Social Media and Your Digital Identity
If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____.
$50
Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____.
$500
If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.
1
A consumer makes a purchase from Overstock.com
B2C
Which of the following are considered e-commerce transactions?
B2C C2C B2B
A consumer makes arrangements to buy used snowboard equipment with another consumer on Craigslist.
C2C
Derived from the Greek word ergon (work) and nomoi (natural laws), ___ is an important element of workplace safety.
ergonomics
You should consider where/how you place the following to create an ergonomically correct workstation, which includes:
keyboard monitor chair
Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.
laws
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
The formal term for a greeting to the recipient of an e-mail message is called a
salutation
Two of the main concerns that surround digital identity are privacy and _____.
security
A transceiver can both send and receive information.
true
Snaps are temporary and cannot be saved and forwarded to others.
False
The DMCA protects ___ from liability for copyright violations of its users.
ISPs
The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet is called ___ privacy.
Internet
According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?
Pictures Literary works Music
With over 6 billion image and video views per day ___ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.
Snapchat
Which of the following are parts of a radio frequency identification (RFID) system?
Transponder Antenna Transceiver
Passports issued by the United States and many other countries include radio frequency identification (RFID) chips.
True
An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:
all of the above
A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a
copyright
Every action you make online leaves a cyber or ___ footprint.
digital
In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection _____ or wallet.
sleve
The practice of using social media to expand the number of business and contacts people have is called ___ networking.
social
The Internet era use of emoticons can be traced to September _____, when computer scientist Scott Fahlman suggested to the Carnegie Mellon University message board that emoticons could be used to distinguish jokes from serious statements online.
1982
Tweets can be a maximum of _____ characters.
280
In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as straight as possible. Arms should be positioned at a __-degree angle.
45
There are a variety of emoji that are used by different operating systems and programs including:
All of the above
Which of the following are ethical concerns when using social media?
All of the above
You should use LinkedIn to connect with other professionals including:
All of the above
Which of the following statements are true about acceptable use policy (AUP)?
An AUP often accompanies most software applications AUP covers a broad spectrum of computer resources A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources
Which of the following statements are true about Facebook?
Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. Unless you specify differently, photo tagging creates a link to your Facebook timeline. Every time you post something on any social media site, you are impacting your online identity.
Which of the following are examples of EFT transaction?
Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket Direct deposit of your paycheck Using your debit card to purchase gas
Which of the following statements are true about best practices for the use of an employee-monitoring program?
Be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it. Preventing employee access to time-wasting or inappropriate sites can help to stop trouble before it begins.
The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.
Data
There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?
Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement. Accidentally downloading pornography that is labeled as a different file.
The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.
EFT
Free openly licensed learning resources that are available online for instructors and students to use are called Open ___
Education
_____ software is designed to track and record the use of network and hardware resources in the workplace by employees.
Employee-monitoring
There are risks associated with downloading content from the Internet. Which of the following are important to consider when downloading from the Internet?
Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer. The source of the content. It is important to consider if the content came from a legitimate source.
Select the characteristics of PayPal.
Free for the buyer to use Provides buyer protection against fraud
The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio ___ Identification.
Frequency
The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ___ Transfer.
Funds
Internet privacy
How data and information is used Who has access to data and information Techniques and technologies used to protect sensitive data and information
Initially used in e-mail, chat, and text messages as a form of informal correspondence, _____ acronyms are widely used today.
Internet
Which of the following are e-mail etiquette considerations?
Keep your messages brief yet specific to the subject of the message Avoid ambiguity Use proper spelling and grammar in your messages
It is a good idea to edit or remove skills endorsements from your ___ (professional social media site) account that do not accurately reflect your skill set or experience.
The world's most popular social network site for business professionals is
_____ are free openly licensed learning resources that are available online for instructors and students. There are a variety of these resources available including textbooks, assignments, games, and digital media.
OER
A digital identity is composed of a variety of digital attributes including which three of the following?
Online search activities Personal data such as your social security number and birth date Usernames and passwords
Which of the following statements are true regarding RFID?
RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.
Internet privacy is a wide-ranging term that refers to a variety of considerations including which three of the following?
Techniques and technologies used to protect sensitive and private data, communications, and preferences How data and information is used Who has access to data and information
Which of the following statements are true about ergonomics?
The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations. Derived from the Greek words ergon (work) and nomoi (natural laws). A very important element of an effective workplace safety plan.
A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the Internet is Bit
Torrent
Which of the following are considered Intellectual property?
Trade secrets Trademarks Patents
Which of the following should be considered when using Twitter?
Twitter accounts contain personal information Most of the communication taking place on Twitter is viewable by everyone If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter.
Commonly downloaded files include which three of the following?
Updates Programs/apps Video files
Which of the following statements are true about best practices when using LinkedIn?
Use up-to-date information and images on LinkedIn. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page.
Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to-___ transaction.
consumer
Pictures or graphics that are used in text and e-mail messages are called
emoji
Emoticon is a blending of the words emotion and ___ and refers to keyboard characters that are used to represent facial expressions and objects.
icon
To post content to Pinterest, you start with a(n) _____ or a photo.
image
A key component in an employee-___ program is the utilization of Web and Internet filters.
monitoring
Instagram is generally considered a ___-sharing app.
photo
If someone illegally copies a program, then they have committed software
piracy
Along with the price, a major concern associated with genealogical DNA testing is
privacy
In Instagram it is important to adjust your ___ settings so you can determine who follows you.
privacy
On Facebook, your _____ is a collection of the photos, stories, and experiences that tell people about you and your experiences.
profile
Electronic etiquette covers the use of:
social media text messages e-mail
The main governmental organization that oversees Internet privacy in the United States is the Federal ___ Commission.
trade
If you do not adjust your privacy settings on Instagram anyone can follow you.
true
It is important to avoid using Internet acronyms in formal messages and with people you are not familiar with, such as professors and employers.
true
Twitter is an information network made up of 280-character messages called
tweets
A key component in an employee-___ program is the utilization of Web and Internet filters.
monoriting
Social media integrates a variety of multimedia including which three of the following?
Messages Video Images
Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.
$25 billion
If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to _____.
$500.00
After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.
10
Where in the profile and settings area of Twitter where would you click to protect tweets so that manual approval is needed to view them?
2
A study by IDC reported that _____ percent of all employee Internet access time was not work-related.
30 to 40
A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _____ Commons.
Creative
Which of the following statement is true about Facebook?
Cyberstalking and online predators are a real problem on Facebook
Software theft occurs when someone engages in which three of the following?
Illegally activating or registering a program Stealing software programs Illegally copying a program (called piracy)
Which of the following statements are true about Instagram?
Instagram is a subsidiary of (is owned by) Facebook. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android.
International laws on ___ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.
Internet
Which of the following three statements about Instagram security are true?
It is important to adjust your privacy settings so you can determine who follows you. If you do not want to be tracked, turn off geo-tagging in the settings under location services. The profile section on Instagram lists your name, birthday, gender, and phone number. All information begins as viewable by the public unless you change the settings to private. Instagram can track your location.
Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.
Web 2.0
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.
creative
The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic ___ interchange.
data
The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:
data interchange
People use the ___ symbol (#) before a relevant keyword or phrase (no spaces) in their tweet to categorize those tweets and help them show more easily in Twitter search.
hashtag
The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. It is a wide-ranging term that refers to a variety of considerations including:
internet
You connect with businesses by following or "___" their profile.
liking
Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is
paypal
When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ___ has occurred.
piracy
Using DNA ancestry testing services such as 23 and Me and Ancestry.com can open interesting avenues of discovery. One disadvantage to using these services is the potential loss of ___, as your personal DNA data will be loaded into a large database.
privacy
The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.
separation
You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information.
true
Which of the following are examples of downloading a file?
Copying a driver from a company's website and saving it to your computer Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) Copying a photo from Facebook and saving it to your desktop
Alberstson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet.
B2B
Signed into law by President Clinton in 1998, The ___ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.
Digital
Which of the following statements are true about Pinterest?
Pins are grouped together by topic and organized onto pinboards A pin is a visual bookmark. When you click a pin you are brought to the site/source that posted it
Digital identity
Purchasing behavior Social media postings Online search activities
Passports issued by the United States and many other countries include ___ chips.
RFID
Which of the following are email etiquette considerations?
Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. Write your messages carefully. Once you send a message you cannot rescind it. Be cautious so you do not hit "reply all" if you do not intend to do so.
The most downloaded cross-platform messaging app that allows you to send and receive messages without having to pay for SMS (text messaging) is
Which of the following statements are true about WhatsApp Messenger?
WhatsApp has over 2 billion users worldwide. Whats App is a popular way to make phone calls and send text messages via mobile app.
To adjust your privacy settings in Facebook, make sure you are logged iin, then click on your ___ to access the security settings
settings
To adjust your privacy settings in Facebook, make sure you are logged iin, then click on your ___ to access the security settings.
settings
There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).
state
Tweets can be made up of text, images, and video.
true