| A | B |
| Free Wi-Fi is typically offered on a(n) __________ network. | unencrypted |
| A digital footprint is all of the information on-line about a person posted by that person or others, _______________. | intentionally or unintentionally |
| What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name? | Financial |
| Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________. | forever |
| How are digital assets and digital footprints related? | Digital assets create digital footprints |
| ulia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do? | Delete the email |
| Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an attachment. What should Ryan do? | Ask Mike if he sent the email |
| Is "Ih@%eC@ts!" a strong password? | True |
| Type of theft that occurs when someone wrongfully obtains and uses another person's personal data, typically for economic gain. | Identity Theft |
| What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or reap other benefits? | Governemental |
| Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment. | true |
| Malware is software that has _______________. | malicious intent |
| A digital native is a person who has been exposed to technology at a(n) ____________________ and is comfortable using it. | young age |
| Plagiarism is using your words or ideas and presenting them as your own. | False |