Protecting Yourself on the internet

¡Supera tus tareas y exámenes ahora con Quizwiz!

A study conducted by the National University of Singapore, found that consumers worldwide spend ____ per year downloading pirated software.

$25 Billion

Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.

$25 billion ( Reason: A study conducted by the National University of Singapore, found that consumers worldwide will spend $25 billion and collectively waste 1.2 billion hours this year as the result of downloading pirated software. )

If your debit card has been compromised U.S Federal law says you are only liable for a __ fraudulent charges if you tell your bank within 2 business days of learning about them

$50

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

$50.00

Put the following elements in the proper order in which they appear in an email:

-#1: salutation -#2: body -#3: complimentary close -#4: signature line

Match the e-commerce transaction type

-A consumer makes a purchase from overstock.com : B2C -A consumer makes arrangements to buy used snowboard equipment with another consumer on craigslist: C2C -Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the internet: B2B

What is true about AUP

-AUP covers a broad spectrum of computer recourses -An AUP often accompanies most software applications -a well-written AUP should clearly state what a user is not allowed to do with these resources as well as general etiquette to follow when using shared resources

According to the FTC, a few US internet privacy laws/rules of importance are

-COPPA -the Red Flags Rule

The TPP was negotiated by 12 countries including

-Canada -The US -Brunei

Match the number to the statement about debit card fraud

-If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of: $50 -Wait more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of: $500 -After you tell your financial institution about the fraud charges it has ___ business days to investigate: 10 days. -If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business days: 1

Select what is true about BitTorrent

-Movie steaming and Torrent sites account for more than half of all internet traffic -BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files

The titles in the DMCA that directly impact digital copyright issues are:

-Title 2- online copyright infringement liability limitation -Title 3- computer maintenance competition assurance -Title 1- WIPO copyright and phonograms treaties and implementation act

What is true about RFID

-can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -RFID does not require line-of-sight scanning

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

-computers -networks -websites

Which of the statements are true about ergonomics?

-derived from the Greek words ergon (work) and nomoi (natural laws) -a very important element of an effective workplace safety plan -the study of human interaction with the objects they use

What is true about best practices for the use of an employee-monitoring program.

-preventing employee access to time-wasting or inappropriate sites can help stop trouble before it begins -be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it

Internet privacy is a wide ranging term that refers to a variety of considerations including...

-tech used to protect sensitive and private data, communications and preferences -who has access to date and information -how data and information is used

Which are considered Intellectual property?

-trade secrets -trademarks -patents

A digital identity is composed of a variety of digital attributes including:

-usernames and passwords -personal data such as your social security number and birth dates -online search activities

Which of the following are examples of EFT transactions?

-using your debit card to purchase gas -ATM withdrawal of cash to use to buy concert tickets -direct deposit of your paycheck

Example of EFT transaction

1. Direct deposit of your paycheck 2. ATM withdrawal of cash to buy something 3. Using debit card

Social risk

1. Identity theft 2. Computer/game addiction

A digital identity is composed of

1. Online search activities 2. Personal data such as your social security number and birth date 3. Username and password

Characteristics of Paypal

1. Provides buyer protection against fraud 2. Free for the buyer to use

Internet privacy is wide ranging term that refers to variety of considerations including

1. Techniques and technologies used to protect sensitive and private data 2.Who has access to data and information 3.How data and information is used

Electronic etiquette covers

1. Test messages 2. Social media 3. Email

Commonly downloaded files include

1. Updates 2. Programs/apps 3. Video files

Technological risk

1. Viruses 2. Insecure or compromised game servers

The TPP covers just ___ percent of global GDP.

40

BSA- The Software alliance is headquarters in Washington DC, and operates in more than _____ countries

60

The TPP also stipulates the length of copyright terms. In the US, perpetual copyrights and patents are prohibited, but extensions to copyrights are allowed. Under the TPP copyrighted works will pass into the public domain ____ years after the death of the creator, extending the term for some countries such as New Zealand by a further 20 years.

70

RFID systems consist of

Antenna, transponder, and transceiver

A leading advocate against software piracy for the global software industry is _____ -The Software Alliance.

BSA

In business,______ is the practice of creating a name, symbol/design (logo) that differentiates one product/service from other products/services.

Branding

Transaction conducted between established business and consumer purchasing a book is called

Business to consumer transaction

Which of the following statements are true regarding RFID?

Can be used to identify or track a variety of objects including poker chips, products, and even animals. RFID does not require line-of-sight scanning

Which of the following are examples of downloading a file?

Copying a driver from a company's website and saving it to your computer Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) Copying a photo from Facebook and saving it to your desktop

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic _____ interchange.

Data

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

EDI ( Electronic data interchange)

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

Technology that allows for the electronic communication of business oriented transactions and information between people and organization is called

Electronic Data interchange

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

False (Reason: If you wait too long to report fraud you may not get your money back!)

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

False (Reason: RFID is a relatively inexpensive technology that does not require direct line of sight scanning.)

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio______ Identification.

Frequency

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic_______ Transfer.

Funds

Software theft occurs when someone engages in which three of the following?

Illegally activating or registering a program Illegally copying a program (called piracy) Stealing software programs

International laws on _____ privacy vary greatly

Internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

Internet (Reason: Internet privacy is the right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet.)

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music l, movies, video games, and many other digital products.

Laws

Social media integrates a variety of multimedia including

Messaging, images, videos, websites

A popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _____.

PayPal ( Reason: PayPal has over 170 million users! )

Instagram is generally considered a _____sharing app.

Photo

Pinterest is an online

Pinboard

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ______ has occurred.

Piracy

Along with the price, a major concern associated with genealogical DNA testing is _____

Privacy

Technology using radio frequency protion of the electromagnetic spectrum to identify stuff is

Radio frequency

Internet privacy laws are created by both ____ and federal government

State

The main governmental organization that oversees Internet privacy in the United States is the Federal____ Commission.

Trade

The TTP stands for

Trans-Pacific Partnership

Passports have RFID chips

True

The BitTorrent protocol allows users to share large files over the Internet.

True ( Reason: The BitTorrent protocol allows users to share large files over the Internet.)

Commonly downloaded files include which three of the following?

Updates Video files Programs/apps

A digital identity is composed of a variety of digital attributes including which three of the following?

Usernames and passwords Personal data such as your social security number and birth date Online search activities

Which of the following have been cited as social risks associated with playing computer games online?

Virtual mugging, cyber prostitution, and protection schemes Computer/game addiction Identity theft

Internet privacy (most closely associated with)

Who has access to data and information How data and information is used Techniques and technologies used to protect sensitive data and information

What is a business' brand identity derived from?

Who people perceive them to be Who they are Who they want to be

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ____ use policy.

acceptable

In business _____ is the practice of creating a name, logo that differentiate one product

branding

A form of projection provided by the laws of the US for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural and audiovisual creations is called a _____.

copyright

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is ____ Commons

creative

The technology that allows or the electronic communication of business-oriented transactions and information between people and organizations is called electronic _____ interchange.

data

A digital presence created online by an individual, organization using a digital device is called a _____ identity.

digital

Signed into law by President Clinton in 1998, the _____ Millennium Copyright Act implements two World Intellectual Property Organization (WIPO) treaties.

digital

Transferring a file from the internet to your digital devices is called ____.

downloading

International laws on internet police are very similar.

false

The technology that uses electromagnetic electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals and people is called radio _____ identification.

frequencies

Human knowledge and ideas that laws protect against unauthorized use by others is considered _____ property

intellectual

Employee-____ software is designed to track and record the use of network and hardware resources in the workplace by employees

monitoring

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ____ has occurred

piracy

Two of the main concerns that surround digital identity are privacy and _____.

security

Two of the main concerns that surrounds digital identity are privacy and _____.

security

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, this is called:

software privacy

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state (Reason: Both state and federal governments create Internet privacy laws.)

A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the internet is Bit____.

torrent

The main governmental organization that oversees internet privacy in the Us is the Federal _____ commission

trade

A transceiver can both send and receive information.

true

Passports issued by the US and many other countries include RFID chips

true

A key component in an employee-monitoring program is the utilization of ____ and internet filters.

web


Conjuntos de estudio relacionados

Ch 3 Demand & Supply, Ch 2 Choice in a World of Scarcity, Chapter 1: Welcome to Economics, macro exam 1

View Set

Exam 2 practice questions for ch 7

View Set

Declaration of Independence Principles

View Set

Chapter 11 - Intrapartum and Postpartum Care of Cesarean Birth Families

View Set