c@cm Every Quiz Question

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You should plan to spend __ hours per week in order to get the most out of the course.

6

What is Google Scholar?

A Google database for finding scholarly articles sometimes linking to full text.

What is phishing?

A method used by cyber-criminals to lure you into providing sensitive information.

What is a catalog?

A special kind of database that tells you what is in a particular library collection.

Which of the following cannot be found in the library catalog?

Blogs

What steps should you take if you've fallen victim to a phishing attempt and provided the password for your email account?

Change the password for the email account that received the phishing email, Change the passwords for your other accounts if they share the same password as the account that received the phishing email.

All Andrew Printing queues represent a single printer.

False

Giving another author credit while incorporating his or her ideas into your argument constitutes plagiarism. T/F?

False

If you give a collaborator specific permission access to a folder in Box, they have the same permission level for every file inside of that folder. T/F?

False

Maintaining the _____ of information means ensuring that the data has not been changed inappropriately.

Integrity

Select the types of materials that are listed in a Books & More search.

Journal articles

Where should you look to find out if CMU has access to The New Yorker online?

Journals Search

Match these important course events with their corresponding deadline. Deadline to start your coursework ---- Deadline to finish your coursework ---- Deadline to take the Final Exam ----

July 18th, August 8th, August 12th

Where on the library website would you go when you want to see the items you have checked out?

My Library Account

Is keeping your computer's software up to date a risky behavior?

No

Which of the following types of information are commonly targeted by cyber criminals?

PII, Social Security numbers, User IDs and passwords

Which of the following is an example of inappropriate behavior as defined by the Computing Policy?

Sharing my Andrew password with my roommate.

Theresa needs a microphone and audio recorder for an assignment. Where can she get this equipment?

Technology Lending

Which of the following is an indicator that data is being transmitted securely on a website?

The URL begins with https://

How can you access course reserves?

The library homepage

Portable devices like cell phones or tablets can be compromised by a malicious attack. T/F?

True

The amount of storage space allocated to CMU students in Google Drive is:

Unlimited

When should you consider using Interlibrary Loan?

When Carnegie Mellon doesn't own a copy of a book you want to read.

Which resource would you use to quickly locate background information on Bill Gates?

Wikipedia

Steven is taking 73-100 this semester, and gets copies of his roommate's graded homework assignments who took the course last year to make sure he has the correct answers. Is this cheating?

Yes

Your Campus Printing quota resets _____.

each semester

Which department houses the Computer Lab and Printer Locations map?

Computing Services

Maintaining the [ Select ] ["Confidentiality", "Integrity", "Availability"] of information means ensuring that the data has not been changed inappropriately, whether these changes are accidental and innocent or are intentional and malicious.

Confidentiality

Which action will NOT protect your computer from a malware infection?

Don't use the Windows operating system.

Is using the same password on a social networking site as you do for your Andrew account a risky behavior that could lead to computer or account compromise? Y/N?

Yes

Which of the following strategies for getting access to a journal article might cost you money?

Accessing the article off-campus through the publisher's website.

If you use faceted search to find recent studies on climate change, which of these facets is least relevant for your search? Group of answer choices

Author

The abstract provides you with a brief summary of the article so that you can determine whether it is relevant to you.

An article from an academic journal.

What is the "public domain"?

An intellectual property designation for content that is not controlled or owned by anyone and which is available for anyone to freely use for any purpose.

Which file storage option allows the most control over who can view, edit and access files? Group of answer choices

Box

Where can you save a file so that it is accessible from any computer with an Internet connection?

Box or Google Drive

_____ is about ensuring that only authorized users have access to information and resources.

Confidentiality

Which of the following options is NOT a possible penalty for violating the university's Computing Policy?

Confiscation of personal computing equipment

Where should you go for help if your computer is infected?

Contact the Help Center.

Why does a phishing email try to trick you into divulging your account ID and password?

Cyber-criminals seek your account ID and password in order to gain access to your financial information.

Where is the best place to browse for databases related to political science?

Databases by Subject

Of the following, which is the best choice for finding public opinion related to your topic of interest?

Discussion forums and blogs

CMU prevents you from accessing malicious websites. T/F?

False

Computing Services controls the configuration of all computers connected to the campus network. T/F?

False

Computing Services relies solely upon end users to combat malicious attacks on the university network and does not directly intervene to combat threats to the network. T/F?

False

The Andrew B&W printing queue can be used for all of your print jobs, including those that require special features (such as color or tabloid). T/F?

False

The unused portion of your Andrew Printing quota rolls over to the next semester.

False

There are no differences between the public computer lab computers and the Web stations. T/F?

False

There is a time limit on how long you can use a computer lab computer. T/F?

False

There's no threat to your information so long as you don't share your Andrew ID and password with anyone. T/F?

False

You must score 100% on the Pre-Assessment before you can proceed with the unit. T/F

False

You should be cautious of emails from a company if the greeting is generic. T/F?

False

You should rely on logos or addresses to verify the authenticity of an email. T/F?

False

Suppose you need a book as soon as possible, but it's not available at Carnegie Mellon. Which would be your best option?

Go to the University of Pittsburgh and check out the book.

Your professor included 'course reserves' in the class syllabus. What can you find in the course reserves?

Items for a class that all students need access to

What information do you need to have in order to find out whether Carnegie Mellon has access to a journal online?

Journal title

Based only on the citations, which of the following would you consider most authoritative?

Lu, Jian; Vecchi, Gabriel A.; Reichler, Thomas (2007). Expansion of the Hadley cell under global warming. Geophysical Research Letters 34.

A(n) _____ refers to a brief summary of an article.

abstract

Information found in a(n) _____ is carefully selected through a review process.

academic database

Information found in a(n) _____ requires authentication to access.

academic database

How much quota are you allocated for Andrew Printing?

$40.00

What features should you consider when selecting a file storage option? (Select all that apply.)

Accessibility Available quota Secure authentication Sharing ability Backup schedule

Which of the following is not an example of inappropriate behavior as defined by the Computing Policy?

Adding a nickname to your email signature.

What are the ways you can get support from CMU's library website?

All of the listed features are available.

Which of the following is an advantage of a Google web search?

Browsing capabilities and getting background information and summaries.

What should you do if you receive a phishing email?

Call the Help Center.

Which permission gives the least amount of access when you share a file using Google Drive?

Can View

How do you access the C@CM course materials?

Canvas

_______________________ represents whether the information presented in the resource might be outdated based on the publication date and what you know about the publication process.

Currency

Where is the best place to browse for databases related to philosophy?

Databases by Subject

PII includes your name in conjunction with which of the following?

Driver's license number, Social Security number, Credit card number.

Access to your Andrew account and password will not compromise your PII. T/F?

False

Assignments submitted after the due dates listed on the syllabus will not be accepted. T/F

False

Only critical issues that prevent you from completing your academic coursework should be reported to the Help Center. T/F?

False

The Andrew B&W printing queue can be used for all of your print jobs, including those that require special features (such as color or tabloid).

False

The Final Exam is only available the week of August 9th. T/F

False

Under the Fair Use Policy, you do not need to credit the source of copyrighted materials used in your academic coursework. T/F?

False

When your print quota is exhausted, you may no longer utilize Campus Printing for the remainder of the semester. T/F?

False

You can release a print job to another user in order to share the cost of printing.

False

How long can files be stored in the SandBox on a computer lab computer?

Files are deleted upon logoff

Advanced search in the Library Catalog is the best way to do which of the following?

Find a specific item that you are looking for.

Which should you use to find peer-reviewed research papers matching your topic of interest?

Google Scholar

Who should you contact if you have questions on recovering from a malware infection?

Help Center

Which of the following accurately describes the university's system for determining fair use of public computers?

Impact-based

Which of the following best describes the university's system for determining fair use of bandwidth?

Impact-based

Which of the following best describes the university's system for determining fair use of computer lab peripherals (such as scanners) when no allotment is predetermined?

Impact-based

_____ expresses how much trust you can put in the accuracy and completeness of your resources and information.

Integrity

Where should you start looking to find out if the university has a certain book that you want? Group of answer choices

Library Catalog

The Baker Hall 140 teaching computer lab machines do not run the _____ operating system.

Linux

_________, or thinking about thinking, is your awareness of yourself as a learner and your ability to regulate your own learning.

Metacognition

In order to avoid an academic integrity violation you should follow which of these tips? Work on your assignment until the last possible minute Y/N? When in doubt, cite your sources Y/N? Review the course syllabus for expectations Y/N? Be hopeful that what you're doing is correct Y/N?

No, yes, yes, no

_______________ represents the different ways the issue under investigation can be viewed, and which of these ways best characterizes the resource.

Point of view

Your Campus Printing quota is consumed by which of the following?

Print jobs released from a printer.

Which of the following can you NOT do in My Library Account?

Purchase items

Which of the following is permitted under the Computing Policy without explicit permission?

Purchasing and downloading a copy of the movie "Wall Street" via iTunes.

Which of the following best describes the university's system for determining fair use of file storage spaces?

Quota-based

____________ represents how completely and specifically the information meets the need of the assigned task.

Relevance

Under the provisions of the Digital Millennium Copyright Act (DMCA), Carnegie Mellon is obligated to: Group of answer choices

Respond to any complaints of copyright infringement by stopping the alleged violation from continuing.

Which of the following responsibilities governs your use of limited scanners in the computer labs?

Responsible Sharing of Resources

Which file storage option can only be accessed from a computer lab computer?

SandBox

Which tool would not let you access your saved files from your residence hall?

SandBox

What is the university's recommendation for updating antivirus software on your computer?

Schedule daily updates to acquire newly released virus definitions.

General databases are best for searching: Group of answer choices

Scholarly journals on specific topics in a discipline.

Specialized databases are best for searching:

Scholarly journals on specific topics in a discipline.

Match the following descriptions with the correct software: list of software available in the Windows or Mac computer labs [ Choose ] remote access to a Windows computer lab [ Choose ] library of educational resource videos [ Choose ]

Software Catalog, Virtual Andrew, LinkedIn Learning

When the university receives a Digital Millennium Copyright Act (DMCA) Takedown Notice, it is obligated to:

Stop the distribution of the infringing material.

Which of the following is a good practice for preventing the CIA of your information from being compromised?

Storing your passwords on your personal computer in an encrypted text file.

Which of the following are indicators that a URL may be malicious?

The URL includes a series of numbers after http://.

Why would an attack that infects your computer result in your computer's suspension from the network?

To prevent the same infection from spreading over the network to other computers.

Failing to differentiate your ideas from the ideas put forth by another author constitutes plagiarism. T/F?

True

If your Andrew ID and password are compromised, the information and resources of the broader campus community are at risk as well. T/F?

True

In order to use the databases that Carnegie Mellon subscribes to, you have to be a CMU student, staff, or faculty member. T/F?

True

Legitimate, non-infringing uses exist for peer-to-peer file-sharing software such as BitTorrent. T/F?

True

Print jobs sent to the Andrew B&W printing queue can be released to multiple locations around campus. T/F?

True

Single and double sided printouts cost the same amount.

True

The library catalog's Advanced Search feature can be used to find feature films in addition to documentary films and other informational videos. T/F?

True

The more bandwidth one person consumes, the less that is available for other users. T/F?

True

Wikipedia can be a good starting point for a research project.

True

With your Andrew ID and password, a user can block you from accessing university services like your course schedule in SIO. T/F?

True

You can configure your personal computer to print to the Andrew Printing service. T/F?

True

Your access to the university's computing resources is contingent upon your appropriate use of such resources. T/F?

True

Your print jobs will not be printed until you physically visit a print station and release them.

True

Which of the following is NOT a responsibility established by the university's Computing Policy?

Use computing resources only for academic coursework.

Which of the following statements best describes the anonymity of P2P usage? Group of answer choices

Users of P2P applications are not anonymous, whether uploading or downloading.

Which of the following criteria is least important for use in evaluating whether a source is appropriate for use in a research project?

Whether the information supports your hypothesis.

Are you responsible for keeping your computer's operating system up to date? Y/N?

Yes

Can you get a borrower's card to check out books at local, non-CMU libraries?

Yes

Does university policy create an obligation for students to obey copyright law?

Yes, the Copyright Policy establishes the expectation of legal compliance.

As a student at CMU, your access to computing resources: Group of answer choices

is contingent upon responsible use

Box Edit allows users the ability to:

modify files without downloading the file to your computer first

C@CM is _______ for all degree-seeking undergraduate students. If you do not pass on this attempt, you will ___________________.

required, retake the course until you earn a passing grade

An authentic security alert will include a URL to where the security alert is posted on

the Computing Services website

Which of the following URLs is malicious?

www.cmu.edu/scripts/..%5c/Windows/System32/cmd.exe?/c+dir+c:

What is a database?

A collection of information selected and organized to be searched for quick retrieval.

In the library catalog, what are facets?

A feature that allows you to narrow down your topic as you search for materials.

Which of the options below is the best way of describing the concept of copyright?

A series of rights granted to the author of an original work.

You must score at least ____ to pass this course.

75%

Which of the following best summarizes CMU's Computing Policy?

The Computing Policy is a community standard that establishes your responsibility to behave as a mature, reasonable and ethical person.

Why should you read the abstract of a scholarly article found on a database before reading the article itself?

The abstract provides you with a brief summary of the article so that you can determine whether it is relevant to you.

Which of the following is most true?

The time frame during which information remains current varies depending on the discipline.

You should file a report with the local police if you are the victim of identity theft. T/F?

True

Order the steps of the metacognitive cycle.

1.Assessing the task 2.Evaluationg your strength 3.Planning an approach 4.Applying Strategies 5.Reflecting and adjusting

What is the immediate consequence imposed by the university on targets of Digital Millennium Copyright Act (DMCA) Takedown Notices?

72 hours for the student to resolve the issue with Student Life Office or face a general network suspension

Which grading standard does C@CM use?

Pass/Fail

The author's credentials are most useful for establishing which of the following evaluation criteria?

Authority

_______________________ represents whether the information is provided by trustworthy sources.

Authority

Maintaining the _____ of a resource means that authorized users are able to reliably get to the specific machine or information when needed.

Availability

The _____ of a resource refers to how timely and reliable access to that resource is. Group of answer choices

Availability

One of the clues that an email is NOT a phishing scam is that the email

None of the above.

PII is short for ___________

Personally Identifiable Information

According to the university's Computing Policy, which of the following responsibilities govern your use of the limited scanners in the computer labs?

Responsible Sharing of Resources

Read the following passages. The first is from John Hooker's Working Across Cultures. The second is from a student paper that draws on Hooker's work. Compare the original and the student version, and decide if this is an example of plagiarism or legitimate paraphrasing. Original version: "Space and time are objective properties of the physical world that have nothing much to do with culture. At any rate, this is the Western view. It is mistaken, and its mistake helps to teach a central lesson of this book: assumptions that seem obvious and inevitable, in this case assumptions about the nature of time and space, need not hold across cultures." [John Hooker. Working Across Cultures. Stanford, CA: Stanford University Press. 2003] Student version: "Culture shapes many aspects of human experience that we might think transcend culture. For example, as Hooker points out, even time and space, which seem to operate outside of culture, can vary profoundly from place to place (Hooker, 2003)."

This is a legitimate paraphrase; the student has put the author's ideas into her own words while also giving the author credit.

A good security practice is to avoid using a public wireless network when handling sensitive data. T/F?

True

An Advanced Search of the Library Catalog allows you to limit by item type (book, map, musical score, etc.).

True

Asking a Sophomore for copies of the ERQs from last semester to help you study for the Final Exam constitutes an academic integrity violation. T/F?

True

Citations show the reader where you got your information. T/F?

True

Collaboration is permitted on the learning activities (Learn by Doing and Did I Get This problem sets contained within the readings in OLI). T/F

True

Every computer lab computer is labeled with its name and IP address, and you should include this information when reporting problems.

True

Fraudulent emails often include an offer of money, prizes, or discounts. T/F?

True

If someone were to gain access to your Andrew ID and password, they could compromise your PII.

True

If you do not resolve a Digital Millennium Copyright Act (DMCA) infraction within 72 hours, your computer will be suspended from the network. T/F?

True

If you edit a file in Google Drive and Box, you can access a version history that contains previous variations of the file.

True

If you fall victim to a phishing scam, your computing resources could be compromised and used for malicious activity. T/F?

True

If you paraphrase another author's ideas, you should cite your source. T/F?

True

If you suspect that your computer has been compromised, you should change your password immediately. T/F?

True

Like any computer, you should regularly update the operating system on your mobile devices. T/F?

True

Malware is a general term for malicious software that includes computer viruses, worms, and Trojan Horses. T/F?

True

Providing the location of a resource and a detailed description of the problem is a good practice when reporting issues to the Help Center. T/F?

True

Some academic software is only available in a computer lab and cannot be used via Virtual Andrew. T/F?

True

Some file-sharing programs can consume bandwidth even when you are not actively downloading files. T/F?

True

Tablets should be secured like any other computing device. T/F?

True

Tabloid printing is available on all of the Andrew Printing queues.

True

The university library's Chat/IM service provides real-time answers to questions during business hours. T/F?

True

Theft of PII may lead to identity theft. T/F?

True

There is a scanner in the West Wing collaborative computer lab. T/F?

True

There is a time limit on how long you can use a Web station. T/F?

True

You can fail a course if you plagiarize a source on an assignment. T/F?

True

You can only use a Web station for 15 minutes. T/F?

True

You can print letter- and tabloid-sized documents with Andrew Printing. T/F?

True

You can print to the Andrew Printing service through Virtual Andrew. T/F?

True

You can use Virtual Andrew to access licensed software from your own computer or mobile device. T/F?

True

You should contact [email protected] to get help and report problems with computing resources. T/F?

True

You should disable WiFi when you're not using it to mitigate the risk of unauthorized access to your device. T/F?

True

The Software Catalog allows you to search for software available: Group of answer choices for download in a Mac lab Y/N in a Windows lab Y/N in a Linux lab Y/N in Virtual Andrew Y/N on LinkedIn Learning Y/N on a mobile device Y/N

Y, Y, Y, Y, Y, N, Y

Are you responsible for keeping your software up to date? Y/N?

Yes

Is keeping your password written next to your computer a risky behavior that could lead to computer or account compromise? Y/N?

Yes

Is logging your friend into a computer lab computer with your Andrew ID and password a risky behavior that could lead to computer or account compromise? Y/N?

Yes

Is sharing your password with friends a risky behavior that could lead to a computer or account compromise? Y/N?

Yes

You're assigned to write an essay about how current weather patterns are effected by the climate change. You find several articles on the Web and you are thinking about which ones are appropriate to use. Consider the article How Not to Deal With Climate ChangeLinks to an external site.. Even though you would typically analyze the criteria as a group, for this question analyze each criteria separately and answer the questions below. 1. Does this article cover different perspectives? 2. Is the article relevant to your essay? 3. Is the content in the article up to date? 4. Is the article authoritative for the type of content communicated?

Yes, Yes, No, No, since the article doesn't list where it's from it cannot be authoritative

Will installing and running antivirus software alone protect your computer from compromise?

Yes, updated antivirus software is enough to protect your computer as long as you scan your computer for malware at least once a week.

Web stations and computer labs have ["a different", "the same"] complement of software applications.

a different

One advantage of accessing articles through the university's library catalog rather than an outside resource is _____.

any article available will be scholarly-based

When receiving an email attachment with a file ending with .exe, you should

avoid opening the attachment as it may contain malware.

A(n) _____ is a written reference to a specific work, with details such as author(s), date of publication, title and page numbers.

citation

The Digital Millennium Copyright Act (DMCA) _____.

provides rules for online service providers that can limit their liability for copyright violations

Peer-to-peer (P2P) applications _____.

facilitate the distribution of files over networks

If you add more terms to your search query for a library database, you will get [ Select ] ["fewer", "more"] results.

fewer

The term _____ refers to a complete document (i.e. article, report, etc.) that is available electronically for you to access immediately, either as a PDF or HTML file.

full-text


Ensembles d'études connexes

Alternative Life Insurance Polices

View Set

Exam 2: lecture and HW questions, chp 7-11

View Set

HA exam 4 chapter 14, skin hair and nails

View Set

Lewis 10th Chapter 19 Postoperative Care Evolve NCLEX practice

View Set

AANT233 Test 3 Quizlet (Final) Incas

View Set

module seven - cell division: biology 1308 (textbook)

View Set

Chapter 23 - Gynecologic Emergencies - Quiz Questions

View Set

Chapter 3. Understanding the Organization's Environment

View Set