CIS-1A Module 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.

$25 Billion

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to __________.

$500

Match the number to the statement about debit card fraud. 1. $50 2. $500 3. 1 4. 10

1. $50 ⟶ If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____. 2. $500 ⟶ Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____. 3. 1 ⟶ If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days. 4. 10 ⟶ After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.

Match the e-commerce transaction type to the correct scenario. 1. B2C 2. B2B 3. C2C

1. B2B ⟶ Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet. 2. B2C ⟶ A consumer makes a purchase from Overstock.com 3. C2C ⟶ A consumer makes arrangements to buy used snowboard equipment with another consumer on Craigslist.

Tweets can be a maximum of __________ characters.

280

BSA-The Software alliance is headquartered in Washington, DC and operates in more than __________ countries.

60

Which of the following statements are true about Pinterest?

A. A pin is a visual bookmark. When you click a pin you are brought to the site/source that posted it B. Pins are grouped together by topic and organized onto pinboards

There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?

A. Accidentally downloading pornography that is labeled as a different file. B. Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement.

Which of the following are considered e-commerce transactions?

A. C2C B. B2C C. B2B

Which of the following statements are true regarding RFID?

A. Can be used to identify or track a variety of objects including poker chips, products, and even animals. B. RFID does not require line-of-sight scanning

Which of the following are examples of downloading a file?

A. Copying a driver from a company's website and saving it to your computer B. Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) C. Copying a photo from Facebook and saving it to your desktop

Which of the following should be considered when using Twitter?

A. If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter. B. Twitter accounts contain personal information C. Most of the communication taking place on Twitter is viewable by everyone

Which of the following statements are true about Instagram?

A. Instagram is a subsidiary of (is owned by) Facebook. B. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." C. It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android.

Which of the following statements are true about LinkedIn?

A. LinkedIn should be used as an integrated component of creating your professional brand identity. B. LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities.

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

A. Movies B. Video Games

Which of the following are associated with Facebook?

A. Pages B. Likes C. Profiles

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?

A. Pictures B. Music C. Literary works

Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following?

A. Procedures B. Processes C. Systems

Software theft occurs when someone engages in which three of the following?

A. Stealing software programs B. Illegally activating or registering a program C. Illegally copying a program (called piracy)

Internet privacy is a wide-ranging term that refers to a variety of considerations including which three of the following?

A. Techniques and technologies used to protect sensitive and private data, communications, and preferences B. How data and information is used C. Who has access to data and information

There are risks associated with downloading content from the Internet. Which of the following are important to consider when downloading from the Internet?

A. The source of the content. It is important to consider if the content came from a legitimate source. B. Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses. C. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer.

Genealogical DNA testing allows users to check their genetic backgrounds. Which of the following two are disadvantages associated with this testing?

A. There is the potential for insurance companies to one day use this information to your disadvantage. B. Potential that your personal DNA data may be misused.

Which of the following are parts of a radio frequency identification (RFID) system?

A. Transceiver B. Antenna C. Transponder

Which of the following statements are true about best practices when using LinkedIn?

A. Use up-to-date information and images on LinkedIn. B. It is important to use job/career-specific keywords in your profile. This will help to attract recruiters to your page.

Which of the following are examples of EFT transaction?

A. Using your debit card to purchase gas B. Direct deposit of your paycheck C. Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket

What is true about the Whats App? Select the following.

A. Whats App is a popular way to make phone calls and send text messages via mobile app. B. WhatsApp has over 2 billion users worldwide.

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

A. the Red Flags Rule B. COPPA

You should use LinkedIn to connect with other professionals including:

All of the Above

Which of the following are ethical concerns when using social media?

All of the above

A Radio frequency identification (RFID) systems consists of three components: "__________", transponder, and transceiver.

Antenna

A leading advocate against software piracy for the global software industry is "__________" The Software Alliance.

BSA

A popular peer-to-peer file sharing protocol that allows users to share software, movies, and other files is __________.

BitTorrent

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to-"__________" transaction

Consumer

A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _________ Commons.

Creative

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is __________ Commons.

Creative

The European Union's (EU) European Commission __________ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Data

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic "__________" change.

Data

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

Data Interchange

Signed into law by President Clinton in 1998, The "__________" Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Match the terms in Digital Identity and Internet Privacy.

Digital Identity: ⟶ Online search activities ⟶ Social media postings ⟶ Purchasing behavior Internet Privacy: ⟶ Techniques and technologies used to protect sensitive data and information ⟶ How data and information is used ⟶ Who has access to data and information

Transferring a file from the Internet to your digital device is called "__________".

Downloading

Transferring a file from the Internet to your digital device is called __________.

Downloading

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

EDI

The technical term for electronic or online banking. __________ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

Free openly licensed learning resources that are available online for instructors and students to use are called Open "_________" Resources.

Education

While Instagram, Snapchat, and Twitter have grown rapidly, the most widely used social media site is "__________".

Facebook

International laws on Internet privacy are very similar.

False

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

False

Snaps are temporary and cannot be saved and forwarded to others.

False

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio "__________" Identification.

Frequency

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic "__________" Transfer

Funds

The DMCA protects __________ from liability for copyright violations of its users

ISPs

Human knowledge and ideas that the law protects against unauthorized use by others is considered "__________" property.

Intellectual

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called __________ privacy.

Internet

International laws on "__________" privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

Internet, online, or digital

It is a good idea to edit or remove skills endorsements from your "__________" (professional social media site) account that do not accurately reflect your skill set or experience.

LinkedIn

Internet-based software applications and interfaces that let individuals, businesses, and other entities interact with each other are called social "__________".

Media

__________ are free openly licensed learning resources that are available online for instructors and students. There are a variety of these resources available including textbooks, assignments, games, and digital media.

OER

A popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is __________.

PayPal

Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is "__________"

PayPal

BitTorrent utilizes no central server, instead opt to utilize a __________ structure where each device connected to a network has equal access to the shared files.

Peer-to-Peer

Instagram is generally considered a "__________" sharing app.

Photo

If someone illegally copies a program, then they have committed software "__________".

Piracy

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software "__________" has occurred.

Piracy

Along with the price, a major concern associated with genealogical DNA testing is "__________".

Privacy

Using DNA ancestry testing services such as 23 and Me and Ancestry.com can open interesting avenues of discovery. One disadvantage to using these services is the potential loss of __________, as your personal DNA data will be loaded into a large database.

Privacy

Passports issued by the United States and many other countries include "__________" chips.

RFID

The six degrees of __________ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.

Separation

To adjust your privacy settings in Facebook, make sure you are logged in, then click on your "__________" to access the security settings.

Settings

The first social media site to allow users to create profiles, organize groups, and invite friends was called __________.

SixDegrees.com

In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection __________ or wallet.

Sleeve

With over 6 billion image and video views per day "__________" is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

Snapchat

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _________ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

State

The main governmental organization that oversees Internet privacy in the United States is the Federal "__________" commission.

Trade

A transceiver can both send and receive information.

True

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

True

Passports issued by the United States and many other countries include radio frequency identification (RFID) chips.

True

The BitTorrent protocol allows users to share large files over the Internet.

True

Tweets can be made up of text, images, and video.

True

Twitter is an information network made up of 280-character messages called "_________".

Tweets

WhatsApp users can create groups, and send __________ images, video, and audio messages for free.

Unlimited

Social media was made possible by __________ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet is called "__________" privacy

internet

Intellectual property __________ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

If you suspect you have received pirated software you can report the incident to the BSA at __________.

www.reporting.bsa.org


Ensembles d'études connexes

BIS 3233 Cybersecurity Study Questions With Accurate Answers 2023

View Set

Econ 251 (PNW) Chapter 3 Learnsmart

View Set

Saunders Therapeutic Communication Techniques

View Set

Definitions of Curriculum (EDFD 440)

View Set

Direct and Multichannel Marketing

View Set

Counseling Diverse Populations Unit 4

View Set

Haute Couture: History of Style and Fashion in Paris

View Set

Chapter 20: Viruses, Bacteria, and Archaea

View Set

Chem - Chapter 12 - Organic Chemistry 2 : Functional Groups

View Set