaching or supporting family and friends | A way of sharing your computer knowledge. |