Social Media & Your Digital Identity

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____.

$50

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

$50

Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____.

$500

If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.

1

After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.

10

BSA-The Software alliance is headquartered in Washington, DC and operates in more than _____ countries.

60

B2C

A consumer makes a purchase from Overstock.com.

C2C

A consumer makes arrangements to buy used snowboard equipment from another consumer on Craigslist.com.

Which of the following statements are true about Instagram?

According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. Instagram is a subsidiary of (is owned by) Facebook.

B2B

Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet.

You should use LinkedIn to connect with other professionals including:

All of the above

Which of the following statements are true about acceptable use policy (AUP)?

An AUP often accompanies most software applications AUP covers a broad spectrum of computer resources A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources

One category of E-commerce includes ________.

B2B (business-to-business)

Which of the following are considered e-commerce transactions?

B2B, B2C, C2C

Which of the following have been cited as social risks associated with playing computer games online?

Computer/game addiction Virtual mugging, cyber prostitution, and protection schemes Identity theft

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.

Creative

Which of the following Facebook statements are true?

Cyberstalking and online predators are a real problem on Facebook.

Which of the following statements are true about ergonomics?

Derived from the Greek words ergon (work) and nomoi (natural laws). A very important element of an effective workplace safety plan. The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations.

Signed into law by President Clinton in 1998, The ______ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

EDI

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

While Instagram, Snapchat, and Twitter have grown rapidly, the most widely used social media site is

Facebook

International laws on Internet privacy are very similar.

False

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

False

Snaps are temporary and cannot be saved and forwarded to others.

False

Which is not considered an e-commerce transaction?

G2B

The DMCA protects ___ from liability for copyright violations of its users.

ISPs

Social risk

Identity theft Computer/game addiction Virtual mugging, cyber prostitution, and protection schemes

Software theft occurs when someone engages in which three of the following?

Illegally copying a program (called piracy) Stealing software programs Illegally activating or registering a program

Social media integrates a variety of multimedia including which three of the following?

Images Messages Video

The following are all true for Instagram except

Instagram charges a fee to download the app.

All of the following statements about Instagram are true except

Instagram is difficult to integrate with apps like Facebook and Foursquare.

________ property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.

Intellectual

Viber is a messaging app similar to WhatsApp, but focuses on ________.

Internet phone calling

Which of the following statements are true about best practices when using LinkedIn?

It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page. Use up-to-date information and images on LinkedIn.

Which of the following statements are true about LinkedIn?

LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities. LinkedIn should be used as an integrated component of creating your professional brand identity.

Which two of the following statements are true about BitTorrent?

Movie streaming and Torrent sites account for more than half of all Internet traffic. BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files.

Digital Identity

Online search activities Purchasing behavior Social media postings

A popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _____.

PayPal

Genealogical DNA testing allows users to check their genetic backgrounds. Which of the following two are disadvantages associated with this testing?

Potential that your personal DNA data may be misused. There is the potential for insurance companies to one day use this information to your disadvantage.

Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following?

Procedures, Processes, Systems

Which of the following are associated with Facebook?

Profiles Pages Likes

Select the characteristics of PayPal.

Provides buyer protection against fraud Free for the buyer to use

It is possible to limit the amount of time snaps can be viewed on ________.

Snapchat

The Federal ________ Commission is the main government organization that oversees Internet privacy.

Trade

The main governmental organization that oversees Internet privacy in the United States is the Federal ______ Commission.

Trade

Which of the following are considered Intellectual property?

Trade secrets, Trademarks, Patents

Technological risk

Viruses, worms, and malware Insecure or compromised game servers

Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

Internet privacy

Who has access to data and information How data and information is used Techniques and technologies used to protect sensitive data and information

What is a business' brand identity derived from?

Who they want to be Who they are Who people perceive them to be

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

all of the above

In business, ________ is the practice of creating a name, symbol/design (logo) that differentiates one product/service from other products/services.

branding

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to- ______ transaction.

consumer

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

copyright

Which of the following is not a category of Intellectual property?

copyrights

A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _____ Commons.

creative

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

data interchange

Transferring a file from the Internet to your digital device is called

downloading

Transferring a file from the Internet to your digital device is called _____.

downloading

E-commerce is short for ________.

electronic commerce

Derived from the Greek word ergon (work) and nomoi (natural laws), ______ is an important element of workplace safety.

ergonomics

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio _______ Identification.

frequency

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic _______ Transfer.

funds

All the following should be taken into account when using Twitter, except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

Human knowledge and ideas that the law protects against unauthorized use by others is considered ___________ property.

intellectual

International laws on _______ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

internet

Electronic etiquette is also known as ________.

netiquette

The standard code of respectful conduct governing the use of software and hardware for electronic communications is called electronic etiquette or ________.

netiquette

All of the following are protected by intellectual property laws against unauthorized use or distribution, except

open educational resources.

The BitTorrent protocol is often called peer-to- ____ file sharing.

peer

BitTorrent utilizes no central server, instead opting to utilize a ________ structure where each device connected to a network has equal access to the shared files.

peer-to-peer

Instagram is generally considered a ______ -sharing app although it can be used for sharing videos.

photo

When creating a social media brand identity, it is important to ________ regularly to your social media sites.

post

Along with the price, a major concern associated with genealogical DNA testing is

privacy

If you suspect you have received pirated software you can report the incident to the BSA at _____.

reporting.bsa.org

WhatsApp messenger is a cross-platform messaging app that allows you to ________ and receive messages without having to pay for SMS (text messaging).

send

The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.

separation

With over 6 billion image and video views per day ______ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

snapchat

The practice of using social media to expand the number of business and contacts people have is called ______ networking.

social

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

If someone illegally copies a program, then they have committed software

theft

Tweets can be made up of text, images, and video.

true

You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information.

true

Twitter is an information network made up of videos or character messages called __.

tweets

Personal branding can be done digitally and in more traditional ways, with all except

writing private journal entries.

Downloading content from the Internet poses risks. When downloading from the Internet, it is important to consider all of the following except

your antivirus software will always ensure your files are safe.


Ensembles d'études connexes

Gov 14 The Federal Budget and Social Security

View Set

Consumer Behavior Chapters 7-11 Test

View Set

Climate change and greenhouse gases

View Set

ch 10 Assessing and Responding to Fraud Risks

View Set