Posttest: Online Security and Ethical Issues

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which is the top-level domain in this URL: https://www.usa.gov/federal-agencies/u-s-postal-service?

.gov

Which of the following demonstrates the acceptable use of digital communications?

A remote worker actively participates in online meetings.

Which three of the following requirements can be addressed by setting up and using a VPN?

An administrator needs to seamlessly connect a branch office's network to the headquarters' network A user needs to connect to their company network from home. AND A user is traveling and needs to connect to an online service that is not supported in the country the user is in.

Match each type of cyberstalking with the correct example.

An attacker installs a GPS device on a victim's car to monitor where the victim goes. - location tracking An attacker makes inappropriate comments on every post that a user uploads to a photo-sharing app. - harassment on... An attacker sends violent images directly to a user's inbox. - unwanted messaging An attacker installs malware that reports on the victim's browser usage. - tracking computer use

Select two correct online security guidelines.

For your online security, be careful about entering personally identifiable information, such as your driver's license or social security number, on websites. AND Also, make sure that you use incognito mode if using a web browser on a shared computer.

Match the enhancement with the correct scenario provided that can be used to increase SEO performance in a search engine result.

Mackey focuses on developing websites that are accommodative on any type of computing device. - MOBILE... Annabelle integrates these terms into the content of her roller-blading website and the titles of web pages. - KEYWORDS... Calgar includes a summary of what is on different pages of his travel and tourism company's website. - META TAGS Jason integrates these tags in a web page's HTML code so a search engine can determine the level of importance of a website's content. - HEADINGS...

Match each search operator with its correct use.

Use this operator to find two terms within x words of each other. - Nx Use this operator to ensure that all your search terms appear in the results. - AND Use this operator to find two words within x words of each other in a sentence. - Wx Use this operator to view results that contain one or more of your search terms. - OR

A company makes low-cost coffee machines. It knows that, on average, the coffee machine will break down within two years of use. So, it only offers to replace coffee machines that break down within one year. What type of unethical marketing issue is the company engaging in?

deceptive warranties

Match the citation standards with the fields in which it is used.

education, psychology, and science. - APA business, history, and the fine arts - Chicago/Turban the humanities - MLA engineering, computer science, and information technology - IEEE

An educator works hard at creating an online environment where users feel free to report any abusive behavior that they see. What aspect of a safe environment is the educator focusing on?

encouraging open communication

Alejandro is an avid sports fan of a local professional soccer club in his area. He wants find the club's merchandise. If wants to find something in a specific price range, which search query should he most likely use?

hometown soccer jerseys $50..$80

Complete the sentences describing how search engines function.

it allows a search engine to find content more... AND check website pages...

Complete the sentences about works that fall into the public domain.

patented (WRONG) / protected (WRONG) AND be the copyright owner (RIGHT)

Which of the following software licensing agreements is the most restrictive?

proprietary

Which three of the following are considered fair use of copyrighted material?

showing text snippets from another site in search results showing short movie clips in a movie review AND using historical video footage for a documentary


Set pelajaran terkait

Ch. 12 Intro to Data Processing (Systems Analysis & Design)

View Set