A | B |
Apps, websites, or third parties collecting information about your online activity are called | online tracking |
Doing this to an item online helps a company gain information about you | liking |
Websites or apps selling you something based on information they have collected about you is called what? | targeted advertising |
Small text files stored on a computer that keep track of what a person does on a website | cookies |
are dangerous because of the amount of private information they store | smart devices |
Use this tool in email when you need them to see the email conversation but expect just the original recipient to respond | CC |
BCC stands for | blind carbon copy |
Use to respond to an email that you need all email recipients on the original email to see | reply all |
you must always use this in an email | a subject |
subject line of your email should contain | a brief description of the contents |
the folder an email you started writing, but did not finish, will automatically save to | drafts |
section on a resume clearly describes the position/job one would like to attain | objectives |
technical and job specific skills | hard skills |
a resume should be this length | 1 page |
things you are good at that are specifically related to the job you are applying for should be listed in this seciton of your resume | skills |
community service, school events, babysitting are all examples of | what to put under the work experience section if you have never had a paying job |
Personal information such as height, weight, salary history and birthdate should never be listed on this document | your resume |
Effective communication and problem solving are examples of this type of skill | soft skills |
this could happen to your house if you post that you are on vacation on your social media | burgalry |
One good method to protect yourself when using security questions is | to lie in your answers |
having control over who knows information about you, what information they know and when they can know it | privacy |
The real privacy problems occuring on Social medis come from | applications |
This type of Instagram account means that only your followers can view your account | private |
it is legal in most states for employers to ask this of you in the interview process | social media passwords |
contains, 8 characters, upper and lower case letters, and special symbols | secure password |
The marketing of goods or services by means of telephone calls, typically unsolicited, to potential customers | telemarketing |
Using a local area code that does not really belong to the phone number to get you to answer the call is a common telemarketing trick | spoofing |
You should change your password after this | a security breach |
all of your accounts should always have a different | password |
A program that allows a person to view other peoples' wireless traffic is used to do which of the following | wireless sniffing |
Best method to avoid malware if it pops up on your computer | exit browser |
Malware that keeps track of everything a person types on their computer and then sends the malware installer the information | key-logger |
Cyber bullying can lead to suspension/expulsion even if the act takes place | outside of school |
The effect of acting differently online than you would act in person | online disinhibition |
situations without an easy answer | thonry situations |
he act of purposefully harming, embarassing, or making fun of someone online | cyberbullying |