c@cm Every Quiz Question
You should plan to spend __ hours per week in order to get the most out of the course.
6
What is Google Scholar?
A Google database for finding scholarly articles sometimes linking to full text.
What is phishing?
A method used by cyber-criminals to lure you into providing sensitive information.
What is a catalog?
A special kind of database that tells you what is in a particular library collection.
Which of the following cannot be found in the library catalog?
Blogs
What steps should you take if you've fallen victim to a phishing attempt and provided the password for your email account?
Change the password for the email account that received the phishing email, Change the passwords for your other accounts if they share the same password as the account that received the phishing email.
All Andrew Printing queues represent a single printer.
False
Giving another author credit while incorporating his or her ideas into your argument constitutes plagiarism. T/F?
False
If you give a collaborator specific permission access to a folder in Box, they have the same permission level for every file inside of that folder. T/F?
False
Maintaining the _____ of information means ensuring that the data has not been changed inappropriately.
Integrity
Select the types of materials that are listed in a Books & More search.
Journal articles
Where should you look to find out if CMU has access to The New Yorker online?
Journals Search
Match these important course events with their corresponding deadline. Deadline to start your coursework ---- Deadline to finish your coursework ---- Deadline to take the Final Exam ----
July 18th, August 8th, August 12th
Where on the library website would you go when you want to see the items you have checked out?
My Library Account
Is keeping your computer's software up to date a risky behavior?
No
Which of the following types of information are commonly targeted by cyber criminals?
PII, Social Security numbers, User IDs and passwords
Which of the following is an example of inappropriate behavior as defined by the Computing Policy?
Sharing my Andrew password with my roommate.
Theresa needs a microphone and audio recorder for an assignment. Where can she get this equipment?
Technology Lending
Which of the following is an indicator that data is being transmitted securely on a website?
The URL begins with https://
How can you access course reserves?
The library homepage
Portable devices like cell phones or tablets can be compromised by a malicious attack. T/F?
True
The amount of storage space allocated to CMU students in Google Drive is:
Unlimited
When should you consider using Interlibrary Loan?
When Carnegie Mellon doesn't own a copy of a book you want to read.
Which resource would you use to quickly locate background information on Bill Gates?
Wikipedia
Steven is taking 73-100 this semester, and gets copies of his roommate's graded homework assignments who took the course last year to make sure he has the correct answers. Is this cheating?
Yes
Your Campus Printing quota resets _____.
each semester
Which department houses the Computer Lab and Printer Locations map?
Computing Services
Maintaining the [ Select ] ["Confidentiality", "Integrity", "Availability"] of information means ensuring that the data has not been changed inappropriately, whether these changes are accidental and innocent or are intentional and malicious.
Confidentiality
Which action will NOT protect your computer from a malware infection?
Don't use the Windows operating system.
Is using the same password on a social networking site as you do for your Andrew account a risky behavior that could lead to computer or account compromise? Y/N?
Yes
Which of the following strategies for getting access to a journal article might cost you money?
Accessing the article off-campus through the publisher's website.
If you use faceted search to find recent studies on climate change, which of these facets is least relevant for your search? Group of answer choices
Author
The abstract provides you with a brief summary of the article so that you can determine whether it is relevant to you.
An article from an academic journal.
What is the "public domain"?
An intellectual property designation for content that is not controlled or owned by anyone and which is available for anyone to freely use for any purpose.
Which file storage option allows the most control over who can view, edit and access files? Group of answer choices
Box
Where can you save a file so that it is accessible from any computer with an Internet connection?
Box or Google Drive
_____ is about ensuring that only authorized users have access to information and resources.
Confidentiality
Which of the following options is NOT a possible penalty for violating the university's Computing Policy?
Confiscation of personal computing equipment
Where should you go for help if your computer is infected?
Contact the Help Center.
Why does a phishing email try to trick you into divulging your account ID and password?
Cyber-criminals seek your account ID and password in order to gain access to your financial information.
Where is the best place to browse for databases related to political science?
Databases by Subject
Of the following, which is the best choice for finding public opinion related to your topic of interest?
Discussion forums and blogs
CMU prevents you from accessing malicious websites. T/F?
False
Computing Services controls the configuration of all computers connected to the campus network. T/F?
False
Computing Services relies solely upon end users to combat malicious attacks on the university network and does not directly intervene to combat threats to the network. T/F?
False
The Andrew B&W printing queue can be used for all of your print jobs, including those that require special features (such as color or tabloid). T/F?
False
The unused portion of your Andrew Printing quota rolls over to the next semester.
False
There are no differences between the public computer lab computers and the Web stations. T/F?
False
There is a time limit on how long you can use a computer lab computer. T/F?
False
There's no threat to your information so long as you don't share your Andrew ID and password with anyone. T/F?
False
You must score 100% on the Pre-Assessment before you can proceed with the unit. T/F
False
You should be cautious of emails from a company if the greeting is generic. T/F?
False
You should rely on logos or addresses to verify the authenticity of an email. T/F?
False
Suppose you need a book as soon as possible, but it's not available at Carnegie Mellon. Which would be your best option?
Go to the University of Pittsburgh and check out the book.
Your professor included 'course reserves' in the class syllabus. What can you find in the course reserves?
Items for a class that all students need access to
What information do you need to have in order to find out whether Carnegie Mellon has access to a journal online?
Journal title
Based only on the citations, which of the following would you consider most authoritative?
Lu, Jian; Vecchi, Gabriel A.; Reichler, Thomas (2007). Expansion of the Hadley cell under global warming. Geophysical Research Letters 34.
A(n) _____ refers to a brief summary of an article.
abstract
Information found in a(n) _____ is carefully selected through a review process.
academic database
Information found in a(n) _____ requires authentication to access.
academic database
How much quota are you allocated for Andrew Printing?
$40.00
What features should you consider when selecting a file storage option? (Select all that apply.)
Accessibility Available quota Secure authentication Sharing ability Backup schedule
Which of the following is not an example of inappropriate behavior as defined by the Computing Policy?
Adding a nickname to your email signature.
What are the ways you can get support from CMU's library website?
All of the listed features are available.
Which of the following is an advantage of a Google web search?
Browsing capabilities and getting background information and summaries.
What should you do if you receive a phishing email?
Call the Help Center.
Which permission gives the least amount of access when you share a file using Google Drive?
Can View
How do you access the C@CM course materials?
Canvas
_______________________ represents whether the information presented in the resource might be outdated based on the publication date and what you know about the publication process.
Currency
Where is the best place to browse for databases related to philosophy?
Databases by Subject
PII includes your name in conjunction with which of the following?
Driver's license number, Social Security number, Credit card number.
Access to your Andrew account and password will not compromise your PII. T/F?
False
Assignments submitted after the due dates listed on the syllabus will not be accepted. T/F
False
Only critical issues that prevent you from completing your academic coursework should be reported to the Help Center. T/F?
False
The Andrew B&W printing queue can be used for all of your print jobs, including those that require special features (such as color or tabloid).
False
The Final Exam is only available the week of August 9th. T/F
False
Under the Fair Use Policy, you do not need to credit the source of copyrighted materials used in your academic coursework. T/F?
False
When your print quota is exhausted, you may no longer utilize Campus Printing for the remainder of the semester. T/F?
False
You can release a print job to another user in order to share the cost of printing.
False
How long can files be stored in the SandBox on a computer lab computer?
Files are deleted upon logoff
Advanced search in the Library Catalog is the best way to do which of the following?
Find a specific item that you are looking for.
Which should you use to find peer-reviewed research papers matching your topic of interest?
Google Scholar
Who should you contact if you have questions on recovering from a malware infection?
Help Center
Which of the following accurately describes the university's system for determining fair use of public computers?
Impact-based
Which of the following best describes the university's system for determining fair use of bandwidth?
Impact-based
Which of the following best describes the university's system for determining fair use of computer lab peripherals (such as scanners) when no allotment is predetermined?
Impact-based
_____ expresses how much trust you can put in the accuracy and completeness of your resources and information.
Integrity
Where should you start looking to find out if the university has a certain book that you want? Group of answer choices
Library Catalog
The Baker Hall 140 teaching computer lab machines do not run the _____ operating system.
Linux
_________, or thinking about thinking, is your awareness of yourself as a learner and your ability to regulate your own learning.
Metacognition
In order to avoid an academic integrity violation you should follow which of these tips? Work on your assignment until the last possible minute Y/N? When in doubt, cite your sources Y/N? Review the course syllabus for expectations Y/N? Be hopeful that what you're doing is correct Y/N?
No, yes, yes, no
_______________ represents the different ways the issue under investigation can be viewed, and which of these ways best characterizes the resource.
Point of view
Your Campus Printing quota is consumed by which of the following?
Print jobs released from a printer.
Which of the following can you NOT do in My Library Account?
Purchase items
Which of the following is permitted under the Computing Policy without explicit permission?
Purchasing and downloading a copy of the movie "Wall Street" via iTunes.
Which of the following best describes the university's system for determining fair use of file storage spaces?
Quota-based
____________ represents how completely and specifically the information meets the need of the assigned task.
Relevance
Under the provisions of the Digital Millennium Copyright Act (DMCA), Carnegie Mellon is obligated to: Group of answer choices
Respond to any complaints of copyright infringement by stopping the alleged violation from continuing.
Which of the following responsibilities governs your use of limited scanners in the computer labs?
Responsible Sharing of Resources
Which file storage option can only be accessed from a computer lab computer?
SandBox
Which tool would not let you access your saved files from your residence hall?
SandBox
What is the university's recommendation for updating antivirus software on your computer?
Schedule daily updates to acquire newly released virus definitions.
General databases are best for searching: Group of answer choices
Scholarly journals on specific topics in a discipline.
Specialized databases are best for searching:
Scholarly journals on specific topics in a discipline.
Match the following descriptions with the correct software: list of software available in the Windows or Mac computer labs [ Choose ] remote access to a Windows computer lab [ Choose ] library of educational resource videos [ Choose ]
Software Catalog, Virtual Andrew, LinkedIn Learning
When the university receives a Digital Millennium Copyright Act (DMCA) Takedown Notice, it is obligated to:
Stop the distribution of the infringing material.
Which of the following is a good practice for preventing the CIA of your information from being compromised?
Storing your passwords on your personal computer in an encrypted text file.
Which of the following are indicators that a URL may be malicious?
The URL includes a series of numbers after http://.
Why would an attack that infects your computer result in your computer's suspension from the network?
To prevent the same infection from spreading over the network to other computers.
Failing to differentiate your ideas from the ideas put forth by another author constitutes plagiarism. T/F?
True
If your Andrew ID and password are compromised, the information and resources of the broader campus community are at risk as well. T/F?
True
In order to use the databases that Carnegie Mellon subscribes to, you have to be a CMU student, staff, or faculty member. T/F?
True
Legitimate, non-infringing uses exist for peer-to-peer file-sharing software such as BitTorrent. T/F?
True
Print jobs sent to the Andrew B&W printing queue can be released to multiple locations around campus. T/F?
True
Single and double sided printouts cost the same amount.
True
The library catalog's Advanced Search feature can be used to find feature films in addition to documentary films and other informational videos. T/F?
True
The more bandwidth one person consumes, the less that is available for other users. T/F?
True
Wikipedia can be a good starting point for a research project.
True
With your Andrew ID and password, a user can block you from accessing university services like your course schedule in SIO. T/F?
True
You can configure your personal computer to print to the Andrew Printing service. T/F?
True
Your access to the university's computing resources is contingent upon your appropriate use of such resources. T/F?
True
Your print jobs will not be printed until you physically visit a print station and release them.
True
Which of the following is NOT a responsibility established by the university's Computing Policy?
Use computing resources only for academic coursework.
Which of the following statements best describes the anonymity of P2P usage? Group of answer choices
Users of P2P applications are not anonymous, whether uploading or downloading.
Which of the following criteria is least important for use in evaluating whether a source is appropriate for use in a research project?
Whether the information supports your hypothesis.
Are you responsible for keeping your computer's operating system up to date? Y/N?
Yes
Can you get a borrower's card to check out books at local, non-CMU libraries?
Yes
Does university policy create an obligation for students to obey copyright law?
Yes, the Copyright Policy establishes the expectation of legal compliance.
As a student at CMU, your access to computing resources: Group of answer choices
is contingent upon responsible use
Box Edit allows users the ability to:
modify files without downloading the file to your computer first
C@CM is _______ for all degree-seeking undergraduate students. If you do not pass on this attempt, you will ___________________.
required, retake the course until you earn a passing grade
An authentic security alert will include a URL to where the security alert is posted on
the Computing Services website
Which of the following URLs is malicious?
www.cmu.edu/scripts/..%5c/Windows/System32/cmd.exe?/c+dir+c:
What is a database?
A collection of information selected and organized to be searched for quick retrieval.
In the library catalog, what are facets?
A feature that allows you to narrow down your topic as you search for materials.
Which of the options below is the best way of describing the concept of copyright?
A series of rights granted to the author of an original work.
You must score at least ____ to pass this course.
75%
Which of the following best summarizes CMU's Computing Policy?
The Computing Policy is a community standard that establishes your responsibility to behave as a mature, reasonable and ethical person.
Why should you read the abstract of a scholarly article found on a database before reading the article itself?
The abstract provides you with a brief summary of the article so that you can determine whether it is relevant to you.
Which of the following is most true?
The time frame during which information remains current varies depending on the discipline.
You should file a report with the local police if you are the victim of identity theft. T/F?
True
Order the steps of the metacognitive cycle.
1.Assessing the task 2.Evaluationg your strength 3.Planning an approach 4.Applying Strategies 5.Reflecting and adjusting
What is the immediate consequence imposed by the university on targets of Digital Millennium Copyright Act (DMCA) Takedown Notices?
72 hours for the student to resolve the issue with Student Life Office or face a general network suspension
Which grading standard does C@CM use?
Pass/Fail
The author's credentials are most useful for establishing which of the following evaluation criteria?
Authority
_______________________ represents whether the information is provided by trustworthy sources.
Authority
Maintaining the _____ of a resource means that authorized users are able to reliably get to the specific machine or information when needed.
Availability
The _____ of a resource refers to how timely and reliable access to that resource is. Group of answer choices
Availability
One of the clues that an email is NOT a phishing scam is that the email
None of the above.
PII is short for ___________
Personally Identifiable Information
According to the university's Computing Policy, which of the following responsibilities govern your use of the limited scanners in the computer labs?
Responsible Sharing of Resources
Read the following passages. The first is from John Hooker's Working Across Cultures. The second is from a student paper that draws on Hooker's work. Compare the original and the student version, and decide if this is an example of plagiarism or legitimate paraphrasing. Original version: "Space and time are objective properties of the physical world that have nothing much to do with culture. At any rate, this is the Western view. It is mistaken, and its mistake helps to teach a central lesson of this book: assumptions that seem obvious and inevitable, in this case assumptions about the nature of time and space, need not hold across cultures." [John Hooker. Working Across Cultures. Stanford, CA: Stanford University Press. 2003] Student version: "Culture shapes many aspects of human experience that we might think transcend culture. For example, as Hooker points out, even time and space, which seem to operate outside of culture, can vary profoundly from place to place (Hooker, 2003)."
This is a legitimate paraphrase; the student has put the author's ideas into her own words while also giving the author credit.
A good security practice is to avoid using a public wireless network when handling sensitive data. T/F?
True
An Advanced Search of the Library Catalog allows you to limit by item type (book, map, musical score, etc.).
True
Asking a Sophomore for copies of the ERQs from last semester to help you study for the Final Exam constitutes an academic integrity violation. T/F?
True
Citations show the reader where you got your information. T/F?
True
Collaboration is permitted on the learning activities (Learn by Doing and Did I Get This problem sets contained within the readings in OLI). T/F
True
Every computer lab computer is labeled with its name and IP address, and you should include this information when reporting problems.
True
Fraudulent emails often include an offer of money, prizes, or discounts. T/F?
True
If someone were to gain access to your Andrew ID and password, they could compromise your PII.
True
If you do not resolve a Digital Millennium Copyright Act (DMCA) infraction within 72 hours, your computer will be suspended from the network. T/F?
True
If you edit a file in Google Drive and Box, you can access a version history that contains previous variations of the file.
True
If you fall victim to a phishing scam, your computing resources could be compromised and used for malicious activity. T/F?
True
If you paraphrase another author's ideas, you should cite your source. T/F?
True
If you suspect that your computer has been compromised, you should change your password immediately. T/F?
True
Like any computer, you should regularly update the operating system on your mobile devices. T/F?
True
Malware is a general term for malicious software that includes computer viruses, worms, and Trojan Horses. T/F?
True
Providing the location of a resource and a detailed description of the problem is a good practice when reporting issues to the Help Center. T/F?
True
Some academic software is only available in a computer lab and cannot be used via Virtual Andrew. T/F?
True
Some file-sharing programs can consume bandwidth even when you are not actively downloading files. T/F?
True
Tablets should be secured like any other computing device. T/F?
True
Tabloid printing is available on all of the Andrew Printing queues.
True
The university library's Chat/IM service provides real-time answers to questions during business hours. T/F?
True
Theft of PII may lead to identity theft. T/F?
True
There is a scanner in the West Wing collaborative computer lab. T/F?
True
There is a time limit on how long you can use a Web station. T/F?
True
You can fail a course if you plagiarize a source on an assignment. T/F?
True
You can only use a Web station for 15 minutes. T/F?
True
You can print letter- and tabloid-sized documents with Andrew Printing. T/F?
True
You can print to the Andrew Printing service through Virtual Andrew. T/F?
True
You can use Virtual Andrew to access licensed software from your own computer or mobile device. T/F?
True
You should contact [email protected] to get help and report problems with computing resources. T/F?
True
You should disable WiFi when you're not using it to mitigate the risk of unauthorized access to your device. T/F?
True
The Software Catalog allows you to search for software available: Group of answer choices for download in a Mac lab Y/N in a Windows lab Y/N in a Linux lab Y/N in Virtual Andrew Y/N on LinkedIn Learning Y/N on a mobile device Y/N
Y, Y, Y, Y, Y, N, Y
Are you responsible for keeping your software up to date? Y/N?
Yes
Is keeping your password written next to your computer a risky behavior that could lead to computer or account compromise? Y/N?
Yes
Is logging your friend into a computer lab computer with your Andrew ID and password a risky behavior that could lead to computer or account compromise? Y/N?
Yes
Is sharing your password with friends a risky behavior that could lead to a computer or account compromise? Y/N?
Yes
You're assigned to write an essay about how current weather patterns are effected by the climate change. You find several articles on the Web and you are thinking about which ones are appropriate to use. Consider the article How Not to Deal With Climate ChangeLinks to an external site.. Even though you would typically analyze the criteria as a group, for this question analyze each criteria separately and answer the questions below. 1. Does this article cover different perspectives? 2. Is the article relevant to your essay? 3. Is the content in the article up to date? 4. Is the article authoritative for the type of content communicated?
Yes, Yes, No, No, since the article doesn't list where it's from it cannot be authoritative
Will installing and running antivirus software alone protect your computer from compromise?
Yes, updated antivirus software is enough to protect your computer as long as you scan your computer for malware at least once a week.
Web stations and computer labs have ["a different", "the same"] complement of software applications.
a different
One advantage of accessing articles through the university's library catalog rather than an outside resource is _____.
any article available will be scholarly-based
When receiving an email attachment with a file ending with .exe, you should
avoid opening the attachment as it may contain malware.
A(n) _____ is a written reference to a specific work, with details such as author(s), date of publication, title and page numbers.
citation
The Digital Millennium Copyright Act (DMCA) _____.
provides rules for online service providers that can limit their liability for copyright violations
Peer-to-peer (P2P) applications _____.
facilitate the distribution of files over networks
If you add more terms to your search query for a library database, you will get [ Select ] ["fewer", "more"] results.
fewer
The term _____ refers to a complete document (i.e. article, report, etc.) that is available electronically for you to access immediately, either as a PDF or HTML file.
full-text