Social Media and Your Digital Identity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____.

$50

Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____.

$500

If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.

1

A consumer makes a purchase from Overstock.com

B2C

Which of the following are considered e-commerce transactions?

B2C C2C B2B

A consumer makes arrangements to buy used snowboard equipment with another consumer on Craigslist.

C2C

Derived from the Greek word ergon (work) and nomoi (natural laws), ___ is an important element of workplace safety.

ergonomics

You should consider where/how you place the following to create an ergonomically correct workstation, which includes:

keyboard monitor chair

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

The formal term for a greeting to the recipient of an e-mail message is called a

salutation

Two of the main concerns that surround digital identity are privacy and _____.

security

A transceiver can both send and receive information.

true

Snaps are temporary and cannot be saved and forwarded to others.

False

The DMCA protects ___ from liability for copyright violations of its users.

ISPs

The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet is called ___ privacy.

Internet

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?

Pictures Literary works Music

With over 6 billion image and video views per day ___ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

Snapchat

Which of the following are parts of a radio frequency identification (RFID) system?

Transponder Antenna Transceiver

Passports issued by the United States and many other countries include radio frequency identification (RFID) chips.

True

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

all of the above

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

copyright

Every action you make online leaves a cyber or ___ footprint.

digital

In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection _____ or wallet.

sleve

The practice of using social media to expand the number of business and contacts people have is called ___ networking.

social

The Internet era use of emoticons can be traced to September _____, when computer scientist Scott Fahlman suggested to the Carnegie Mellon University message board that emoticons could be used to distinguish jokes from serious statements online.

1982

Tweets can be a maximum of _____ characters.

280

In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as straight as possible. Arms should be positioned at a __-degree angle.

45

There are a variety of emoji that are used by different operating systems and programs including:

All of the above

Which of the following are ethical concerns when using social media?

All of the above

You should use LinkedIn to connect with other professionals including:

All of the above

Which of the following statements are true about acceptable use policy (AUP)?

An AUP often accompanies most software applications AUP covers a broad spectrum of computer resources A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources

Which of the following statements are true about Facebook?

Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. Unless you specify differently, photo tagging creates a link to your Facebook timeline. Every time you post something on any social media site, you are impacting your online identity.

Which of the following are examples of EFT transaction?

Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket Direct deposit of your paycheck Using your debit card to purchase gas

Which of the following statements are true about best practices for the use of an employee-monitoring program?

Be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it. Preventing employee access to time-wasting or inappropriate sites can help to stop trouble before it begins.

The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Data

There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?

Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement. Accidentally downloading pornography that is labeled as a different file.

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

Free openly licensed learning resources that are available online for instructors and students to use are called Open ___

Education

_____ software is designed to track and record the use of network and hardware resources in the workplace by employees.

Employee-monitoring

There are risks associated with downloading content from the Internet. Which of the following are important to consider when downloading from the Internet?

Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer. The source of the content. It is important to consider if the content came from a legitimate source.

Select the characteristics of PayPal.

Free for the buyer to use Provides buyer protection against fraud

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio ___ Identification.

Frequency

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ___ Transfer.

Funds

Internet privacy

How data and information is used Who has access to data and information Techniques and technologies used to protect sensitive data and information

Initially used in e-mail, chat, and text messages as a form of informal correspondence, _____ acronyms are widely used today.

Internet

Which of the following are e-mail etiquette considerations?

Keep your messages brief yet specific to the subject of the message Avoid ambiguity Use proper spelling and grammar in your messages

It is a good idea to edit or remove skills endorsements from your ___ (professional social media site) account that do not accurately reflect your skill set or experience.

LinkedIn

The world's most popular social network site for business professionals is

LinkedIn

_____ are free openly licensed learning resources that are available online for instructors and students. There are a variety of these resources available including textbooks, assignments, games, and digital media.

OER

A digital identity is composed of a variety of digital attributes including which three of the following?

Online search activities Personal data such as your social security number and birth date Usernames and passwords

Which of the following statements are true regarding RFID?

RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.

Internet privacy is a wide-ranging term that refers to a variety of considerations including which three of the following?

Techniques and technologies used to protect sensitive and private data, communications, and preferences How data and information is used Who has access to data and information

Which of the following statements are true about ergonomics?

The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations. Derived from the Greek words ergon (work) and nomoi (natural laws). A very important element of an effective workplace safety plan.

A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the Internet is Bit

Torrent

Which of the following are considered Intellectual property?

Trade secrets Trademarks Patents

Which of the following should be considered when using Twitter?

Twitter accounts contain personal information Most of the communication taking place on Twitter is viewable by everyone If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter.

Commonly downloaded files include which three of the following?

Updates Programs/apps Video files

Which of the following statements are true about best practices when using LinkedIn?

Use up-to-date information and images on LinkedIn. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page.

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to-___ transaction.

consumer

Pictures or graphics that are used in text and e-mail messages are called

emoji

Emoticon is a blending of the words emotion and ___ and refers to keyboard characters that are used to represent facial expressions and objects.

icon

To post content to Pinterest, you start with a(n) _____ or a photo.

image

A key component in an employee-___ program is the utilization of Web and Internet filters.

monitoring

Instagram is generally considered a ___-sharing app.

photo

If someone illegally copies a program, then they have committed software

piracy

Along with the price, a major concern associated with genealogical DNA testing is

privacy

In Instagram it is important to adjust your ___ settings so you can determine who follows you.

privacy

On Facebook, your _____ is a collection of the photos, stories, and experiences that tell people about you and your experiences.

profile

Electronic etiquette covers the use of:

social media text messages e-mail

The main governmental organization that oversees Internet privacy in the United States is the Federal ___ Commission.

trade

If you do not adjust your privacy settings on Instagram anyone can follow you.

true

It is important to avoid using Internet acronyms in formal messages and with people you are not familiar with, such as professors and employers.

true

Twitter is an information network made up of 280-character messages called

tweets

A key component in an employee-___ program is the utilization of Web and Internet filters.

monoriting

Social media integrates a variety of multimedia including which three of the following?

Messages Video Images

Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.

$25 billion

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to _____.

$500.00

After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.

10

Where in the profile and settings area of Twitter where would you click to protect tweets so that manual approval is needed to view them?

2

A study by IDC reported that _____ percent of all employee Internet access time was not work-related.

30 to 40

A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _____ Commons.

Creative

Which of the following statement is true about Facebook?

Cyberstalking and online predators are a real problem on Facebook

Software theft occurs when someone engages in which three of the following?

Illegally activating or registering a program Stealing software programs Illegally copying a program (called piracy)

Which of the following statements are true about Instagram?

Instagram is a subsidiary of (is owned by) Facebook. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android.

International laws on ___ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

Internet

Which of the following three statements about Instagram security are true?

It is important to adjust your privacy settings so you can determine who follows you. If you do not want to be tracked, turn off geo-tagging in the settings under location services. The profile section on Instagram lists your name, birthday, gender, and phone number. All information begins as viewable by the public unless you change the settings to private. Instagram can track your location.

Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.

creative

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic ___ interchange.

data

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

data interchange

People use the ___ symbol (#) before a relevant keyword or phrase (no spaces) in their tweet to categorize those tweets and help them show more easily in Twitter search.

hashtag

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. It is a wide-ranging term that refers to a variety of considerations including:

internet

You connect with businesses by following or "___" their profile.

liking

Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is

paypal

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ___ has occurred.

piracy

Using DNA ancestry testing services such as 23 and Me and Ancestry.com can open interesting avenues of discovery. One disadvantage to using these services is the potential loss of ___, as your personal DNA data will be loaded into a large database.

privacy

The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.

separation

You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information.

true

Which of the following are examples of downloading a file?

Copying a driver from a company's website and saving it to your computer Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) Copying a photo from Facebook and saving it to your desktop

Alberstson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet.

B2B

Signed into law by President Clinton in 1998, The ___ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Which of the following statements are true about Pinterest?

Pins are grouped together by topic and organized onto pinboards A pin is a visual bookmark. When you click a pin you are brought to the site/source that posted it

Digital identity

Purchasing behavior Social media postings Online search activities

Passports issued by the United States and many other countries include ___ chips.

RFID

Which of the following are email etiquette considerations?

Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. Write your messages carefully. Once you send a message you cannot rescind it. Be cautious so you do not hit "reply all" if you do not intend to do so.

The most downloaded cross-platform messaging app that allows you to send and receive messages without having to pay for SMS (text messaging) is

WhatsApp

Which of the following statements are true about WhatsApp Messenger?

WhatsApp has over 2 billion users worldwide. Whats App is a popular way to make phone calls and send text messages via mobile app.

To adjust your privacy settings in Facebook, make sure you are logged iin, then click on your ___ to access the security settings

settings

To adjust your privacy settings in Facebook, make sure you are logged iin, then click on your ___ to access the security settings.

settings

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

Tweets can be made up of text, images, and video.

true


Set pelajaran terkait

Special Education EC-12(161) Certify Teacher

View Set

CH 32 Fetal Environment & Maternal Complications

View Set

Review Questions for MRI: Data Acquisition and Processing

View Set

Chapter 8 Cost Estimation and Budgeting

View Set

PSY310 Psychological Testing MIDTERM

View Set

Chapter 42 Guided Reading Answers

View Set