C @ CMU

¡Supera tus tareas y exámenes ahora con Quizwiz!

How long is your network access suspended if you exceed the bandwidth limitations the maximum amount of times?

45 days

What is the immediate consequence imposed by the university on targets of Digital Millennium Copyright Act (DMCA) Takedown Notices?

72 hours for the student to resolve the issue with Student Life Office or face a general network suspension

What is Google Scholar?

A Google database for finding scholarly articles sometimes linking to full text.

What is phishing

A method used by cyber-criminals to lure you into providing sensitive information.

Which of the following materials is illegal to share using a P2P application?

A new episode of your favorite television show.

While composing an inspirational speech for a public speaking class, you decide to borrow several passages from Martin Luther King, Jr.'s "I Have a Dream" speech. The quotes strengthen your message in a way that you have not been able to accomplish without their inclusion. In this situation, you should:

Acknowledge Dr. King in your speech and make it clear that you are quoting him.

What is one advantage of searching a library catalog?

All the materials that you find are contained in that library collection.

Which of the following sources is likely to be the most authoritative?

An article from an academic journal.

Which file storage option allows you to share files with other users?

Box or Google Drive

Which of the following resources would you use to find a movie that you need to watch for your Russian course?

CMU library catalog

Which of the following is NOT a responsibility established by the university's Computing Policy?

Communicate in proper and legal ways.

Which of the following options is NOT a possible penalty for violating the university's Computing Policy?

Confiscation of personal computing equipment

Which action will NOT protect your computer from a malware infection?

Don't use the Windows operating system.

Which of the following should you NOT do if you receive an unexpected email from your mom that includes an attachment?

It is from your mom; go ahead and open the attachment.

Where on the library website would you go when you want to see the items you have checked out?

My library account

What is the university's recommendation for updating antivirus software on your computer?

Only run manual updates when new threats are announced for which the antivirus software issues emergency updates.

You can pay for additional printouts beyond your Andrew Printing quota using funds from your account.

Plaid Cash

Your quota is consumed by which of the following?

Print jobs released from a printer

The DMCA:

Provides rules for online service providers that can limit their liability for copyright violations.

What should you do if your search on Google returns too few results?

Replace a search term with a more frequently used term.

Under the provisions of the Digital Millennium Copyright Act (DMCA), Carnegie Mellon is obligated to:

Respond to any complaints of copyright infringement by stopping the alleged violation from continuing.

Which file storage option can only be accessed from a computer lab computer?

SandBox

Specialized databases are best for searching:

Scholarly journals on specific topics in a discipline.

When the university receives a Digital Millennium Copyright Act (DMCA) Takedown Notice, it is obligated to:

Stop the distribution of the infringing material.

Which of the following best summarizes the university's Computing Policy?

The Computing Policy is a community standard that establishes your responsibility to behave as a mature, reasonable and ethical person.

Which of the following are indicators that a URL may be malicious?

The URL includes a series of numbers after http://.

Why would an attack that infects your computer result in your computer's suspension from the network?

To prevent the same infection from spreading over the network to other computers.

Why would you use course reserves?

To read materials that are required for a course.

You opened a malicious email attachment and are now infected with malware. Which of the following actions should you take to recover from the malware infection?

Update your antivirus software and run a full system scan.

To narrow a simple search on "landscape architecture" in the university's library catalog, you should do which of the following?

Use facets to limit your search.

Which of the following statements best describes the anonymity of P2P usage?

Users of P2P applications are not anonymous, whether uploading or downloading.

When should you consider using Interlibrary Loan?

When Carnegie Mellon doesn't own a copy of a book you want to read.

Based on CMU's recommendations, what can you do if you do not have antivirus software installed on your computer?

You can download and install campus-licensed antivirus software from Computing Services' website.

Which of the following is NOT an indicator that your computer is compromised?

You receive a warning that your hard drive is low on storage space.

Web stations and computer labs have complement of software applications.

a different

What are the ways you can get support from CMU's library website?

all of the above

One advantage of accessing articles through the university's library catalog rather than an outside resource is _____.

any article available will be accessible free of charge

P2P applications

are not permitted on the CM network

represents whether the information is provided by trustworthy sources.

authority

Devon visits his neighbor's room to get help on a homework assignment. While there, he logs into his Andrew account and forgets to log out before he leaves. His neighbor notices that the account is still logged in and adds a course to Devon's academic schedule. Which of the following has NOT been violated?

availability

Maintaining the of a resource means that authorized users are able to reliably get to the specific machine or information when needed.

availability

The of a resource refers to how timely and reliable access to that resource is.

availability

When receiving an email attachment with a file ending with .exe , you should

avoid opening the attachment as it may contain malware

Where can you save a file so that it is accessible from any computer with an Internet connection?

box or google drive

Which file storage option allows you to share files with other users?

box or google drive

is about ensuring that only authorized users have access and that unauthorized users are excluded

confidentiality

is about ensuring that only authorized users have access and that unauthorized users are excluded.

confidentiality

Which of the following options is NOT a possible penalty for violating the university's Computing Policy?

confiscation of personal computing equipment

represents whether the information presented in the resource might be outdated based on the publication date and what you know about the publication process.

currency

Of the following, which is the best choice for finding public opinion related to your topic of interest?

discussion forums and blogs

PII includes your name in conjunction with which of the following? (Select all that apply.)

drivers license social security credit card number

Access to your Andrew account and password will not compromise your PII.

false

All Andrew Printing represent a single printer

false

CMU prevents you from accessing malicious websites.

false

Color printing is available on all of the Andrew Printing queues.

false

Giving another author credit while incorporating his or her ideas into your argument constitutes plagiarism.

false

Making sure one of your friends knows your password as a backup will help you protect your personally identifiable information (PII).

false

Only urgent issues should be reported to the Help Center

false

Only urgent issues should be reported to the Help Center.

false

Tabloid printing is available on all of the Andrew Printing queues.

false

The unused portion of your Andrew Printing quota is credited to your student account.

false

There are no differences between the public computer lab computers and the Web stations.

false

There is a time limit on how long you can use a computer lab computer.

false

There's no threat to your information so long as you don't share your Andrew ID and password with anyone

false

Under the Fair Use Policy, you do not need to credit the source of copyrighted materials used in your academic coursework.

false

Web stations provide access to the same academic software you'll find in the computer labs.

false

You should rely on logos or addresses to verify the authenticity of an email.

false

You can use the library website's Ask Us feature to perform which of the following tasks?

get help from a librarian

Which of the following resources would you use to find recent U.S. State Department briefings on the Middle East?

google

Points: 1 out of 1 Which of the following accurately describes the university's system for determining fair use of public computers?

impact based

One of the clues that an email is NOT a phishing scam is that the email

includes a phone number for you to contact the sender.

Maintaining the of information means ensuring that the data has not been changed inappropriately, whether these changes are accidental and innocent or are intentional and malicious.

integrity

When Sara posed as Guadalupe and sent out vicious emails, she compromised the of Guadalupe's account.

integrity

addresses the question of how certain you can be about the accuracy of your resources and information.

integrity

An email message informing you that your email quota has exceeded its limit could be a phishing attack if the message

is asking for your andrew ID and password

Where should you look to find out if CMU has access to The New Yorker online?

journals search

If you want to find only the articles that you can readily get a PDF of through ProQuest, what can you do?

limit to full text articles

Is deleting emails a risky behavior that could lead to computer or account compromise?

no

You receive an email with an attachment that is infected with malware. Select the action that is most likely to occur if you never open the attachment.

none of the above

data bases are most useful for retrieving

periodical and journal titles

Which of the following types of information are commonly targeted by cyber criminals? (Select all that apply.)

personally identifiable info, social security numbers, user IDs and passwords

represents the different ways the issue under investigation can be viewed, and which of these ways best characterizes the resource.

point of view

Your Andrew Printing quota is consumed by which of the following?

print jobs released from a printer

Which of the following best describes the university's system for determining fair use of bandwidth?

quota-based

represents how completely and specifically the information meets the need of the assigned task.

relevance

Which file storage option can only be accessed from a university computer lab computer?

sandbox

General databases are best for searching which of the following?

scholarly journals on many topics

Theresa needs a microphone and audio recorder for an assignment. Where can she get this equipment?

technology lending

An authentic security alert will include a URL to where the security alert is posted on

the computing services website

How can you access course reserves?

the library homepage

After compromising your credit card number, a malicious person could change your address with the U.S. Postal Service.

true

Citations give authors and researchers credit for their original ideas and language and protect them from appropriation by others.

true

Cyber-criminals are people who circumvent security controls in order to break into computer systems and networks.

true

Failing to keep your operating system up to date is a violation of the university's Computing Policy, and can result in your computer being suspended from the network.

true

Fraudulent emails often include an offer of money, prizes, or discounts.

true

If you do not resolve a Digital Millennium Copyright Act (DMCA) infraction within 72 hours, your computer will be suspended from the network.

true

If you fall victim to a phishing scam, your computing resources could be compromised and used for malicious activity.

true

If you suspect that your computer has been compromised, you should change your password immediately.

true

If you were to fall victim to a phishing scam, your identity could be stolen and your computing resources could be compromised and used for malicious activity.

true

If your Andrew ID and password are compromised, the information and resources of the broader campus community are at risk as well.

true

If your mobile device is stolen, you should report the incident to campus police.

true

In order to use the databases that Carnegie Mellon subscribes to, you have to be a CMU student, staff, or faculty member.

true

Malware is a general term for malicious software that includes computer viruses, worms, and Trojan Horses.

true

Maple is one of the software applications available through Virtual Andrew. You can consult the Software Catalog list.

true

Providing the location of a resource and a detailed description of the problem is a good practice when reporting issues to the Help Center.

true

Some academic software is only available in a computer lab and cannot be used via Virtual Andrew.

true

Some computer labs can be reserved for classes.

true

Some course reserves materials are digital.

true

Some file-sharing programs can consume bandwidth even when you are not actively downloading files.

true

The public computing computer labs are located in the academic buildings and residence halls.

true

Theft of PII may lead to identity theft.

true

There is a time limit on how long you can use a Web station.

true

To receive security news and alerts, you should subscribe to Computing Services' security news feed.

true

You can configure your personal computer to print to the Andrew Printing service

true

You can only use a Web station for 15 minutes.

true

You can use Virtual Andrew to access licensed software from your own computer or mobile device.

true

You should subscribe to Computing Services' RSS (Rich Site Summary) news feed to ensure that you are informed about the latest security threats?

true

Your print jobs will not be printed until you physically visit a print station and release them.

true

How can you access specialized academic software, such as Minitab, from your personal computer?

virtual andrew

Are you responsible for verifying the legitimacy of unexpected email attachments?

yes

Can you get a borrower's card to check out books at local, non-CMU libraries?

yes

Consider the following article: How Not to Deal With Climate Change . Does this article cover different perspectives?

yes

Is being vigilant for shoulder surfing considered a safe computing practice?

yes

Is plugging a USB drive that you found at the gym into your computer to find the owner a risky behavior that could lead to computer or account compromise?

yes

Is sharing your password with friends a risky behavior that could lead to a computer or account compromise?

yes

Steven is taking 73-100 this semester, and gets copies of his roommate's graded homework assignments who took the course last year to make sure he has the correct answers. Is this cheating?

yes

A large amount of spam being sent from your Andrew email account is detected. Select the action that is most likely to occur.

your andrew account is suspended


Conjuntos de estudio relacionados

Chap 23 Public/Community/Home Health Questions

View Set

MOC EXAM Questions for Child Neurology From Practice Test 2

View Set

APUSH Historical Evidence, Periods 1-9

View Set

Lesson 2: Citric Acid Cycle (Krebs Cycle) & The Electron Transport Chain

View Set