CGS2060 - Protecting Yourself on the Internet
A study conducted by the National University of Singapore, found that consumers worldwide spend ____ per year downloading pirated software.
$25 Billion
Put the following elements in the proper order in which they appear in an email:
-#1: salutation -#2: body -#3: complimentary close -#4: signature line
Match the e-commerce transaction type
-A consumer makes a purchase from overstock.com : B2C -A consumer makes arrangements to buy used snowboard equipment with another consumer on craigslist: C2C -Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the internet: B2B
What is true about AUP
-AUP covers a broad spectrum of computer recourses -An AUP often accompanies most software applications -a well-written AUP should clearly state what a user is not allowed to do with these resources as well as general etiquette to follow when using shared resources
According to the FTC, a few US internet privacy laws/rules of importance are
-COPPA -the Red Flags Rule
The TPP was negotiated by 12 countries including
-Canada -The US -Brunei
Match the number to the statement about debit card fraud
-If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of: $50 -Wait more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of: $500 -After you tell your financial institution about the fraud charges it has ___ business days to investigate: 10 days. -If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business days: 1
Select what is true about BitTorrent
-Movie steaming and Torrent sites account for more than half of all internet traffic -BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files
The titles in the DMCA that directly impact digital copyright issues are:
-Title 2- online copyright infringement liability limitation -Title 3- computer maintenance competition assurance -Title 1- WIPO copyright and phonograms treaties and implementation act
What is true about RFID
-can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -RFID does not require line-of-sight scanning
An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:
-computers -networks -websites
Which of the statements are true about ergonomics?
-derived from the Greek words ergon (work) and nomoi (natural laws) -a very important element of an effective workplace safety plan -the study of human interaction with the objects they use
What is true about best practices for the use of an employee-monitoring program.
-preventing employee access to time-wasting or inappropriate sites can help stop trouble before it begins -be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it
Internet privacy is a wide ranging term that refers to a variety of considerations including...
-tech used to protect sensitive and private data, communications and preferences -who has access to date and information -how data and information is used
Which are considered Intellectual property?
-trade secrets -trademarks -patents
A digital identity is composed of a variety of digital attributes including:
-usernames and passwords -personal data such as your social security number and birth dates -online search activities
Which of the following are examples of EFT transactions?
-using your debit card to purchase gas -ATM withdrawal of cash to use to buy concert tickets -direct deposit of your paycheck
The TPP covers just ___ percent of global GDP.
40
BSA- The Software alliance is headquarters in Washington DC, and operates in more than _____ countries
60
The TPP also stipulates the length of copyright terms. In the US, perpetual copyrights and patents are prohibited, but extensions to copyrights are allowed. Under the TPP copyrighted works will pass into the public domain ____ years after the death of the creator, extending the term for some countries such as New Zealand by a further 20 years.
70
A leading advocate against software piracy for the global software industry is _____ -The Software Alliance.
BSA
In the United States the federal _____ covers most consumer oriented electronic transactions.
EFT Act
The TTP stands for
Trans-Pacific Partnership
A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ____ use policy.
acceptable
A form of projection provided by the laws of the US for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural and audiovisual creations is called a _____.
copyright
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is ____ Commons
creative
The technology that allows or the electronic communication of business-oriented transactions and information between people and organizations is called electronic _____ interchange.
data
A digital presence created online by an individual, organization using a digital device is called a _____ identity.
digital
Signed into law by President Clinton in 1998, the _____ Millennium Copyright Act implements two World Intellectual Property Organization (WIPO) treaties.
digital
Transferring a file from the internet to your digital devices is called ____.
downloading
International laws on internet police are very similar.
false
The technology that uses electromagnetic electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals and people is called radio _____ identification.
frequencies
Human knowledge and ideas that laws protect against unauthorized use by others is considered _____ property
intellectual
Employee-____ software is designed to track and record the use of network and hardware resources in the workplace by employees
monitoring
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ____ has occurred
piracy
Two of the main concerns that surrounds digital identity are privacy and _____.
security
When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, this is called:
software privacy
A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the internet is Bit____.
torrent
The main governmental organization that oversees internet privacy in the Us is the Federal _____ commission
trade
A transceiver can both send and receive information.
true
Passports issued by the US and many other countries include RFID chips
true
A key component in an employee-monitoring program is the utilization of ____ and internet filters.
web