Living Online
What is how data and information is used, techniques and technologies used to protect sensitive data and information, and who has access to data and information associated with?
Internet privacy
In business _______________ is the practice of creating a name, symbol/design (logo) that differentiates one product/service from other products/services.
branding
In order to create an SSL connection a web server requires an SSL _________________.
certificate
Search engine _______________ (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.
optimization
Custom websites that are used to enhance a personal brand, which include information about schools attended, jobs, and extracurricular activated are called ___________ websites.
personal
If someone illegally copies a program they have committed software _____________.
piracy
When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, this is called _____________.
software piracy
There are many internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the internet. These laws are created by both _________ and federal government. The main federal governmental organization that oversees internet privacy is the Federal Trade Commission (FTC).
state
A social media post that has been shared, copied, and spread across multiple dial media platforms and Internet sites by many people is called a __________ post.
viral
Human knowledge and ideas that the law protects against unauthorized use by others is considered _____________ property.
intellectual
Julia tyoes specific terms into a search engine (Google, Bing, Yahoo, etc,) when she wants to find an article on the World Wide Web. This is called a __________ search.
keyword
The average American spends over ___ hours a day viewing a display screen.
10
The TPP covers just under ____ percent of global GDP.
40
The TPP also stipulates the length of copyright terms. In the United States, perpetual copyrights and patents are prohibited, but extensions to copyright are allowed. Under the TPP, copyrighted works will pass into the public domain ______ years after the death of the creator, extending the term for some countries such as New Zealand by a further 20 years.
70
If typed into a search window, which of the following would show only the results of social media postings about pepperoni pizza? A) #pepperonipizza B) Pepperoni AND pizza C) www.pepperonipizza.com D) Pepperoni Pizza
A) #pepperonipizza
A domain name A) A text version of an IP address B) is the www portion C) The same as top level domain D) is the http:// portion
A) A text version of an IP address
Which of the following HTML objects will find web pages with hyperlinks? A) Anchor B) Image C) Wigi Text D) Site
A) Anchor
This email function allows users to maintain an organized Inbox without deleting emails A) Archiving B) Uploading C)FTP D) Downloading
A) Archiving
You should evaluate websites based on which 2 of the following criteria? A) Bias B) Objectivity C) Emotion D) Design
A) Bias B) Objectivity
Bandwidth is using measure in A) Bits per second B) Hertz C) Bytes per second D) MhZ
A) Bits per second
Which of the statements below are things to pay attention to when building an awesome personal brand? A) Create a personal website B) Make sure you know about your online presence C) Do not be too focused on what you share D) People's perception is not that important. It is the real you that matters.
A) Create a personal website B) Make sure you know about your online presence
A legal contract between the software manufacturer and the user of an application A) EULA B) Single-User License C) Network License D) Site License
A) EULA
Search __________ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine. A) Engine B) Effort C) Electronic D) Enhanced
A) Engine
A handy for people to remember websites is A) Use the domain name B) Write it down C) Always search using google D) Ask a friend
A) Use the domain name
Personal branding can be accomplished through a variety of means including: A) Business cards B) Email messages C) Text messages D) All of the above
D) All of the above
You should use LinkedIn to connect with other professionals including: A) Business contacts B) Colleagues C) Peers from college D) All of the above
D) All of the above
Which of the following are ethical or privacy concerns when using social media? A) Every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. B) Every action you make online leaves a cyber-footprint. C) The data that is collected from social media sites is beneficial to marketers, businesses, and any entity that needs data on online behavior D) Any browsing conducted in privacy mode is protected from tracking by others on the internet.
A) Every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. B) Every action you make online leaves a cyber-footprint. C) The data that is collected from social media sites is beneficial to marketers, businesses, and any entity that needs data on online behavior
3 commonly used search engines include which of the following? A) Google B) Bing C) Yahoo D) Microsoft Edge
A) Google B) Bing C) Yahoo
A bit is a represented by which one of these A) Mbs B) CBs C) MBs D) KBs
A) Mbs
A Byte is A) One character of information B) 8 characters of information C) Only a 0 or 1 D) Only a special character
A) One character of information
Robert wants to creat a professional identity using professionally-oriented social media sites. Which of the following are popular professionally-oriented social-media sites? A) Opportunity B) YouTube C) Miniclip D) Linkedin
A) Opportunity D) Linkedin
Best practices when using social media to create a personal brand include: A) Post regularly to your social media sites B) Keep an updated profile C) Consider joining chat and internet groups that reflect your personal and professional interests D) As a rule of thumb you should check/post to your social media sites once a month
A) Post regularly to your social media sites B) Keep an updated profile C) Consider joining chat and internet groups that reflect your personal and professional interests
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called ____________________. A) Quarantine B) Safety C) Partition D) Sector
A) Quarantine
Select the 3 statements about Boolean operators. A) Quotation marks make the search engine look for occurrences where the words are together rather than searching for individual occurrences B) The tactful use of quotation marks can return more relevant search results. C) Connect your search words with "AND" when you are searching for multiple items in the same page. D) AND is not common Boolean operator
A) Quotation marks make the search engine look for occurrences where the words are together rather than searching for individual occurrences B) The tactful use of quotation marks can return more relevant search results. C) Connect your search words with "AND" when you are searching for multiple items in the same page.
If you're reading an article and are concerned that it may be biased in one way or another, select 3 things that you can do to judge the author's objectivity. A) Remember that bias is introduced into everything, even though it may be unintentional B) Try to be aware of all sides of any issue. C) When viewing a website, investigate the background and other writings of the author and the site. D) Since bias is everywhere, no source is credible.
A) Remember that bias is introduced into everything, even though it may be unintentional B) Try to be aware of all sides of any issue. C) When viewing a website, investigate the background and other writings of the author and the site.
Select what's true about Search Engine Companies A) SEC stands for Search Engine Company B) The information contained in a search engine database is determined by how each specific company records URL information C) It is common practice for the wed site owner to submit their URL and associated information to the search engine company (SEC) D) SECs use indexes to slow down the search process
A) SEC stands for Search Engine Company B) The information contained in a search engine database is determined by how each specific company records URL information C) It is common practice for the wed site owner to submit their URL and associated information to the search engine company (SEC)
Wyatt owns a company that is about to launch an ecommerce website. He is concerned about securing the web visits and transactions. He is investigating a popular encryption technology called ______________ that is used for establishing an encrypted link between a web server and web browser. A) SSL B) SLL C) SSS D) SLS
A) SSL
The amount of time spent in a 24 hour period in front of a display screen is referred to as _________ time. A) Screen B) View C) Engaged D) Watch
A) Screen
If a web adress starts with HTTPS://, you are using A) Secure Socket Layer B) SST C) A virtual private network connection D) World Wide Web Socket
A) Secure Socket Layer
Which of the following are common software licenses? A) Single-user B) Site C) Network D) Global
A) Single-user B) Site C) Network
Which of the following are common software licenses? A) Site B) Network C) Single-user D) Global
A) Site B) Network C) Single-user
According to the FTC, which 2 of the following are important U.S. internet privacy laws/rules? A) The Red Flags Rule B) FCRA C) COPPA D) FTCA
A) The Red Flags Rule C) COPPA
If you use BCC: A) The TO: and CC: do not see the BCC: B) Only the TO: sender is aware of the BCC: C) Only the BCC: recipient receives the message D) Both the To: and CC: recipients are aware of the BCC:
A) The TO: and CC: do not see the BCC:
Tweets can be made up of text, images, and video. A) True b) False
A) True
Which of the following should be considered when using twitter? A) Twitter accounts contain personal information B) Most of the communication taking place on Twitter is viewable by everyone C) If you have a situation where a twitter user has been blocked, but the situation escalates you can file a formal report through twitter. D) You cannot protect tweets so that manual approval is required to view them.
A) Twitter accounts contain personal information B) Most of the communication taking place on Twitter is viewable by everyone C) If you have a situation where a twitter user has been blocked, but the situation escalates you can file a formal report through twitter.
A digital identity is composed of a variety of digital attributes including which 3 of the following? A) Usernames and passwords B) Personal data such as your social security number and birthdate C) Online search activities D) The type of spreadsheet software you are using.
A) Usernames and passwords B) Personal data such as your social security number and birthdate C) Online search activities D) The type of spreadsheet
What is a business' brand derived from? A) Who they are B) Who they want to be C) Who people perceive them to be D) What their competition perceived them to be
A) Who they are B) Who they want to be C) Who people perceive them to be
James want to determine the owner of a website. He will conduct a __________ search. A) WhoIS B) Boolean C) Domain D) Who Owns It
A) WhoIS
Internet addiction also referred to as Internet __________ Disorder (IAD) is excessive Internet use to the degree that it negatively affects daily life.
Addiction
Jerome wants to search for articles about banana pudding but his web search results also show results for chocolate pudding as well as articles about bananas. What should Jerome enter into the search window so that he only finds articles with the words banana pudding in them? A) (banana pudding) B) "banana pudding" C) banana AND pudding D) banana OR pudding
B) "banana pudding"
Programs that are used to scan files in order to identify and remove computer virus and other malicious programs are referred to as _____________ software. A) Firewall B) Anti-virus C) Operating System D) Pop-up blocker
B) Anti-virus
Choose what's true about Internet censorship. A) Companies in the United States cannot restrict employee access to resources on the Internet B) Many countries actively censor content on the Internet. C) The suppression of content (images, articles, videos, etc,) that can be accessed via the internet D) In the United States, direct censorship of the Internet by the government is prohibited by the First Amendment with the exception of obscenity such as child pornography
B) Many countries actively censor content on the Internet. C) The suppression of content (images, articles, videos, etc,) that can be accessed via the internet D) In the United States, direct censorship of the Internet by the government is prohibited by the First Amendment with the exception of obscenity such as child pornography
Find the incorrect statement about fee-based antivirus and free anti-virus software. A) Most of the free anti-virus programs perform almost as effectively as their fee-based counterparts B) One of the positives of free anti-virus software is their spam detection performance C) One to the main differences between free and fee anti-virus software is the number of features
B) One of the positives of free anti-virus software is their spam detection performance
This email function goes to the sender and anyone in the senders To: and CC: line A) BCC: B) Reply All: C) CC: D) Reply
B) Reply All:
Best practices when using social media to create a personal brans include: A) Make sure to post personal information so people can get an idea of who you really are B) Responding quickly to mentions of your name on social media sites C) Using the same name, profile pictures, and imagery across all social media platforms D) You should consider creating a username that is not taken that can be used across the various social media sites you plan to use
B) Responding quickly to mentions of your name on social media sites C) Using the same name, profile pictures, and imagery across all social media platforms D) You should consider creating a username that is not taken that can be used across the various social media sites you plan to use
Which of the following are examples of cyberbullying? A) Beating another online player in Madden 2018 by a score of 49-0 B) Sending threatening email and chat messages to someone C) Sending false information via a Twitter message D) Not accepting a Facebook friend request
B) Sending threatening email and chat messages to someone C) Sending false information via a Twitter message
Restricts the use of software to one user at a time. A) EULA B) Single-User License C) Network License D) Site License
B) Single-User License
Voice service over the internet is known as A) Asynchronous telephone service (ATS) B) VOIP C) String Network D) Telephonynet
B) VOIP
Select what's true about using the Boolean operators "OR" and "NOT". A) Boolean operators make using search engines less efficient B) You can also use /^ to execute an OR search C) Use "NOT" if you want to exclude certain results from your search D) Use "OR" when you are searching for documents including one or another of your search words
B) You can also use /^ to execute an OR search C) Use "NOT" if you want to exclude certain results from your search D) Use "OR" when you are searching for documents including one or another of your search words
_______ percent of human resource professionals said that a personal website provide more insight into a candidate than a traditional resume alone. A) 22 B) 32 C) 67 D) 47
C) 67
Which of these business email etiquette rules is false? A) Avoid using all caps B) Avoid jargon C) Avoid using a salutation D) Avoid test style shortcuts
C) Avoid using a salutation
Volume of data that can be carried in an amount of time A) Byte B) Mhz C) Bandwidth D) CATS
C) Bandwidth
Experts suggest making connections with the three Cs: Company, ____________ and Colleagues. A) Contemporaries B) Classmates C) College D)Community
C) College
An email signature A) Is automatically created by the email program B) Requires digital pencil C) Creates a consistent professional close to every mail D) Is outdated and unnessary
C) Creates a consistent professional close to every mail
Which of the following are ways to safely download antivirus software? A) Conduct a Google search and download from one of the sites that are listed B) Visit a freeware site and download one of the options that are listed C) Download the software from a trusted site like www.cnet.com D) Download the software from a known anti-virus software vendor
C) Download the software from a trusted site like www.cnet.com D) Download the software from a known anti-virus software vendor
When you use the internet, your ISP assigns an address to your router. This is known as A) Dynaflow B) Static IP address C) Dynamic IP address D) IP swapping
C) Dynamic IP address
Va'Jahn is conducting research for an assignment in his marketing class. He is concerned about which references he can use. His use of copyrighted material is protected by ____________ of information. This means he is permitted to use copyrighted information for commentary or editorial purposes without seeking permission. However, he must properly site the source in order to comply with fair use standards. A) Proper use B) Explicit use C) Fair use D) Educational use
C) Fair use
An organization's private network, restricted to authorized users A) Internet B) World Wide Web C) Intranet D) VPN
C) Intranet
Which is not an advantage of phone calls A) Better than email for conveying nuance B) Provides for voice inflection C) Much more appropriate after normal working hours D) More appropriate for bad news if face to face no practical
C) Much more appropriate after normal working hours
Enable anyone on a network the right to use software. A) EULA B) Single-User License C) Network License D) Site License
C) Network License
Felipe is starting to create a professional online identity. Which of the following are true regarding creating an professional online identity? A) Posts on Facebook will not impact a person's professional identity B) You should remain as anonymous as possible on professional-oriented social media sites C) Post your photo on professionally-oriented social media sites D) Regularly update your profile on professionally-oriented social media sites
C) Post your photo on professionally-oriented social media sites D) Regularly update your profile on professionally-oriented social media sites
Which of the following could online activities in your personal social media and email accounts can negatively impact your online professional identity? A) Post Instagram photos of a recent company community service event B) Post pictures of a recent family vacation C) Send an email about confidential company information D) Tweet negative comments about your boss and the business you work for
C) Send an email about confidential company information D) Tweet negative comments about your boss and the business you work for
Microsoft business collaboration platform that allows employees to collaborate on docs, etc A) Windows B) Outlook C) Sharepoint D) Skype
C) Sharepoint
The first social media site to allow users to create profiles, organize groups, and invite friends was called _________________. A) AOL B) Facebook C) Sixdegrees.com D) Myspace
C) Sixdegrees.com
Highest level in domain name system that identifies servers or sites A) Top Level Dynamic Interchange B) Top down address C) Top level domain D) Top limit digital name
C) Top level domain
Which of the following are protected by intellectual property laws against unauthorized use or distribution? A) Open Educational Resources B) Software ideas C) Video games D) Movies
C) Video games D) Movies
Gigabyte is..... A) Thousand bytes B) jillion bytes C) billion bytes D) trillion bytes
C) billion bytes
Symbolized by a "B" A) bit B) bite C) byte D) byt
C) byte
Copying files from a server on the internet onto your own computer A) uploading B) the transfer process C) downloading D) streaming
C) downloading
The protocol defines how the web pages transfer from a web server to a device. A) html B) hvac C) http D) ftp
C) http
1000 bytes of data is a A) megabyte B) megabit C) kilobyte D) kilobit
C) kilobyte
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is ______________ Commons.
Creative
Which of the following statements about facebook is true? A) You can permanently erase your profile and associated information from Facebook B) Photo tagging does not create a link to your Facebook timeline C) Anything posted on Facebook is private once even if it is shared with others D) Cyberstalking and online predators are a real problem on Facebook
D) Cyberstalking and online predators are a real problem on Facebook
A transmission using SSL means that the data is A) Faster because it is supersonic B) Compressed C) Scrambled D) Encrypted
D) Encrypted
Select the correct order, from smallest to largest A) MB,TB,GB,TB B) GB,MB,KB,TB C) TB,KB,MB,GB D) KB,MB,GB,TB
D) KB,MB,GB,TB
Maria wants to ensure she is using correct ergonomic posture. Which of the following is correct ergonomic posture? A) Wrists bent without any support B) Legs crossed and positioned anywhere on the floor C) Computer monitor positioned at least 3 feet from her body D) Keep legs parallel to the floor with feet flat on the ground
D) Keep legs parallel to the floor with feet flat on the ground
You have become the victim of cyberbullying. Which of the following is a step you should take to address the issue? A) Do not report the issue to the proper authorities B) Fight back at the bully online C) Try to resolve the bullying yourself D) Record evidence of the bullying
D) Record evidence of the bullying
Software is installed on the device of qualified users who request the software inside an organization. A) EULA B) Single-User License C) Network License D) Site License
D) Site License
If an organization's IP address is permanently assigned, this is known as A) MAC address B) Network Interface Address C) Dynamic IP address D) Static IP address
D) Static IP address
In business, online chat is often used A) To avoid a printed record on the conversation B) To reduce stress at work C) To have a private conversations with a co-worker D) To provide technical assistance
D) To provide technical assistance
What is purchasing behavior, social media postings, and online search activities associated to?
Digital Identity
Search _______________ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.
Engine
Intellectual property ___________ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.
Laws
A legal contract between the software manufacturer and the user of an application is called an End-User __________ Agreement.
License
The world'd most popular social network site for business professionals is ______________.
Use the Boolean operator ____ if you want to exclude certain results fro your search.
NOT
The principle that ISPs should give consumers access to legal Internet content on an equal basis. Net __________ means ISPs will be banned from slowing the delivery of a TV show simply because it's streamed by a video company tat completes with a subsidiary of the ISP.
Neutrality
Use ___ when you are searching for documents including one or another of your search words.
OR
The TPP stands for
Trans-Pacific Partnership
Most search engines use similar technology to execute an Internet search. The search engine uses a ______________ of Internet URLs, each record in the database contains information including the site URL, description and title, and keywords included in the site.
database