CGS2060 Protecting Yourself on the Internet Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

All of the following should be considered when using Twitter except - if a Twitter user has been blocked you can file a formal complaint through Twitter. - you can protect Tweets so that manual approval is required to view them. - Twitter accounts contain personal information. - most of the communication taking place on Twitter is viewable by everyone.

if a Twitter user has been blocked you can file a formal complaint through Twitter.

All of the following are part of an RFID system except _____. - transceiver - network - transponder - antenna

network

All of the following are protected against unauthorized use or distribution by intellectual property laws except - open educational resources - movies - video games - music

open educational resources

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files. - network - client/server - peer-to-peer - hierarchy

peer-to-peer

All of the following are best practices when using LinkedIn except - use up-to-date information and images on LinkedIn. - you can use LinkedIn to apply for jobs. - LinkedIn includes a resume tool, so you will have to create one and upload it to the site. - post vacation photos to show your friends where you've travelled.

post vacation photos to show your friends where you've travelled.

On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences. - profile - information - personality - username

profile

Two main factors concerning your digital identity are privacy and ___. - hardware - security - software - platform

security

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ . - writing private journal entries - social media - web presence - interpersonal skills

writing private journal entries

Twitter recommends using no more than ___ hashtags per Tweet. - 3 - 4 - 5 - 2

2

All of the following are considered e-commerce transactions except - B2C - C2C - G2B - B2B

G2B

Transferring a file from the Internet to your digital device is called _____. - downloading - uploading - storing - saving

downloading

Pictures or videos taken and shared on Snapchat are called _____. - Snoops - Pics - Snaps - Snips

Snaps

Software theft occurs when someone engages in all of the following except _______. - illegally copying a program - illegally registering a program - stealing software programs - erasing a program you purchased then sold to a friend

erasing a program you purchased then sold to a friend

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____. - web savvy - AUP - netiquette - ECC

netiquette

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links. - closeness - proximity - links - separation

separation

A businesses brand is derived from all of the following except ______ . - what their competition perceived them to be. - who they are. - what goals they want to accomplish. - who people people perceive them to be.

what goals they want to accomplish.

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons. - Creative - Productive - Innovative - Calculated

Creative

Which of the following statements about Facebook is true? - Cyberstalking and online predators are a real problem on Facebook. - Photo tagging doesn't create a link to your Facebook Timeline. - Potential employers are prohibited from searching Facebook pages. - Anything posted on Facebook is private.

Cyberstalking and online predators are a real problem on Facebook.

In the United States the federal _____ covers most consumer oriented electronic transactions. - EFT Law - Transaction Commission - ETF Act - EFT Act

EFT Act

The main governmental organization that oversees Internet privacy is the Federal ___ Commission. - Internet - Trade - Ethernet - World Wide Web

Trade

As of 2017, tweets can be a maximum of ___ characters. - 140 - 160 - 280 - 120

280

All of the following are true about Instagram except - according to Instagram "Instagram is a fun and quirky way to share your life with friends through a series of pictures". - if you specify a location with your photo, you can opt yo have Instagram check you in on Foursquare. - Instagram charges a fee to download the app. - Instagram is a photo sharing app that is available for download to a variety of digital devices.

Instagram charges a fee to download the app.

All of the following statements about Instagram are true except - it is important to adjust your privacy settings so you can determine who follows you. - Instagram is difficult to integrate with apps like Facebook and Foursquare. - if you don't want to be tracked turn off geo-tagging in the settings under Location Services. - the Profile section on Instagram lists your name, birthday, gender, and phone number.

Instagram is difficult to integrate with apps like Facebook and Foursquare.

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except - when sharing files via the Internet via file sharing programs you can unknowingly give outside users access to your computer. - files downloaded from unknown sites and file sharing sites often contain a variety of malware including spyware and viruses. - your anti-virus software will ensure your files are safe. - the source of the content. It is important to consider if the content came from a legitimate source.

your anti-virus software will ensure your files are safe.


Set pelajaran terkait

APWRLD (Unit 7-9) APCLASSROM review

View Set

Chapter 27: Nursing Management: Burns

View Set

Ch. 14 - Material and Resource Planning (Quiz #8), SCM Chopra/Meindl E6 Ch08, op chapter 12 Demand Planning: Forecasting and Demand Management, OSCM 3001-CH. 10, Chapter 10 MCQ, OSCM Ch 10, SCM ch 15

View Set

Art History: Prehistory to Gothic The Etruscans

View Set

THEORY EXAM 2 - Practice Questions to Work On

View Set

Windows Server 70-410 - Lesson 3

View Set