Concept Exam Module 6 and 14
Chapter 14
...
Chapter 6
.....
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?
Remove the battery and throw it in the trash.
What is a digital certificate?
Technology used to verify a user's identity
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.
digital citizenship
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two.
-Switch to a standing desk. -Take frequent breaks.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?
Acceptable use policy (AUP)
Which of the following problematic behaviors relies on the use of digital technology?
Cyberbullying
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
False
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote wiping to retrace the thief's steps.
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?
People with color blindness
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.
the digital divide
What rules should guide your behavior when you interact with friends and coworkers on social media?
Netiquette
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Requesting a credit report and freezing your credit.
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?
Reset the old phone to factory settings.
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?
Screen reader
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
A Trojan
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.
digital footprint
Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.
False
Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?
Verify the content with an authoritative source.
How can an attacker execute malware through a script?
An attacker can attach a script to a program that you download which then infects your computer.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.
a hoax
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.
catfishing
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?
Digital rights management (DRM)
A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.
False
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?
Repetitive strain injury
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?
Wikis can be heavily biased.
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.
digital detox
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.
digital inclusion
When Hafsa writes a research paper for her psychology class, ________________ allow (s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.
the fair use doctrine