Social Media and Your Digital Identity
Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.
$25 billion
If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____.
$50
Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____.
$500
If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to _____.
$500.00
If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.
1
You should use LinkedIn to connect with other professionals including:
All of the above
Alberstson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet.
B2B
Signed into law by President Clinton in 1998, The ___ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.
Digital
Snaps are temporary and cannot be saved and forwarded to others.
False
Which of the following statements are true about Instagram?
Instagram is a subsidiary of (is owned by) Facebook. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android.
International laws on ___ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.
Internet
The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet is called ___ privacy.
Internet
Which of the following three statements about Instagram security are true?
It is important to adjust your privacy settings so you can determine who follows you. If you do not want to be tracked, turn off geo-tagging in the settings under location services. The profile section on Instagram lists your name, birthday, gender, and phone number. All information begins as viewable by the public unless you change the settings to private. Instagram can track your location.
It is a good idea to edit or remove skills endorsements from your ___ (professional social media site) account that do not accurately reflect your skill set or experience.
The world's most popular social network site for business professionals is
Social media integrates a variety of multimedia including which three of the following?
Messages Video Images
According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?
Pictures Literary works Music
Which of the following are email etiquette considerations?
Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. Write your messages carefully. Once you send a message you cannot rescind it. Be cautious so you do not hit "reply all" if you do not intend to do so.
A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the Internet is Bit
Torrent
Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.
Web 2.0
An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:
all of the above
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.
creative
People use the ___ symbol (#) before a relevant keyword or phrase (no spaces) in their tweet to categorize those tweets and help them show more easily in Twitter search.
hashtag
To post content to Pinterest, you start with a(n) _____ or a photo.
image
Along with the price, a major concern associated with genealogical DNA testing is
privacy
In Instagram it is important to adjust your ___ settings so you can determine who follows you.
privacy
Using DNA ancestry testing services such as 23 and Me and Ancestry.com can open interesting avenues of discovery. One disadvantage to using these services is the potential loss of ___, as your personal DNA data will be loaded into a large database.
privacy
On Facebook, your _____ is a collection of the photos, stories, and experiences that tell people about you and your experiences.
profile
A transceiver can both send and receive information.
true
If you do not adjust your privacy settings on Instagram anyone can follow you.
true
After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.
10
Where in the profile and settings area of Twitter where would you click to protect tweets so that manual approval is needed to view them?
2
Tweets can be a maximum of _____ characters.
280
A study by IDC reported that _____ percent of all employee Internet access time was not work-related.
30 to 40
There are a variety of emoji that are used by different operating systems and programs including:
All of the above
Which of the following are ethical concerns when using social media?
All of the above
Which of the following statements are true about acceptable use policy (AUP)?
An AUP often accompanies most software applications AUP covers a broad spectrum of computer resources A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources
Which of the following statements are true about Facebook?
Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. Unless you specify differently, photo tagging creates a link to your Facebook timeline. Every time you post something on any social media site, you are impacting your online identity.
Which of the following are examples of EFT transaction?
Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket Direct deposit of your paycheck Using your debit card to purchase gas
A consumer makes a purchase from Overstock.com
B2C
Which of the following are considered e-commerce transactions?
B2C C2C B2B
A consumer makes arrangements to buy used snowboard equipment with another consumer on Craigslist.
C2C
Which of the following are examples of downloading a file?
Copying a driver from a company's website and saving it to your computer Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) Copying a photo from Facebook and saving it to your desktop
A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _____ Commons.
Creative
Which of the following statement is true about Facebook?
Cyberstalking and online predators are a real problem on Facebook
The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.
Data
There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?
Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement. Accidentally downloading pornography that is labeled as a different file.
The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.
EFT
Free openly licensed learning resources that are available online for instructors and students to use are called Open ___
Education
There are risks associated with downloading content from the Internet. Which of the following are important to consider when downloading from the Internet?
Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer. The source of the content. It is important to consider if the content came from a legitimate source.
Select the characteristics of PayPal.
Free for the buyer to use Provides buyer protection against fraud
The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio ___ Identification.
Frequency
The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ___ Transfer.
Funds
Internet privacy
How data and information is used Who has access to data and information Techniques and technologies used to protect sensitive data and information
The DMCA protects ___ from liability for copyright violations of its users.
ISPs
Software theft occurs when someone engages in which three of the following?
Illegally activating or registering a program Stealing software programs Illegally copying a program (called piracy)
Which of the following are e-mail etiquette considerations?
Keep your messages brief yet specific to the subject of the message Avoid ambiguity Use proper spelling and grammar in your messages
_____ are free openly licensed learning resources that are available online for instructors and students. There are a variety of these resources available including textbooks, assignments, games, and digital media.
OER
A digital identity is composed of a variety of digital attributes including which three of the following?
Online search activities Personal data such as your social security number and birth date Usernames and passwords
Which of the following statements are true about Pinterest?
Pins are grouped together by topic and organized onto pinboards A pin is a visual bookmark. When you click a pin you are brought to the site/source that posted it
Digital identity
Purchasing behavior Social media postings Online search activities
Passports issued by the United States and many other countries include ___ chips.
RFID
Which of the following statements are true regarding RFID?
RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.
With over 6 billion image and video views per day ___ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.
Snapchat
Internet privacy is a wide-ranging term that refers to a variety of considerations including which three of the following?
Techniques and technologies used to protect sensitive and private data, communications, and preferences How data and information is used Who has access to data and information
Which of the following are considered Intellectual property?
Trade secrets Trademarks Patents
Which of the following are parts of a radio frequency identification (RFID) system?
Transponder Antenna Transceiver
Passports issued by the United States and many other countries include radio frequency identification (RFID) chips.
True
Which of the following should be considered when using Twitter?
Twitter accounts contain personal information Most of the communication taking place on Twitter is viewable by everyone If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter.
Commonly downloaded files include which three of the following?
Updates Programs/apps Video files
Which of the following statements are true about best practices when using LinkedIn?
Use up-to-date information and images on LinkedIn. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page.
The most downloaded cross-platform messaging app that allows you to send and receive messages without having to pay for SMS (text messaging) is
Which of the following statements are true about WhatsApp Messenger?
WhatsApp has over 2 billion users worldwide. Whats App is a popular way to make phone calls and send text messages via mobile app.
Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to-___ transaction.
consumer
A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a
copyright
The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic ___ interchange.
data
The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:
data interchange
Every action you make online leaves a cyber or ___ footprint.
digital
Emoticon is a blending of the words emotion and ___ and refers to keyboard characters that are used to represent facial expressions and objects.
icon
The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. It is a wide-ranging term that refers to a variety of considerations including:
internet
Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.
laws
You connect with businesses by following or "___" their profile.
liking
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is
paypal
Instagram is generally considered a ___-sharing app.
photo
If someone illegally copies a program, then they have committed software
piracy
When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ___ has occurred.
piracy
Two of the main concerns that surround digital identity are privacy and _____.
security
The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.
separation
To adjust your privacy settings in Facebook, make sure you are logged iin, then click on your ___ to access the security settings
settings
To adjust your privacy settings in Facebook, make sure you are logged iin, then click on your ___ to access the security settings.
settings
In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection _____ or wallet.
sleve
The practice of using social media to expand the number of business and contacts people have is called ___ networking.
social
Electronic etiquette covers the use of:
social media text messages e-mail
There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).
state
The main governmental organization that oversees Internet privacy in the United States is the Federal ___ Commission.
trade
It is important to avoid using Internet acronyms in formal messages and with people you are not familiar with, such as professors and employers.
true
Tweets can be made up of text, images, and video.
true
You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information.
true
Twitter is an information network made up of 280-character messages called
tweets