Digital Citizenship and Online Privacy
45 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a recommended practice to protect your privacy online?

  • Avoid using ad blockers.
  • Use throwaway email addresses for accounts and mailing lists. (correct)
  • Always share your personal information online.
  • Register with your primary email address.

It is encouraged to keep your phone away 30 minutes before bedtime.

True (A)

What is digital citizenship?

An acceptance and upholding of the norms of appropriate, responsible behaviour with regard to the use of digital technologies.

Using ad blockers helps reduce the quantity of ____ you view online.

<p>adverts</p> Signup and view all the answers

Match the concepts with their descriptions:

<p>Digital Hygiene = Practices to protect personal information online Social Media Hygiene = Strategies to limit social media usage Identity Fraud = Theft of personal data for illegal purposes Desocialization = A decline in social skills and relationships</p> Signup and view all the answers

What is the primary purpose of internet bots?

<p>To perform automated tasks (D)</p> Signup and view all the answers

All bots on the internet are harmful.

<p>False (B)</p> Signup and view all the answers

What type of technology is used to create deepfake videos?

<p>Artificial intelligence</p> Signup and view all the answers

Malicious social media bots can influence __________ and manipulate financial markets.

<p>elections</p> Signup and view all the answers

Match the types of bots with their functions:

<p>Chatbots = Mimic human conversation Web Crawlers = Index web content Social Bots = Engage with users on social media Malicious Bots = Disrupt or manipulate online activities</p> Signup and view all the answers

Which action is recommended to combat bots on social media?

<p>Avoid spreading false information (C)</p> Signup and view all the answers

Deepfake technology was first introduced in 2017.

<p>True (A)</p> Signup and view all the answers

What is an example of 'false connection' in news?

<p>A sensational headline that misrepresents the actual story. (A)</p> Signup and view all the answers

What can malicious social media bots amplify?

<p>Phishing attacks</p> Signup and view all the answers

Imposter content refers to genuine content that has been reframed in dangerous ways.

<p>False (B)</p> Signup and view all the answers

What is manipulated content?

<p>Content that has had an aspect altered, typically photos or videos.</p> Signup and view all the answers

Fabricated content is considered ________ percent false.

<p>100</p> Signup and view all the answers

Which of the following describes false context?

<p>Real content shown in a misleading way. (A)</p> Signup and view all the answers

Clickbait is a method used to provide news that adds value.

<p>False (B)</p> Signup and view all the answers

What role do heuristics play in information credibility?

<p>Heuristics are mental shortcuts that help assess the credibility of information.</p> Signup and view all the answers

Match the types of information disorder with their definitions:

<p>False connection = Sensational headlines that mislead Imposter content = Misleading use of known logos Manipulated content = Altered genuine content Fabricated content = Completely false information</p> Signup and view all the answers

Which of the following is NOT one of the criteria in the CRAAP Test?

<p>Quality (A)</p> Signup and view all the answers

A primary source is generally considered to have less credibility than a secondary source.

<p>False (B)</p> Signup and view all the answers

What should you consider when checking the currency of a source?

<p>The age of the source and its relevance to the topic.</p> Signup and view all the answers

The reliability of information sources can be assessed using the _____ Test.

<p>CRAAP</p> Signup and view all the answers

Match the criteria of the CRAAP test with their definitions:

<p>Currency = The timeliness of the information Relevance = The relevance of the information to your needs Authority = The source of the information Accuracy = The correctness of the information Purpose = The objective of the information provided</p> Signup and view all the answers

Why might older sources still be considered valuable?

<p>They may contain foundational works that are still relevant. (B)</p> Signup and view all the answers

It's important to place quotes in proper context to ensure accuracy in interpretation.

<p>True (A)</p> Signup and view all the answers

What is one reason to examine more recent sources?

<p>To determine if data has changed.</p> Signup and view all the answers

What can be a common characteristic of entertaining sources?

<p>Use of hyperbole (B)</p> Signup and view all the answers

Phishing scams are harmless and often do not compromise online security.

<p>False (B)</p> Signup and view all the answers

What is one effective way to manage your digital footprint?

<p>Limit the information you post on social networking sites.</p> Signup and view all the answers

It is recommended to never share your ______.

<p>passwords</p> Signup and view all the answers

Which of the following is NOT one of the 9 elements of digital citizenship?

<p>Digital Identity (B)</p> Signup and view all the answers

Match the social media etiquette with its description:

<p>Be ethical = Respecting others' opinions Share with care = Being mindful of the information shared Respect others' privacy = Keeping personal data private Keep disagreements healthy = Managing conflicts respectfully</p> Signup and view all the answers

The Cybercrime Prevention Act of 2012 is also known as Republic Act 10173.

<p>False (B)</p> Signup and view all the answers

Which of the following is a recommended digital hygiene procedure?

<p>Review privacy settings on networking sites (B)</p> Signup and view all the answers

What should you always use to enhance your online security?

<p>A strong password</p> Signup and view all the answers

Ransomware is a type of malicious software that encrypts your files and demands payment to access them.

<p>True (A)</p> Signup and view all the answers

Using public computers should be done very ______.

<p>carefully</p> Signup and view all the answers

The ______ Act of 2015 establishes the Department of Information and Communications Technology.

<p>Republic Act 10844</p> Signup and view all the answers

Match the Republic Acts with their purpose:

<p>Republic Act 10173 = Data Privacy Act Republic Act 10175 = Cybercrime Prevention Republic Act 11293 = Philippine Innovation Act Republic Act 11313 = Safe Spaces Act</p> Signup and view all the answers

Which element emphasizes the importance of being respectful and responsible while communicating online?

<p>Digital Etiquette (D)</p> Signup and view all the answers

Oversharing personal information online can increase the risk of identity theft.

<p>True (A)</p> Signup and view all the answers

Identify one question to ask yourself before sharing a post on social media.

<p>Is the post TRUE or a rumor?</p> Signup and view all the answers

Flashcards

False Connection

Headlines use sensational language to attract clicks, but the content doesn't match the hype. It's like pollution because it clogs up the internet with irrelevant content.

Misleading Content

Presenting information in a way that distorts the truth. It can involve altering headlines, using selective quotes, or manipulating statistics.

False Context

Genuine content presented in a harmful, misleading way to change its meaning. It can involve taking something out of context or altering its original purpose.

Imposter Content

False or misleading information that uses well-known logos, established figures, or journalists to appear genuine.

Signup and view all the flashcards

Manipulated Content

Genuine content that has been altered, often photos or videos. It can involve changing details, adding elements, or removing parts.

Signup and view all the flashcards

Fabricated Content

Content that is entirely false and made up. It has no basis in reality.

Signup and view all the flashcards

Satire

A humorous way to criticize something or someone by using exaggeration and irony. It's often used to highlight societal problems.

Signup and view all the flashcards

Parody

A humorous imitation of another work, often done to poke fun at the original. It often uses exaggeration and satire to make a point.

Signup and view all the flashcards

What is a Bot?

A software application that performs automated tasks by running scripts over the internet. Bots are often used to perform simple, repetitive tasks that would be time-consuming for humans.

Signup and view all the flashcards

Types of Bots

Bots can be categorized into different types based on their purpose and functionality. Common types include chatbots, web crawlers, social bots, and malicious bots.

Signup and view all the flashcards

Role of Bots in Social Media

Social media bots can be used for various purposes, including amplifying popularity, influencing elections, manipulating markets, spreading spam, and shutting down free speech.

Signup and view all the flashcards

How to Spot a Bot on Social Media

Identifying a bot on social media often involves analyzing the profile information, content quality, activity patterns, and network connections.

Signup and view all the flashcards

Combating Bots on Social Media

Protecting yourself from bots on social media involves measures like limiting oversharing, safeguarding personal details, and avoiding spreading misinformation.

Signup and view all the flashcards

What is Deepfake Technology?

Deepfake technology uses artificial intelligence to create realistic, manipulated videos or audio that imitate real people. This technology can be used for entertainment, but also for malicious purposes like creating disinformation.

Signup and view all the flashcards

Deepfake Audio

Deepfake audio is synthetic audio that mimics the voice of a real person. This technology is constantly advancing and can be used for various purposes, including creating convincing imitations.

Signup and view all the flashcards

Steps in Creating Deepfakes

Creating a deepfake involves a series of steps, including gathering data, training an AI model, and synthesizing the fake content. The creation process is complex and requires advanced technical knowledge.

Signup and view all the flashcards

Digital Hygiene

Practices to protect your privacy and online safety, such as using strong passwords, updating software regularly, and limiting your digital footprint.

Signup and view all the flashcards

Throwaway Email

A temporary email address used for online registration or subscriptions to avoid spam and reduce tracking.

Signup and view all the flashcards

Ad Blocker

Software that blocks online advertisements, reducing tracking and improving browsing speed.

Signup and view all the flashcards

Digital Detox

A period of time away from digital devices to improve mental well-being and reduce screen time.

Signup and view all the flashcards

Digital Citizenship

Responsible and ethical online behavior, including respecting others, protecting your privacy, and using technology for good.

Signup and view all the flashcards

Digital Footprint

The trail of data you leave online, including your posts, comments, likes, and searches. It can reveal information about your interests, beliefs, and activities.

Signup and view all the flashcards

Privacy Settings

Controls on social media platforms that let you choose what information you share and who can see it.. They can help limit what others see and protect your personal data.

Signup and view all the flashcards

Social Media Etiquette

A set of guidelines for respectful and appropriate behavior on social media. It includes being kind, considerate, and responsible in interactions.

Signup and view all the flashcards

Disinformation

False or misleading information that is deliberately spread to deceive people. It can be used to manipulate public opinion, spread propaganda, or harm individuals.

Signup and view all the flashcards

Staying Safe Online

Taking precautions to protect your privacy, security, and well-being online. This includes using strong passwords, being cautious about sharing personal information, and being aware of potential scams.

Signup and view all the flashcards

Cyber Hygiene

Good practices that help protect you online. They include using strong passwords, updating software regularly, and being aware of phishing scams.

Signup and view all the flashcards

Bot/Spam Detection

Identifying and filtering out automated accounts (bots) or unwanted messages (spam) to improve the quality of online interactions.

Signup and view all the flashcards

Information Disorder

The problem of misinformation, disinformation, and mal-information spreading widely online. These are difficult to identify and can cause harm.

Signup and view all the flashcards

Digital Law

A collection of laws and regulations that govern online behavior and activities. It covers areas like data privacy, cybersecurity, and intellectual property.

Signup and view all the flashcards

Data Privacy Act of 2012 (RA 10173)

A Philippine law that protects personal information and data from unauthorized processing and disclosure. It ensures individuals have control over their data.

Signup and view all the flashcards

Cybercrime Prevention Act of 2012 (RA 10175)

A Philippine law that aims to combat cybercrime by addressing offenses like hacking, identity theft, and online child abuse.

Signup and view all the flashcards

eCommerce Act of 2000 (RA 8792)

A Philippine law that governs electronic commerce, including online transactions, contracts, and digital signatures.

Signup and view all the flashcards

Philippine Innovation Act (RA 11293)

A Philippine law designed to promote innovation and technology by creating a conducive environment for research, development, and commercialization.

Signup and view all the flashcards

Department of Information and Communications Technology Act of 2015 (RA 10844)

A Philippine law that establishes the Department of Information and Communications Technology (DICT) as the primary government agency responsible for overseeing the development and regulation of ICT in the country.

Signup and view all the flashcards

Safe Spaces Act of 2018 (RA 11313)

A Philippine law that prohibits acts of sexual harassment in public spaces, workplaces, and educational institutions, including online spaces.

Signup and view all the flashcards

Digital Rights and Responsibilities

The fundamental rights and obligations that individuals have in the digital world. This includes the right to privacy, freedom of expression, and access to information, alongside responsibilities to be ethical, respectful, and responsible online.

Signup and view all the flashcards

Study Notes

Social Media

  • Social media are computer programs and websites that allow people to share and communicate online using phones or computers.
  • It's a form of electronic communication, used for social networking and microblogging.
  • Social media is about building relationships, community, interacting with audiences, and holding conversations.
  • Integrity, openness, and authenticity are crucial aspects.
  • Responding to comments and listening to feedback on social media is important.
  • Being interesting, relevant, credible, and captivating is key.

Common Types of Social Media

  • Social networking sites: Examples: Facebook, LinkedIn, Instagram, Twitter, TikTok, Snapchat
  • Photo and image-sharing sites: Examples: Instagram, Snapchat, Pinterest, Imgur
  • Video sharing sites: Examples: YouTube, TikTok, Vimeo
  • Audio sharing sites: Examples: Clubhouse, Twitter Spaces, Facebook Live Audio Rooms
  • Live streaming apps: Examples: YouTube Live, Facebook Live, Twitch, UStream
  • Social messaging apps: Examples: Facebook Messenger, Twitter DMs, Google Business Messenger, WhatsApp, WeChat
  • Disappearing content apps: Examples: Snapchat, Instagram Stories, Facebook Stories
  • Social shopping networks: Examples: Facebook for Business, Shopify x TikTok, Instagram Shop, Pinterest Shoppable Pins
  • Interactive social media apps: Examples: Instagram Stories, Snapchat, TikTok, Tumblr, Weibo
  • Discussion forums: Examples: Reddit, Quora, Stack Overflow
  • Microblogging platforms: Examples: Twitter, Tumblr, Pinterest, LinkedIn
  • Community blogging sites: Examples: Medium, Growth Hackers, BlogEngage, DoSplash
  • Social review sites: Examples: Google Business Profile, Amazon, Yelp, Facebook
  • Social curation and bookmarking sites: Examples: Pocket, Digg, Pinterest, Mix

Benefits of Social Media among Students

  • Communication and collaboration
  • Access to information
  • Networking
  • Personal branding
  • Entertainment, inspiration, and creative expression
  • Experience global exposure
  • Employment opportunities
  • Social media marketing

Risks of Social Media

  • Inadequacy about your life or appearance
  • Fear of missing out (FOMO) and social media addiction
  • Isolation
  • Depression and anxiety
  • Cyberbullying
  • Self-absorption

Other Causes of Unhealthy Social Media Use

  • Social media use as a "security blanket"
  • Heavy social media use masking underlying problems like stress, depression, or boredom

Other Indicators of Social Media Impacting Mental Health

  • Spending more time on social media than with real-world friends
  • Comparing yourself unfavorably with others on social media
  • Experiencing cyberbullying
  • Being distracted at school or work
  • Having no time for self-reflection
  • Engaging in risky behavior to gain likes, shares, or positive reactions
  • Suffering from sleep problems
  • Worsening symptoms of anxiety or depression

Information Disorder

  • Information disorder is a term for understanding phenomena in the information universe.
  • It's divided into three categories: misinformation, disinformation, and malinformation.
  • Information disorder syndrome involves sharing or developing false information, with or without the intent to harm.
  • Misinformation is unintentional mistakes, like inaccurate captions, dates, statistics, or when satire is taken seriously.
  • Disinformation is fabricated or manipulated content, often including conspiracy theories or rumors.
  • Malinformation is deliberate publication of private information for personal or corporate rather than public interest purposes, often involving changing context, date, or time of genuine content.

Types of Mis- & Disinformation

  • Satire or parody: No intention to harm, but can deceive.
  • False connection: Misleading headlines or visuals that don't match the story.
  • Misleading content: Manipulation of headlines, quotes, or statistics to support a specific view.
  • False context: Genuine content is shared in a misleading or harmful context.
  • Imposter content: Impersonation of legitimate sources.
  • Manipulated content: Altering genuine photos or videos.
  • Fabricated content: Content is 100% false, made to deceive or harm.

Causes of Information Disorder

  • Digital technologies
  • Lack of media literacy
  • Confirmation bias
  • Partisan politics
  • Financial incentives
  • Foreign interference
  • Increasing polarization
  • Amplification of conspiracy theories
  • Misinformation and disinformation during crises
  • Use of deep fakes and other manipulated media
  • Influence operations by foreign entities

Influences of Information Disorder

  • Public health
  • Political processes
  • Social cohesion
  • Economic impacts
  • National security
  • Individual behavior

Preventing Information Disorder

  • Develop media literacy skills
  • Fact-checking and verification
  • Promote digital literacy and responsible social media use
  • Encourage transparency and accountability
  • Combat foreign interference
  • Better technology solutions

Community-Level Fake Account Operators

  • Follow a script to spread disinformation through written or visual content on social media.
  • Post a set number of comments or posts daily on various sites, including Facebook, to maintain activity.
  • Initiate bandwagon effects by spreading positive messages about a subject to promote wide support.

Trolls and Deep Fake Technology

  • Trolls are intentionally disruptive in online communities.
  • Deepfakes are AI-created videos that mimic real people.

Anonymity

  • Online anonymity allows for easier trolling due to the illusion of no accountability.

Tribalism

  • Humans are social creatures and have a desire to belong to groups, which can be used to spread disinformation.

Individual Factors Contributing to Trolling

  • Personality
  • Ideologically possessed beliefs
  • Conditioning

How to Combat Trolls

  • Don't feed the trolls
  • Be supportive against trolls by keeping up morale
  • Add moderators
  • Challenge with facts and sources
  • Kill them with kindness
  • Disarm with humor
  • Have Friend-Only Social Profiles
  • Block, ban, or report trolls
  • Decompress before you reply
  • Stay professional

What is a Bot?

  • An internet bot is software that runs automated tasks online.
  • Bots can be benign or malicious, with malicious bots potentially performing harmful actions.

Types of Bots

  • Chatbots
  • Web crawlers
  • Social bots
  • Malicious bots

Role of Bots in Social Media

  • Amplify popularity
  • Influence elections
  • Manipulate markets
  • Amplify phishing attacks
  • Spread spam
  • Shutdown free speech

Tips for Spotting Bots on Social Media

  • Profile information
  • Activity
  • Network
  • Content quality

How to Combat Bots on Social Media

  • Don't overshare
  • Don't divulge non-essential personal information
  • Avoid spreading false information

Deep Fake Technology

  • Deepfakes are AI-generated videos that can perfectly mimic people.
  • The technology is still improving and making detection more difficult.

Deepfake Photo

  • Key indicators of deepfakes in photos include image quality, facial expressions, and any signs of photoshopping.

Deepfake Video

  • Spotting deepfake videos can be challenging, as poorly made deepfakes are noticeable, while high-quality ones are more difficult to identify.

How to Spot a Deepfake Video

  • Unnatural eye movements
  • Unnatural facial expressions
  • Awkward facial-feature positioning
  • Lack of emotion
  • Awkward-looking body posture
  • Unnatural body movement or body shape
  • Unnatural coloring
  • Hair that doesn't look real
  • Teeth that don't look real
  • Blurring or misalignment
  • \ Inconsistent noise or audio.
  • Images that look unnatural when slowed down.
  • Hashtag discrepancies
  • Digital fingerprints
  • Reverse image searches
  • Video glitches and flickers

Combating Deepfakes

  • Social media rules
  • Verification programs
  • Research lab technologies
  • Deepfake Detection Challenge
  • Emerging detection programs
  • Filtering programs
  • Corporate best practices
  • U.S. Defense Advanced Research Projects Agency
  • U.S. legislation

Fact-Checking on Social Media

  • Fact-checking is crucial.
  • Mechanistic approach is needed to identify accurate information online to verify claims.

The CRAAP Test

  • A test to confirm the accuracy and credibility of information sources using criteria like currency, relevance, authority, accuracy, and purpose.

On Currency

  • Check the age of the source.
  • Use most recent sources if the information is time-sensitive.
  • For evergreen topics, older resources can still be valuable even if outdated.

On Relevance

  • Context matters.
  • Verify if material is placed in the correct context.
  • Consider target audience.

On Authority

  • Verify the author's expertise and credentials.
  • Identify and investigate the source's publisher.
  • Investigate gatekeepers such as editors and peer reviewers.
  • Look for verifiable images that show first hand knowledge.

On Accuracy

  • Verify the references and sources.
  • Evaluate the data, looking at supporting information, such as statistics and first-person accounts.
  • Evaluate the potential bias in writing.
  • Review the source, seeking multiple viewpoints.

On Purpose

  • Evaluate the author's intent and reason for creating the information.
  • Check for potential bias.
  • Evaluate if the information is only promoting an agenda.
  • Evaluate commercial intent.
  • Evaluate and check for any entertainment intent.

Tools & Platforms to Combat Information Disorder

  • FactCheck.org
  • PolitiFact
  • Snopes
  • Duke Reporters' Lab
  • Media Bias/Fact Check

Bot/Spam Detection Tools

  • Bot Sentinel
  • Botometer

Codes & Standards

  • Credibility Coalition
  • ProTruth Pledge
  • Journalism Trust Initiative (JTI)
  • The Trust Project
  • Global Disinformation Index (GDI)
  • Public Editor
  • ClaimReview
  • Know News

Disinformation Tracking Tools

  • Ad Observer
  • TwitterTrails
  • Iffy Quotient
  • Hamilton 2.0 Dashboard

Education/Training Resources

  • Project Look Sharp
  • Bad News
  • Digital Resource Center
  • Civic Online Reasoning (CORE)
  • IREX
  • PolitiTruth
  • Newseum
  • Coursera
  • Mozilla Project
  • Truth Goggles
  • Checkology
  • Google Interland
  • Ruff Ruffman
  • First Draft

Multimedia Platforms & Tools

  • NewsGuard
  • Google News Initiative

Whitelisting Methods

  • ABP Addblock Plus
  • Whitelist Manager
  • Website Whitelist
  • Domain whitelist

Mobile Applications

  • The Factual
  • FactMata
  • First Draft

Staying Safe Online

  • Keep security systems updated.
  • Check bank statements frequently.
  • Only shop on secure websites.
  • Back up everything.
  • Get informed about ransomware.
  • Improve your passwords.
  • Never share passwords.
  • Keep your passwords safe.
  • Learn how to respond to a data breach.
  • Use public computers cautiously.
  • Avoid phishing scams.
  • Protect your devices

Social Media Etiquettes

  • Remember the Human.
  • Be ethical.
  • Know where you are.
  • Respect other people's time and data limits.
  • Make yourself look good online.
  • Share expert knowledge
  • Keep disagreements healthy
  • Respect other people's privacy

Digital Hygiene in Social Media

  • Essential for protecting information and online security.

Digital Footprints

  • Online presence leaves traces.
  • Footprints can be helpful or harmful to a digital reputation.
  • Be mindful that digital footprints can stay forever.

Digital Hygiene Procedures

  • Limit the information shared on social networking sites.
  • Review privacy settings on major social media accounts (Facebook, Twitter, LinkedIn, etc.).
  • Disable ad ID tracking on mobile devices.
  • Use throwaway email addresses.
  • Reduce the amount of advertisements seen online.
  • Limit the use of digital gadgets.

Social Media Hygiene Strategies

  • Put away electronic devices before bed.
  • Put away electronic devices while meeting with people in person.
  • Set limits on social media use.

ICT Social & Ethical Issues - Privacy

  • Smart technology at home and pervasive monitoring.
  • Privacy enhancing versus losing control of sensitive information.

ICT Social & Ethical Issues - Autonomy

  • Man out-of-the-loop
  • Filtering versus freedom of expression

ICT Social & Ethical Issues - Safety

  • Identity fraud
  • Psychological damage in virtual worlds

ICT Social & Ethical Issues - Human Dignity

  • Unlearning moral skills
  • Social alienation and desocialization

ICT Social & Ethical Issues - Other Issues

  • Computer crime
  • Copyright infringement
  • Digital divide
  • Etiquette
  • Fair use (of content)
  • Information rights
  • Plagiarism
  • Privacy in the digital realm
  • Software license
  • Software privacy

Digital Citizenship

  • Acceptance and upholding of norms for appropriate digital behavior
  • Digital etiquette, literacy, ethics, understanding of related laws, how to stay safe online, safety issues, and permanence of data.

Elements of Digital Citizenship

  • Digital Access
  • Digital Commerce
  • Digital Communications
  • Digital Literacy
  • Digital Etiquette
  • Digital Law
  • Digital Rights and Responsibilities
  • Digital Health and Wellness
  • Digital Security

Digital Law

  • Republic Act 10173 (Data Privacy Act of 2012)
  • Republic Act 10175 (Cybercrime Prevention Act of 2012)
  • Republic Act 8792 (eCommerce Act of 2000)
  • Republic Act 11293 (Philippine Innovation Act)
  • Republic Act 10844 (Department of Information and Communications Technology Act of 2015)
  • Republic Act 11313 (Safe Spaces Act of 2018)

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the essential concepts of digital citizenship and best practices for online privacy in this quiz. Test your knowledge on internet bots, deepfake technology, and how to recognize malicious content online. Enhance your understanding of protecting yourself in the digital age.

More Like This

Digital Citizenship Quiz
30 questions

Digital Citizenship Quiz

BeneficentHonor6192 avatar
BeneficentHonor6192
Ciudadanía Digital y Responsabilidades
16 questions
Online Safety and Digital Citizenship
8 questions
Use Quizgecko on...
Browser
Browser