CGS2060 - Protecting Yourself on the Internet

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A study conducted by the National University of Singapore, found that consumers worldwide spend ____ per year downloading pirated software.

$25 Billion

Put the following elements in the proper order in which they appear in an email:

-#1: salutation -#2: body -#3: complimentary close -#4: signature line

Match the e-commerce transaction type

-A consumer makes a purchase from overstock.com : B2C -A consumer makes arrangements to buy used snowboard equipment with another consumer on craigslist: C2C -Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the internet: B2B

What is true about AUP

-AUP covers a broad spectrum of computer recourses -An AUP often accompanies most software applications -a well-written AUP should clearly state what a user is not allowed to do with these resources as well as general etiquette to follow when using shared resources

According to the FTC, a few US internet privacy laws/rules of importance are

-COPPA -the Red Flags Rule

The TPP was negotiated by 12 countries including

-Canada -The US -Brunei

Match the number to the statement about debit card fraud

-If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of: $50 -Wait more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of: $500 -After you tell your financial institution about the fraud charges it has ___ business days to investigate: 10 days. -If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business days: 1

Select what is true about BitTorrent

-Movie steaming and Torrent sites account for more than half of all internet traffic -BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files

The titles in the DMCA that directly impact digital copyright issues are:

-Title 2- online copyright infringement liability limitation -Title 3- computer maintenance competition assurance -Title 1- WIPO copyright and phonograms treaties and implementation act

What is true about RFID

-can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -RFID does not require line-of-sight scanning

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

-computers -networks -websites

Which of the statements are true about ergonomics?

-derived from the Greek words ergon (work) and nomoi (natural laws) -a very important element of an effective workplace safety plan -the study of human interaction with the objects they use

What is true about best practices for the use of an employee-monitoring program.

-preventing employee access to time-wasting or inappropriate sites can help stop trouble before it begins -be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it

Internet privacy is a wide ranging term that refers to a variety of considerations including...

-tech used to protect sensitive and private data, communications and preferences -who has access to date and information -how data and information is used

Which are considered Intellectual property?

-trade secrets -trademarks -patents

A digital identity is composed of a variety of digital attributes including:

-usernames and passwords -personal data such as your social security number and birth dates -online search activities

Which of the following are examples of EFT transactions?

-using your debit card to purchase gas -ATM withdrawal of cash to use to buy concert tickets -direct deposit of your paycheck

The TPP covers just ___ percent of global GDP.

40

BSA- The Software alliance is headquarters in Washington DC, and operates in more than _____ countries

60

The TPP also stipulates the length of copyright terms. In the US, perpetual copyrights and patents are prohibited, but extensions to copyrights are allowed. Under the TPP copyrighted works will pass into the public domain ____ years after the death of the creator, extending the term for some countries such as New Zealand by a further 20 years.

70

A leading advocate against software piracy for the global software industry is _____ -The Software Alliance.

BSA

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

The TTP stands for

Trans-Pacific Partnership

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ____ use policy.

acceptable

A form of projection provided by the laws of the US for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural and audiovisual creations is called a _____.

copyright

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is ____ Commons

creative

The technology that allows or the electronic communication of business-oriented transactions and information between people and organizations is called electronic _____ interchange.

data

A digital presence created online by an individual, organization using a digital device is called a _____ identity.

digital

Signed into law by President Clinton in 1998, the _____ Millennium Copyright Act implements two World Intellectual Property Organization (WIPO) treaties.

digital

Transferring a file from the internet to your digital devices is called ____.

downloading

International laws on internet police are very similar.

false

The technology that uses electromagnetic electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals and people is called radio _____ identification.

frequencies

Human knowledge and ideas that laws protect against unauthorized use by others is considered _____ property

intellectual

Employee-____ software is designed to track and record the use of network and hardware resources in the workplace by employees

monitoring

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ____ has occurred

piracy

Two of the main concerns that surrounds digital identity are privacy and _____.

security

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, this is called:

software privacy

A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the internet is Bit____.

torrent

The main governmental organization that oversees internet privacy in the Us is the Federal _____ commission

trade

A transceiver can both send and receive information.

true

Passports issued by the US and many other countries include RFID chips

true

A key component in an employee-monitoring program is the utilization of ____ and internet filters.

web


संबंधित स्टडी सेट्स

Psychiatric/Mental Health Review

View Set