Fundamentals Of Digital Media Unit 3 Quiz 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

SoMe

social media

cross-site scripting

the act of embedding code into a site that redirects the use to a criminal site

baiting

the practice where the user is enticed by possible rewards and then asked to provide personal information; a procedure used to steal information where an individual is given a device that has a virus on it

digital ID

the sum of all the information about you available through the Internet

False

"Smedia" is a stylized way to abbreviate social media. True False

SoMe footprint

the sum of all the information you have used or created when using social media sites

pharming

using mock sites to trick people into sharing personal information

harassment

A person continually attacks another person in a way that results in a credible threat to their safety.

stalking

A person continuously pursues another and gives unwanted attention.

defamation

A person intentionally posts negative information about another person that is not true.

baiting

A user is enticed by possible rewards and is then asked to provide personal information.

click-jacking

when the individual clicks a link and is misdirected to a criminal site

It coordinated volunteers and sent them to the places most in need.

How did the American Red Cross use Twitter during Hurricane Sandy? It coordinated volunteers and sent them to the places most in need. It updated people on flooding and rescue efforts in their areas. It gathered funds to donate to the people that needed it the most. It reunited families that had been split apart by the disaster.

The bully has not yet broken the law, but there is reason to believe he or she will if steps are not taken.

In what types of situations are restraining orders helpful? The bully has not yet broken the law, but there is reason to believe he or she will if steps are not taken. The bully has already repeatedly attacked the victim, and there is plenty of evidence to convict the bully. The bully has not yet broken the law, and there is little reason to think that he or she will eventually do something illegal. The bully has broken the law, but there is no enough evidence to convict him or her of a crime of any kind.

cyber bullying

Individuals use the Internet to harass and/or disturb others.

Yes, because while they often have pages, their profiles are usually private.

Is it difficult to reach people with powerful positions on Facebook? Why or why not? Yes, because most of them do not have Facebook pages. Yes, because while they often have pages, their profiles are usually private. No, because many high-profile people use Facebook to communicate. No, because using Facebook is how they got to be powerful in the first place.

Yes, because it can impair peoples' ability to communicate in writing.

Is using abbreviations and symbols in social media a problem? Why or why not? Yes, because it can impair peoples' ability to communicate in writing. Yes, because other people who use social media cannot tell what they are saying. No, because the other people on social media also use these abbreviations. No, because people who use social media do not use these abbreviations offline.

Yes—it shows that you are current with your computer skills and are Internet savvy.

Should you add your social media contact information to a resume? Why or why not? Yes—it shows that you are current with your computer skills and are Internet savvy. Yes—a prospective employer can learn a lot of interesting things about you that way. No—social media is just for fun, and should not be mixed with your professional life. No—while your prospective employer may ask to see your profile, it does not belong on a resume.

Internet

Social networking involves using the ____________________ to meet and keep in touch with people.

True

The Internet as a system was originally developed by the U.S. military. True False

cybercrime

This describes any kind of illegal activity that takes place using digital media.

They put an emphasis on the positive and downplay negative feedback.

What best describes the way that businesses tend to represent themselves online? They put an emphasis on the positive and downplay negative feedback. They put equal emphasis on positive, negative, and neutral feedback. They put an emphasis on the negative and downplay neutral feedback. They put an emphasis on neutral feedback and downplay praise and criticism.

It impairs face-to-face communication for some, and assists it for others.

What impact, if any, does social media use have on peoples' ability to communicate well with others in a face-to-face environment? It impairs face-to-face communication for some, and assists it for others. It impairs face-to-face communication for all people who are heavy users. It assists face-to-face communication for all people who are heavy users. It has no discernible effect on face-to-face communication, even among heavy users.

the sum of all information you have used or created when using social media sites

What is a SoMe footprint? the amount of energy you have consumed by using social media sites the number of hours you have spent using social media sites to connect with people the information that you have learned by using social media sites the sum of all information you have used or created when using social media sites

the sum of all information about you available through the Internet

What is a digital ID? the number that your personal computer uses as identification the sum of all information about you available through the Internet the list of passwords that you use on sites for social media and email the personality type that you use on social media, whether or not it is realistic

an empty profile with no pictures

What is a good indicator that someone on social media is not who he or she claims to be? an empty profile with no pictures a boring profile with bad taste in music many mutual friends and acquaintances a name that does not sound familiar

It makes information easier to access.

What is one of the greatest advantages of cloud computing? It makes information easier to access. It makes information more secure. It makes information more accurate. It makes information easier to delete.

Google+ has more features than Facebook but fewer members.

What is the difference, if any, between Google+ and Facebook? Google+ has more features than Facebook but fewer members. Google+ has more features than Facebook as well as more members Facebook has more features than Google+ but fewer members. Facebook has more features than Google+ as well as more members.

Flikr features photos, while YouTube features videos.

What is the difference, if any, between YouTube and Flikr? There is no difference, as they both feature videos. There is no difference, as they both feature photos. Flikr features photos, while YouTube features videos. YouTube features photos, while Flikr features videos.

Social networking refers to the act of using the Internet to keep in touch, and social media refers to the actual websites used to do so.

What is the difference, if any, between social media and social networking? There is no difference—both terms refer to the same usage of the Internet to keep in touch with people. Social media refers to the act of using the Internet to keep in touch, and social networking refers to the actual websites used to do so. Social networking refers to the act of using the Internet to keep in touch, and social media refers to the actual websites used to do so. They both refer to keeping in touch with people over the Internet, but social media is less formal than social networking.

It keeps someone from having contact with another person.

What is the function of a restraining order? It ensures that criminals are not allowed to use the Internet. It keeps someone from having contact with another person. It makes sure that someone will go to jail for a long time. It demands that people only use social media in productive ways.

INTERPOL is an international organization, while the Department of Homeland Security is a U.S. organization.

What is the primary difference between INTERPOL and the Department of Homeland Security? INTERPOL addresses crimes dealing with technology only, while the Department of Homeland Security handles all manner of crimes. The Department of Homeland Security addresses crimes dealing with technology only, while INTERPOL handles all manner of crimes. INTERPOL is an international organization, while the Department of Homeland Security is a U.S. organization. The Department of Homeland Security is an international organization, while INTERPOL is a U.S. organization.

Electronic Communications Privacy Act

What law made it illegal to access or intercept transmitted electronic communication without permission? National Information Infrastructure Act Cyber Security Enhancement Act Electronic Communications Privacy Act Stop Online Piracy Act

Cyber Security Enhancement Act

What law protects you by giving law enforcement the power to access and monitor digital information? National Information Infrastructure Act Cyber Security Enhancement Act Electronic Communications Privacy Act Stop Online Piracy Act

Both small businesses and large businesses can benefit.

What types of businesses can benefit from using social media sites? Both small businesses and large businesses can benefit. Large businesses can benefit, but not small businesses. Small businesses can benefit, but not large businesses. Regardless of size, a business must be local to benefit.

Traditional media sources in these countries may be censored.

Why did social media help protestors so much during the Arab Spring? Traditional media sources were knocked out by storms. Traditional media sources sided with the people in power. Traditional media sources do not exist in these countries. Traditional media sources in these countries may be censored.

Crowd

_________________ sourcing is a technique in problem solving where the problem is shared with many people so that the people can offer potential solutions.

Cloud

__________________ computing uses the storage of an independent server to give members access to the information from any device with Internet access.

Pharming

______________________ is a crime that uses mock (fake) sites to trick people into sharing information.

INTERPOL

___________________________ is an international organization that connects police worldwide and has created a task force that specifically addresses electronic crime.

crowd sourcing

a technique used in problem solving where the problem is shared with many people, the people then offer potential solutions, and the individual who posed the problem would then evaluate the potential solutions and select the best option

cyber crime

crime that takes place with the use of digital media

cyber bullies

individuals who use the Internet to bully or harass others


Kaugnay na mga set ng pag-aaral

Nursing Assessment Chapter 26: Female Genitourinary NCLEX

View Set

05.01 Overview of the Nursing Process

View Set

CompTIA Network+ Certification Exam N10-007 Practice Test 8

View Set

Investigating Currents and Fields Quick Check

View Set

Health Policy Provisions, Clauses, and Riders

View Set