IS 101 Living Online

¡Supera tus tareas y exámenes ahora con Quizwiz!

Select the 3 statements that are true regarding session cookies

Determine the start and end of a session Analyze and measure traffic on a web page Determine the start and end of a session

Internet privacy is a wide-ranging term that refers to a variety of considerations including which 3 of the following?

How data and information is used Who has access to data and information Techniques and technologies used to protect sensitive and private data, communications, and preferences

Which of these works seamlessly with Macintosh computers since it was also made by Apple?

macOS Safari

Select the domain name

mheducation.com

Select the domain name.

mheducation.com

Which of the following HTML objects will find web pages with hyperlinks?

Anchor

Which of the following are common software licenses

Single-user Network Site

Shari loves the iPhone she received for her birthday. What are 2 ways that she can enter the contacts from her old phone into her new phone?

Sync with a cloud service Enter them on the phone manually

Allison wants to find articles about LeBron James in the NBA finals. What should Allison type in her search window?

"LeBron James" AND "NBA Finals"

Jerome wants search for articles about banana pudding but his web search results also show results for chocolate pudding as well as articles about bananas. What should Jerome enter into the search window so that he only finds articles with the words banana pudding in them?

"banana pudding"

If typed into a search window, which of the following would show only the results of social media postings about pepperoni pizza?

#pepperonipizza

Breadcrumb trails are composed of text links that are separated by _____.

(>) and (/)

Match the following search tools with their actions. 1. banana OR pudding 2. banana AND pudding 3. "banana pudding is wonderful"

1- Search engine will show all articles with the word banana and all articles with the word pudding in them. 2- Search engine will show all articles that contain the words banana, pudding. 3- Search engine results will only show articles with the phrase: "banana pudding is wonderful"

Internet addiction is also referred to as Internet _____ Disorder (IAD) is excessive Internet use to the degree that it negatively affects daily life

Addictive

Which 3 of the following are examples of HTML objects?

Anchor Link Image

Programs that are used to scan files in order to identify and remove computer viruses and other malicious programs are referred to as _____ software

Anti-virus

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____

Antivirus software

Michelle likes to keep her email Inbox organized. One feature she uses to store answered email is to use the ___ feature of Outlook. This feature stores the email on her computer's hard drive.

Archive

One method of storing email for future use and not having it clutter the inbox is by using the ___ feature

Archive

Three commonly used search engines include which of the following?

Bing Google Yahoo

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons

Creative

A High-speed storage area usually located directly on the CPU is called _____.

Cache

China uses the Great Firewall to suppress content (images, articles, videos, etc.) that can be accessed via the Internet. This is a form of Internet _____.

Censorship

Select 2 considerations when evaluating a website for research use.

Check to see what references are included on the site. Extensive documentation is a good sign that the site is using viable information. If you are using blogs or wikis be aware that the author does not need to meet any qualifications to post content.

Select the 3 true statements about Boolean operators

Connect your search words with "AND" when you are searching for multiple items in the same page. Quotation marks make the search engine look for occurrences where the words are together rather than searching for individual occurrences. The tactful use of quotation marks can return more relevant search results.

Select the 3 true statements regarding fair use of copyrighted information

Content that is posted/presented on a web site is covered by the same copyright rules as print and other media Fair use allows you to view and use copyrighted information, but there are restrictions as to how you can use the information Fair use of information means you are permitted to use copyrighted information for commentary or editorial purposes without seeking permission.

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _____

Copyright

Where do you click first in order to enable or deselect the Google Chrome Autofill Feature?

Customize and control

An Internet search engine can perform which three basic tasks:

Display the location of the information stored in the indexes Indexing of keywords that are found Search the Internet for information based on the search criteria entered by the user

Match the definition to the correct term. 1. EULA 2. Network license 3. Site license 4. Single-User License

EULA- A legal contract between the software manufacturer and the user of an application. Single-User License-Restricts the use of software to one user at a time. Network license-Enable anyone on a network the right to use software. Site license-Software is installed on the device of qualified users who request the software inside an organization.

Free openly licensed learning resources that are available online for instructors and students to use are called Open _____ Resources

Educational

Your boss gives you a list of customers and asks you to reach out to each of them and update their contact information. Which method could you use?

Email each of them

Your boss gives you a list of customers and asks you to reach out to each of them and update their contact information. Which 2 methods could you use?

Email each of them Phone each of them

It is common practice for the web site owner to submit their URL and associated information to the search _____ company (SEC)

Engine

Search _____ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine

Engine

The method of planning or positioning workplaces and systems to fit the people who use them is called _____

Ergonomics

Which of the following are ethical or privacy concerns when using social media?

Every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. Every action you make online leaves a cyber-footprint. The data that is collected from social media sites is beneficial to marketers, businesses, and any entity that needs data on online behavior.

Va'Jahn is conducting research for an assignment in his marketing class. He is concerned about which references he can use. His use of copyrighted material is protected by _____ of information. This means he is permitted to use copyrighted information for commentary or editorial purposes without seeking permission. However, he must properly site the source in order to comply with fair use standards

Fair use

Some authors can write articles without introducing any personal bias

False

An online message board or discussion post site where people can post much longer messages, questions, or answers to questions than they could in a chat room is an Internet ___

Forum

Marcia received an email from a client and noticed that Tim, who should have also received it, wasn't included on the To line or the Cc line of the email. Marcia should ___ the email to Tim.

Forward

You are being bullied online by a colleague at work. What are two appropriate steps to take?

Get evidence of the bullying Tell your boss or the proper authorities about the bullying

Elly wants to find social media postings regarding base jumping over the Snake River. She should use a ___ search

Hashtag

Karl needs to interview a potential employee who lives in a different time zone. Of the options provided, what would be the best method for Karl to conduct the interview?

Holding a conference call

What browser comes with the Windows Operating System?

IE/Edge

Which 3 of the following should you consider when evaluating a website for research proposes?

If you are using a website for research purposes you should research the publisher's qualifications. You can find most of the information about a publisher by visiting the About Us, Corporate Profile, and Background sections of the site. Check to see the author's background, who published the authors work, and what is the relationship between the author and publisher.

Human knowledge and ideas that the law protects against unauthorized use by others is considered _____ property

Intellectual

The right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the Internet is called _____ privacy

Internet

You are concerned that your friend Wyatt has been spending too much time gaming online. What are two signs of Internet addiction?

Isolation from friends and family

Maria wants to ensure she is using correct ergonomic posture. Which of the following is correct ergonomic posture?

Keep your legs parallel to the floor and your feet flat on the floor

Your employer wants to decrease the amount of physical stress on your body when working on your computer. Which of the following would help to decrease physical stress?

Keep your legs parallel to the floor with you feet flat on the ground Keep wrists straight using proper support

Julia types specific terms into a search engine (Google, Bing, Yahoo, etc.) when she wants to find an article on the World Wide Web. This is called a ___ search.

Keyword

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products

Laws

A legal contract between the software manufacturer and the user of an application is called an End-User _____ Agreement

License

Boolean operators are the words "AND", "OR" and _____. The use of Boolean operators can make a search more precise and return better results

NOT

What set of legislation focuses on the censorship or unequal treatment of Internet content providers (Netflix, YouTube, BitTorrent, Skype, etc.) by Internet service providers (ISPs)?

Net neutrality

Which 2 of the following are warning signs of Internet addiction?

Not showing interest in other hobbies and activities Not being truthful about time spent on the computer

You should evaluate websites based on which 2 of the following criteria?

Objectivity Bias

Four colleagues are each on separate phone calls with customers, but they simultaneously need to send messages to each other. An app that provides this capability is called ____ .

Online chat

Search engine _____ (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine

Optimization

A digital identity is composed of a variety of digital attributes including which 3 of the following?

Personal data such as your social security number and birthdate Online search activities Usernames and passwords

If someone illegally copies a program they have committed software _____

Piracy

When you present someone else's work (including from other students) as your own work without proper acknowledgment to the original creator you have committed _____

Plagiarism

Which of the following activities on your personal social media accounts could negatively impact your professional identity?

Posting negative comments about your employer on your social media sites.

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____

Quarantine

Kevin uses SMS constantly. 3 things he uses texting for are to

Receive alerts about gate changes for a flight Send short group messages to his co-workers Receive reminders of events from his Google Calendar

You should evaluate websites using which 2 of the following criteria?

Relevance Validity

If you're reading an article and are concerned that it may be biased in one way or another, select 3 things that you can do to judge the author's objectivity.

Remember that bias is introduced into everything, even though it may be unintentional. Try to be aware of all sides of any issue. When viewing a website, investigate the background and other writings of the author and the site.

Wyatt owns a company that is about to launch an e-commerce website. He is concerned about securing web visits and transactions. He is investigating a popular encryption security technology called _____ that is used for establishing an encrypted link between a web server and web browser

SSL

The default browser on Apple devices (iPhones, Macintosh computers) is ___ .

Safari

The amount of time spent in a 24 hour period in front of a display screen is referred to as _____ time

Screen

Ildiko is conducting research about screen time and its impact on adults in the United States. Select 3 things that are true about screen time

Screen time is the amount of time spent in a 24 hour period in front of a display screen Too much screen time can lead to sleep issues weight gain, attention problems, vision issues, and a variety of other health problems Display screens include the viewing area of laptops, tablets, and smartphones, watching TV, and playing video games

Jose loves the contact management feature of his email software. 3 things he can do with it are:

Search for a specific contact Search for a specific contact Merge duplicate contacts to minimize redundancy

Two of the main concerns that surround digital identity are privacy and _____.

Security

Which of the following could online activities in your personal social media and email accounts can negatively impact your online professional identity?

Send an email about confidential company information Tweet negative comments about your boss and the business you work for

Tom likes to use SMS (texting). It is appropriate to use texting when ___ .

Sending a short group message to coworkers

Juan is writing a research paper on cyberbullying. He is trying to find examples of cyberbullying. Which of the following actions would be considered cyberbullying?

Sending a threatening or demeaning Facebook message

Which 2 of the following are examples of cyberbullying?

Sending threatening email and chat messages to someone Sending false information via a Twitter message

The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.

Separation

Added to the end of a business email, a ___ often includes company logos, links to the business, as well as contact information

Signature

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Which 2 of the following are the most common techniques

Signature-based detection Heuristic-based detection

An unsolicited email message is called _____.

Spam

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

State

Software theft occurs when someone engages in which of the following?

Stealing software programs Illegally copying a program (called piracy) Illegally activating or registering a program

Select the 3 true statements about SEO.

Studies show that 87% of web searches end at the first page of results, so a higher ranking page helps to get more website visitors. Search engine optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine. SEO helps to ensure that a web site is known and reachable by search engines thus increasing the likelihood of more site hits.

According to the FTC, which 2 of the following are important U.S. Internet privacy laws/rules?

The Red Flags Rule COPPA

Select what's true about Search Engine Companies.

The information contained in a search engine database is determined by how each specific company records URL information. SEC stands for Search Engine Company. It is common practice for the web site owner to submit their URL and associated information to the search engine company (SEC).

Once a post has gone viral on the Internet, how can you stop the spread of the post?

The post cannot be stopped

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

Video games Movies

Select the plug ins:

Adobe Flash Player Microsoft Silverlight

Select 3 true statements regarding the privacy risks with cookies.

Corporate and government entities can track your web behavior Websites can track your surfing behavior and create a profile Websites using cookies can collect your information and sell it to third parties

URL stand for _____ Resource Locator

Uniform

The text box used to enter a web address into a web browser is called the _____ bar.

Address

Select what's true about session cookies.

Determine the start and end of a session. Determine the web browser being used.

Select what's true about session cookies.

Determine the start and end of a session. Determine the web browser being used. Analyze and measure traffic on a web page

A ___ name, such as reddit.com, specifies the server or servers supporting a website

Domain

A server site on the Internet is identified by its ___ name

Domain

You are in New York and a colleague is in Hong Kong. What is a courteous way of transmitting information to each other, considering the time zone differences?

Email

Select the 3 true statements about breadcrumb trails.

Used for website navigation Useful on websites that have many web pages and a lot of information Give users a way to track the path they used when navigating a website

Which of the following are true statements about breadcrumb trails?

Used for website navigation. Useful on websites that have many web pages and a lot of information. Give users a way to track the path they used when navigating a website.

Which of the following are plug-ins?

Adobe Flash Player Microsoft Silverlight

A protocol commonly used to transfer large files from one server to another on the Internet is the ___.

File Transfer Protocol (FTP)

Select the web browsers.

Microsoft Edge Google Chrome Firefox

Christina asked, "What's a forum on the Internet? You quickly answer, "Great question! An Internet forum is a ___ ."

Online discussion board where individuals can post and reply to comments or questions

Microsoft's Hotmail email service has now transitioned to Microsoft ___ .

Outlook

Software, such as Java Runtime or JavaScript, adds functionality to your browser. These types of software are called?

Plug -ins.

A ___ like Adobe Reader, is software that can be added to increase the functionality of a browser

Plug In

A window that loads over the top of a browser window that a user is visiting is called a _____.

Pop Up

A window that loads over the top of a browser window that a user is visiting is called a?

Pop Up.

Acronyms such as IP, FTP, HTTP, and HTTPS are examples of ___

Protocol

A particular file or server address on the World Wide Web is identified by its uniform ___ locator.

Resource

One advantage of using a web-based Email service, such as Gmail, is that ___ .

Users can access it from nearly any Internet-connected device.

John does not have a landline telephone and he left his smartphone at work. How can he contact Jim to pick up his smartphone for him when Jim leaves the office?

VoIP

Nearly all online multi-player games incorporate voice interaction among players. This feature uses the ___ protocol

Voice over Internet

Select what's true about web browsers

Web browsers are search engines Web browsers are software applications Web browsers use Uniform Resource Locators (URLs) to identify resources such as web pages.

Which of the following is true about web browsers?

Web browsers use URLs to identify resources found on the Internet

One of the risks with cookies is

Websites that use cookies can monitor your browsing activity

Select what is true about the privacy risks with cookies.

Websites using cookies can collect your information and sell it to third parties. Websites can track your surfing behavior and create a profile.

Select what is true about the privacy risks with cookies.

Websites using cookies can collect your information and sell it to third parties. Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile.

Tanner wants to know when it's okay to click "Reply All" in an email response. Stephanie tells him only to use reply all ___

When you are certain all recipients need the information you are sending

Small programs that web designers add to web pages that are designed to display live content such as stock prices, weather, traffic updates, and breaking news are called _____.

Widget

Small programs that web designers add to web pages that are designed to display live content such as stock prices, weather, traffic updates, and breaking news are called _____.

Widgets

Select the 3 true statements regarding pop-ups.

A window that loads over the top of a browser window that a user is visiting Contain information about the site, or marketing information (advertisements) You can download a blocker to minimize the impact of ads on your web browsing experience

Software applications that allow users to access and surf the World Wide Web are called ___ .

Browsers

There are a variety of buttons included in the address bar including

Forward Back Reload page

TLD stands for _____.

Top Level Domain

The highest level in the domain name hierarchy is the ___ (TLD).

Top Level Domain

What refers to the highest level in a domain name hierarchy?

Top Level Domain

Which of the following is true about web browsers?

Web browsers use URLs to identify resources found on the Internet. Common web browsers include Google Chrome and Mozilla Firefox Web browsers are software applications

Select what's true about pop-ups

A window that loads over the top of a browser window that a user is visiting. Contain information about the site, or marketing information (advertisements). You can download a blocker to minimize the impact of ads on your web browsing experience.

A high-speed memory area usually located directly on the CPU is called _____.

Cache

Browser _____ improves the speed of your browser by loading previously accessed items on the web.

Cache

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

Cache

In addition to the RAM, modern processors temporarily keep frequently accessed data in a?

Cache

The folder on your hard drive that stores downloaded files including visited web pages, images, and fonts is called browser _____.

Cache

In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling

Conference

When Wyatt, Kevin, Sally, and Casey are all on the same business phone call, it's referred to as ___

Conference calling

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a _____.

Cookie

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a/an _____.

Cookie

Select 3 statements that are true regarding widgets

Designed to display live content such as stock prices, weather, traffic updates, and breaking news Designed to run in pre-designed content shells that receive information from outside sources Widgets are small programs that web designers add to web pages

Select what's true about widgets

Designed to display live content such as stock prices, weather, traffic updates, and breaking news. Designed to run in pre-designed content shells that receive information from outside sources. Widgets are small programs that web designers add to web pages

Match the following terms about cookies to their proper description. 1. First-party cookie 2. Web cookie 3. Third-party cookie

First-party cookie -Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session Web cookie-Small text file of information created by websites you visit that your web browser stores on your hard disk Third-party cookie -Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

When you delete an email from your Gmail account, it ___ .

Goes to the Trash folder

A programming language used to create web pages that uses a standardized method for tagging text files to attain color, graphics, and hyperlinks in web pages is _____.

HTML

Brian asked Robin, "What is an online chat?" Robin replied, "___ ."

It's real-time texting over the Internet

Select appropriate business email etiquette practices

Maintain high levels of formality, especially with initial contacts. Consider if email is the appropriate means of communication

What are the three parts of a URL?

Protocol Domain name File or resource name

To ensure that the tools of the Internet are available to all users _____ such as the TCP/IP, have been established

Protocols

The browser's address bar includes which 3 buttons?

Reload Back Forward

Select appropriate business email etiquette practices.

Remember that potentially negative news is best given face-to-face. Keep attachments small.

To avoid embarrassment when responding to an email, always double-check the addressees before selecting.

Reply All

A type of cookie that is stored in temporary memory and used to analyze and measure traffic on a web page is a ___ cookie.

Session

Stored in temporary memory, _____ cookies are used to analyze and measure traffic on a web page

Session

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

The information contained in this message may be confidential and/or constitute a privileged attorney-client document. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. The message above is commonly included in the ___ of a professional email.

Signature

To save time when sending emails from his corporate email account, Ryan has a ___ added automatically to the end of each email.

Signature

Cache contains frequently accessed data and is ___ than RAM.

Smaller

Daniel asked Lynne when their company might want to use online conferencing. Lynne replied that she could think of 2 circumstances:

So employees from different locations could meet without having to travel Instructional webinars

DeSean receives an unsolicited email message advertising a new product. Because it was unsolicited, this type of message would be considered _____ .

Spam

Joe's boss said she wanted to host a synchronous online video conference. Joe knows that synchronous means that ___

The conference will take place in real time


Conjuntos de estudio relacionados

ATI Communication and Fundamental Learning system RN 3.0 465 questions

View Set

3.6. Banking and Finance - Types of Banks

View Set

U.S. History-Chapter 5: Reconstruction

View Set

Chapter 10 Study Guide - TTU MGT. 3370

View Set