social media connect assignments

¡Supera tus tareas y exámenes ahora con Quizwiz!

Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.

$25 billion

If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____. Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____. After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate. If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.

$50 $500 10 1

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

$50.00

Which of the following statements are true about Instagram?

According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. Instagram is a subsidiary of (is owned by) Facebook.

A leading advocate against software piracy for the global software industry is _____ The Software Alliance.

BSA

A popular peer-to-peer file sharing protocol that allows users to share software, movies, and other files is _____.

BitTorrent

Which two of the following statements are true about BitTorrent?

BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files. Movie streaming and Torrent sites account for more than half of all Internet traffic.

Which of the following are considered e-commerce transactions?

C2C, B2B, B2C

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

EDI

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

The DMCA protects ___ from liability for copyright violations of its users.

ISPs

Software theft occurs when someone engages in which three of the following?

Illegally activating or registering a program Illegally copying a program (called piracy) Stealing software programs

Which two of the following statements are true about BitTorrent?

Movie streaming and Torrent sites account for more than half of all Internet traffic. BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files.

Digital identity Internet privacy

Online search activities, Purchasing behavior, Social media postings Techniques and technologies used to protect sensitive data and information, How data and information is used, Who has access to data and information

Genealogical DNA testing allows users to check their genetic backgrounds. Which of the following two are disadvantages associated with this testing?

Potential that your personal DNA data may be misused. There is the potential for insurance companies to one day use this information to your disadvantage.

Which of the following statements are true regarding RFID?

RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.

Which of the following statements are true about ergonomics?

The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations. A very important element of an effective workplace safety plan. Derived from the Greek words ergon (work) and nomoi (natural laws).

The main governmental organization that oversees Internet privacy in the United States is the Federal _____ Commission.

Trade

A digital identity is composed of a variety of digital attributes including which three of the following?

Usernames and passwords Online search activities Personal data such as your social security number and birth date

Which of the following have been cited as social risks associated with playing computer games online?

Virtual mugging, cyber prostitution, and protection schemes Computer/game addiction Identity theft

What is a business' brand identity derived from?

Who they want to be Who they are Who people perceive them to be

In business, ________ is the practice of creating a name, symbol/design (logo) that differentiates one product/service from other products/services.

branding

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

computers, networks, websites (all of the above)

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a ______.

copyright

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.

creative

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic _____ interchange.

data

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

data interchange

A digital presence created online by an individual or organization using a digital device is called a ______ identity.

digital

Transferring a file from the Internet to your digital device is called _____.

downloading

Derived from the Greek word ergon (work) and nomoi (natural laws), _____ is an important element of workplace safety.

ergonomics

International laws on Internet privacy are very similar.

false

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ____ Transfer.

funds

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic _____ Transfer.

funds

Human knowledge and ideas that the law protects against unauthorized use by others is considered _____ property.

intellectual

Human knowledge and ideas that the law protects against unauthorized use by others is considered ______ property.

intellectual

International laws on ______ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

internet

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

movies, video games

A popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _____.

paypal

Two of the main concerns that surround digital identity are privacy and _____.

security

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state


Conjuntos de estudio relacionados

Chapter 7 Lifespan Development Quiz and Test

View Set

(1) AZ-500 Manage identity and access in Azure Active Directory

View Set

Ch 15: Nursing Care of a Family During Labor and Birth

View Set

International Finance Chapter 16

View Set

CAASPP Testing 8th Grade Math Practice Scoring Guide Answers

View Set

Evaluation and Management (E/M Services) Chapter 11

View Set