Questions and CORRECT Answers
Information Technology (IT) - CORRECT ANSWER✔✔- The study or use of systems for
storing, retrieving, and sending information
Cybercrime - CORRECT ANSWER✔✔- A criminal act committed primarily through the use
of a computer system
Phishing - CORRECT ANSWER✔✔- Sending emails to lure people into revealing their
personal information or to take an action
Hacking - CORRECT ANSWER✔✔- unauthorized access, modification, or use of an
electronic device or some element of a computer system
Social Networking - CORRECT ANSWER✔✔- process by which we make connections
with others
social media - CORRECT ANSWER✔✔- online tools and sites that allow netoworking
Cloud Storage - CORRECT ANSWER✔✔- allows you to save files in storage and then
access them on the Cloud
Cloud Computing - CORRECT ANSWER✔✔- is a type of Internet-based computing that
provides shared computer processing resources and data to computers and other devices on
demand
intellectual property - CORRECT ANSWER✔✔- an idea, invention, or process that derives
from the work of the mind or intellect
copyright - CORRECT ANSWER✔✔- protection given to the creator of songs, computer
programs, books, and other creative works
, copyright infringement - CORRECT ANSWER✔✔- When a copyrighted work is
reproduced, distributed, performed, or publicly displayed work without the permission of
copyright owner
patent - CORRECT ANSWER✔✔- creates protection for someone who invents a new
product or process
Trademark - CORRECT ANSWER✔✔- a word, phrase, logo, shape or sound that identifies
a source of goods or services that must be protected by an organization
Digital Rights Management - CORRECT ANSWER✔✔- a strategy designed to prevent
illegal distribution of movies, music, and other digital content
public domain - CORRECT ANSWER✔✔- A work of authorship that is not under copyright
protection and can be used freely without permission
plagarism - CORRECT ANSWER✔✔- taking someones ideas or writing and offering them
as your own
digital divide - CORRECT ANSWER✔✔- The gap between those who have access to the
Internet and technology and those who do not
mobile commerce - CORRECT ANSWER✔✔- The process of buying, selling, or
exchanging products, services, or information via phone
E-commerce (electronic commerce) - CORRECT ANSWER✔✔- The process of buying,
selling, or exchanging products, services, or information via internet
black hat hackers - CORRECT ANSWER✔✔- A hacker that breaks into a system for
malicious reasons
white hat hackers - CORRECT ANSWER✔✔- A person who hacks into a system for non-
malicious purposes