Podcast
Questions and Answers
_______ is bullying that takes place over digital devices like computers and tablets and can also occur through SMS.
_______ is bullying that takes place over digital devices like computers and tablets and can also occur through SMS.
Cyberbullying
_______ refers to any severe or repeated uses by one or more students of a written, verbal, or electronic expression.
_______ refers to any severe or repeated uses by one or more students of a written, verbal, or electronic expression.
Bullying
_______ is the ability of an individual or group to seclude themselves or information selectively.
_______ is the ability of an individual or group to seclude themselves or information selectively.
Privacy
_______ is the right to keep sensitive data and information produced as a result of using the web private.
_______ is the right to keep sensitive data and information produced as a result of using the web private.
Signup and view all the answers
_______ includes observation from a distance by means of electronic equipment.
_______ includes observation from a distance by means of electronic equipment.
Signup and view all the answers
_______ is an incident where information is stolen or taken from a system without the knowledge or authorization.
_______ is an incident where information is stolen or taken from a system without the knowledge or authorization.
Signup and view all the answers
Selective Exposure is the tendency to ______ information that is consonant with one's view
Selective Exposure is the tendency to ______ information that is consonant with one's view
Signup and view all the answers
Selective Perception is when individuals ______ perceive information to fit their existing opinion
Selective Perception is when individuals ______ perceive information to fit their existing opinion
Signup and view all the answers
Selective Retention involves simply ______ attitude incongruent information
Selective Retention involves simply ______ attitude incongruent information
Signup and view all the answers
Cyberbullying tactic: Phishing is an email or website that pretends to look exactly like the original for ______ purposes
Cyberbullying tactic: Phishing is an email or website that pretends to look exactly like the original for ______ purposes
Signup and view all the answers
Cyberbullying type: Keyloggers are software that tracks every ______ you type on the keyboard
Cyberbullying type: Keyloggers are software that tracks every ______ you type on the keyboard
Signup and view all the answers
Data Breach type: Ransomware holds your data ______ for money
Data Breach type: Ransomware holds your data ______ for money
Signup and view all the answers
Selective Exposure Theory refers to favoring information that reinforces pre-existing views while avoiding ______ information.
Selective Exposure Theory refers to favoring information that reinforces pre-existing views while avoiding ______ information.
Signup and view all the answers
Civic Engagement means participating in activities intended to improve the quality of life in one's community by addressing issues of public ______.
Civic Engagement means participating in activities intended to improve the quality of life in one's community by addressing issues of public ______.
Signup and view all the answers
LITERA Selective Exposure is the motivated selection of messages matching one's beliefs, which can often affect the decisions people make as individuals because they may be unwilling to change their views and ______.
LITERA Selective Exposure is the motivated selection of messages matching one's beliefs, which can often affect the decisions people make as individuals because they may be unwilling to change their views and ______.
Signup and view all the answers
Political Polarization refers to cases in which an individual's stance on a given issue, policy, or person is more likely to be strictly defined by their identification with a particular political ______.
Political Polarization refers to cases in which an individual's stance on a given issue, policy, or person is more likely to be strictly defined by their identification with a particular political ______.
Signup and view all the answers
Cognitive Dissonance Theory suggests that information consumers strive for results of cognitive ______.
Cognitive Dissonance Theory suggests that information consumers strive for results of cognitive ______.
Signup and view all the answers
Social Capital in Technology is a prominent concept that provides a foundation to describe and characterize ______ properties.
Social Capital in Technology is a prominent concept that provides a foundation to describe and characterize ______ properties.
Signup and view all the answers