Which of the following statements about digital footprints are true? Select all that apply.

What other people post does not impact your digital footprint.  


You are in full control of who sees your digital footprint.  


Your digital footprint is permanent.  


Your actions online contribute to your digital footprint.  

Your digital footprint can affect your future opportunities.

Which of the following are good ways to maintain a positive digital footprint? Select all the options that apply.

Treat your social media accounts as live journalling opportunities 


Only post things that you would want everyone to see 


Do not overshare  


Use privacy settings

All of the options listed are good ways to maintain a positive digital footprint.

Which of the following should you do to help create a positive digital footprint for yourself?

Post funny images and memes.  

Post about things or causes you are passionate about.  

Respond to people who post or say things you disagree with. 

Share information that will make you look good, even if it is slightly exaggerated.

To create a positive digital footprint, you should post about things or causes you are passionate about.

Plagiarism can be defined as… (Select all the options that are correct).

representing another person's work — their words and/or ideas — as your own.  


not acknowledging the sources your ideas are built upon.


Using ideas you have previously published and not referencing yourself.


paraphrasing ideas with explicit acknowledgement of the author. 

Plagiarism can be defined as representing another person's work - their words and/or ideas - as your own and not acknowledging the sources your ideas are built upon.

Some phishing attacks are pretty easy to identify; others can be more sophisticated and quite convincing. If you suspect an email to be a phishing attempt, which of the following actions is/are safe to consider? Select all the options that apply.

Forward the email to as many people as possible to get their opinion on whether it's a phishing attempt or not.


Click on any links or attachments in the email to help determine whether the message was sent from a legitimate source. 


If an email seems suspicious, it is best to contact the supposed sender (e.g. bank) through a trusted channel, instead of replying to the message in question.  


Examine the email to look for some of the typical signs of phishing attacks, like a generic greeting, poor language and unusual requests.   

If you suspect an email to be a phishing attempt, it is safe to consider the following actions:

- If an email seems suspicious, it is best to contact the supposed sender (e.g. bank) through a trusted channel, instead of replying to the message in question.
- Examine the email to look for some of the typical signs of phishing attacks, like a generic greeting, poor language, and unusual requests.

Indicate if the following statement is true or false: If you receive an email from your bank or IT services, asking for your password, it most likely is a scam.

True

False