| A | B |
| Apps, websites, or third parties collecting information about your online activity are called | online tracking |
| Doing this to an item online helps a company gain information about you | liking |
| Websites or apps selling you something based on information they have collected about you is called what? | targeted advertising |
| Small text files stored on a computer that keep track of what a person does on a website | cookies |
| are dangerous because of the amount of private information they store | smart devices |
| Use this tool in email when you need them to see the email conversation but expect just the original recipient to respond | CC |
| BCC stands for | blind carbon copy |
| Use to respond to an email that you need all email recipients on the original email to see | reply all |
| you must always use this in an email | a subject |
| subject line of your email should contain | a brief description of the contents |
| the folder an email you started writing, but did not finish, will automatically save to | drafts |
| section on a resume clearly describes the position/job one would like to attain | objectives |
| technical and job specific skills | hard skills |
| a resume should be this length | 1 page |
| things you are good at that are specifically related to the job you are applying for should be listed in this seciton of your resume | skills |
| community service, school events, babysitting are all examples of | what to put under the work experience section if you have never had a paying job |
| Personal information such as height, weight, salary history and birthdate should never be listed on this document | your resume |
| Effective communication and problem solving are examples of this type of skill | soft skills |
| this could happen to your house if you post that you are on vacation on your social media | burgalry |
| One good method to protect yourself when using security questions is | to lie in your answers |
| having control over who knows information about you, what information they know and when they can know it | privacy |
| The real privacy problems occuring on Social medis come from | applications |
| This type of Instagram account means that only your followers can view your account | private |
| it is legal in most states for employers to ask this of you in the interview process | social media passwords |
| contains, 8 characters, upper and lower case letters, and special symbols | secure password |
| The marketing of goods or services by means of telephone calls, typically unsolicited, to potential customers | telemarketing |
| Using a local area code that does not really belong to the phone number to get you to answer the call is a common telemarketing trick | spoofing |
| You should change your password after this | a security breach |
| all of your accounts should always have a different | password |
| A program that allows a person to view other peoples' wireless traffic is used to do which of the following | wireless sniffing |
| Best method to avoid malware if it pops up on your computer | exit browser |
| Malware that keeps track of everything a person types on their computer and then sends the malware installer the information | key-logger |
| Cyber bullying can lead to suspension/expulsion even if the act takes place | outside of school |
| The effect of acting differently online than you would act in person | online disinhibition |
| situations without an easy answer | thonry situations |
| he act of purposefully harming, embarassing, or making fun of someone online | cyberbullying |