C @ CMU
How long is your network access suspended if you exceed the bandwidth limitations the maximum amount of times?
45 days
What is the immediate consequence imposed by the university on targets of Digital Millennium Copyright Act (DMCA) Takedown Notices?
72 hours for the student to resolve the issue with Student Life Office or face a general network suspension
What is Google Scholar?
A Google database for finding scholarly articles sometimes linking to full text.
What is phishing
A method used by cyber-criminals to lure you into providing sensitive information.
Which of the following materials is illegal to share using a P2P application?
A new episode of your favorite television show.
While composing an inspirational speech for a public speaking class, you decide to borrow several passages from Martin Luther King, Jr.'s "I Have a Dream" speech. The quotes strengthen your message in a way that you have not been able to accomplish without their inclusion. In this situation, you should:
Acknowledge Dr. King in your speech and make it clear that you are quoting him.
What is one advantage of searching a library catalog?
All the materials that you find are contained in that library collection.
Which of the following sources is likely to be the most authoritative?
An article from an academic journal.
Which file storage option allows you to share files with other users?
Box or Google Drive
Which of the following resources would you use to find a movie that you need to watch for your Russian course?
CMU library catalog
Which of the following is NOT a responsibility established by the university's Computing Policy?
Communicate in proper and legal ways.
Which of the following options is NOT a possible penalty for violating the university's Computing Policy?
Confiscation of personal computing equipment
Which action will NOT protect your computer from a malware infection?
Don't use the Windows operating system.
Which of the following should you NOT do if you receive an unexpected email from your mom that includes an attachment?
It is from your mom; go ahead and open the attachment.
Where on the library website would you go when you want to see the items you have checked out?
My library account
What is the university's recommendation for updating antivirus software on your computer?
Only run manual updates when new threats are announced for which the antivirus software issues emergency updates.
You can pay for additional printouts beyond your Andrew Printing quota using funds from your account.
Plaid Cash
Your quota is consumed by which of the following?
Print jobs released from a printer
The DMCA:
Provides rules for online service providers that can limit their liability for copyright violations.
What should you do if your search on Google returns too few results?
Replace a search term with a more frequently used term.
Under the provisions of the Digital Millennium Copyright Act (DMCA), Carnegie Mellon is obligated to:
Respond to any complaints of copyright infringement by stopping the alleged violation from continuing.
Which file storage option can only be accessed from a computer lab computer?
SandBox
Specialized databases are best for searching:
Scholarly journals on specific topics in a discipline.
When the university receives a Digital Millennium Copyright Act (DMCA) Takedown Notice, it is obligated to:
Stop the distribution of the infringing material.
Which of the following best summarizes the university's Computing Policy?
The Computing Policy is a community standard that establishes your responsibility to behave as a mature, reasonable and ethical person.
Which of the following are indicators that a URL may be malicious?
The URL includes a series of numbers after http://.
Why would an attack that infects your computer result in your computer's suspension from the network?
To prevent the same infection from spreading over the network to other computers.
Why would you use course reserves?
To read materials that are required for a course.
You opened a malicious email attachment and are now infected with malware. Which of the following actions should you take to recover from the malware infection?
Update your antivirus software and run a full system scan.
To narrow a simple search on "landscape architecture" in the university's library catalog, you should do which of the following?
Use facets to limit your search.
Which of the following statements best describes the anonymity of P2P usage?
Users of P2P applications are not anonymous, whether uploading or downloading.
When should you consider using Interlibrary Loan?
When Carnegie Mellon doesn't own a copy of a book you want to read.
Based on CMU's recommendations, what can you do if you do not have antivirus software installed on your computer?
You can download and install campus-licensed antivirus software from Computing Services' website.
Which of the following is NOT an indicator that your computer is compromised?
You receive a warning that your hard drive is low on storage space.
Web stations and computer labs have complement of software applications.
a different
What are the ways you can get support from CMU's library website?
all of the above
One advantage of accessing articles through the university's library catalog rather than an outside resource is _____.
any article available will be accessible free of charge
P2P applications
are not permitted on the CM network
represents whether the information is provided by trustworthy sources.
authority
Devon visits his neighbor's room to get help on a homework assignment. While there, he logs into his Andrew account and forgets to log out before he leaves. His neighbor notices that the account is still logged in and adds a course to Devon's academic schedule. Which of the following has NOT been violated?
availability
Maintaining the of a resource means that authorized users are able to reliably get to the specific machine or information when needed.
availability
The of a resource refers to how timely and reliable access to that resource is.
availability
When receiving an email attachment with a file ending with .exe , you should
avoid opening the attachment as it may contain malware
Where can you save a file so that it is accessible from any computer with an Internet connection?
box or google drive
Which file storage option allows you to share files with other users?
box or google drive
is about ensuring that only authorized users have access and that unauthorized users are excluded
confidentiality
is about ensuring that only authorized users have access and that unauthorized users are excluded.
confidentiality
Which of the following options is NOT a possible penalty for violating the university's Computing Policy?
confiscation of personal computing equipment
represents whether the information presented in the resource might be outdated based on the publication date and what you know about the publication process.
currency
Of the following, which is the best choice for finding public opinion related to your topic of interest?
discussion forums and blogs
PII includes your name in conjunction with which of the following? (Select all that apply.)
drivers license social security credit card number
Access to your Andrew account and password will not compromise your PII.
false
All Andrew Printing represent a single printer
false
CMU prevents you from accessing malicious websites.
false
Color printing is available on all of the Andrew Printing queues.
false
Giving another author credit while incorporating his or her ideas into your argument constitutes plagiarism.
false
Making sure one of your friends knows your password as a backup will help you protect your personally identifiable information (PII).
false
Only urgent issues should be reported to the Help Center
false
Only urgent issues should be reported to the Help Center.
false
Tabloid printing is available on all of the Andrew Printing queues.
false
The unused portion of your Andrew Printing quota is credited to your student account.
false
There are no differences between the public computer lab computers and the Web stations.
false
There is a time limit on how long you can use a computer lab computer.
false
There's no threat to your information so long as you don't share your Andrew ID and password with anyone
false
Under the Fair Use Policy, you do not need to credit the source of copyrighted materials used in your academic coursework.
false
Web stations provide access to the same academic software you'll find in the computer labs.
false
You should rely on logos or addresses to verify the authenticity of an email.
false
You can use the library website's Ask Us feature to perform which of the following tasks?
get help from a librarian
Which of the following resources would you use to find recent U.S. State Department briefings on the Middle East?
Points: 1 out of 1 Which of the following accurately describes the university's system for determining fair use of public computers?
impact based
One of the clues that an email is NOT a phishing scam is that the email
includes a phone number for you to contact the sender.
Maintaining the of information means ensuring that the data has not been changed inappropriately, whether these changes are accidental and innocent or are intentional and malicious.
integrity
When Sara posed as Guadalupe and sent out vicious emails, she compromised the of Guadalupe's account.
integrity
addresses the question of how certain you can be about the accuracy of your resources and information.
integrity
An email message informing you that your email quota has exceeded its limit could be a phishing attack if the message
is asking for your andrew ID and password
Where should you look to find out if CMU has access to The New Yorker online?
journals search
If you want to find only the articles that you can readily get a PDF of through ProQuest, what can you do?
limit to full text articles
Is deleting emails a risky behavior that could lead to computer or account compromise?
no
You receive an email with an attachment that is infected with malware. Select the action that is most likely to occur if you never open the attachment.
none of the above
data bases are most useful for retrieving
periodical and journal titles
Which of the following types of information are commonly targeted by cyber criminals? (Select all that apply.)
personally identifiable info, social security numbers, user IDs and passwords
represents the different ways the issue under investigation can be viewed, and which of these ways best characterizes the resource.
point of view
Your Andrew Printing quota is consumed by which of the following?
print jobs released from a printer
Which of the following best describes the university's system for determining fair use of bandwidth?
quota-based
represents how completely and specifically the information meets the need of the assigned task.
relevance
Which file storage option can only be accessed from a university computer lab computer?
sandbox
General databases are best for searching which of the following?
scholarly journals on many topics
Theresa needs a microphone and audio recorder for an assignment. Where can she get this equipment?
technology lending
An authentic security alert will include a URL to where the security alert is posted on
the computing services website
How can you access course reserves?
the library homepage
After compromising your credit card number, a malicious person could change your address with the U.S. Postal Service.
true
Citations give authors and researchers credit for their original ideas and language and protect them from appropriation by others.
true
Cyber-criminals are people who circumvent security controls in order to break into computer systems and networks.
true
Failing to keep your operating system up to date is a violation of the university's Computing Policy, and can result in your computer being suspended from the network.
true
Fraudulent emails often include an offer of money, prizes, or discounts.
true
If you do not resolve a Digital Millennium Copyright Act (DMCA) infraction within 72 hours, your computer will be suspended from the network.
true
If you fall victim to a phishing scam, your computing resources could be compromised and used for malicious activity.
true
If you suspect that your computer has been compromised, you should change your password immediately.
true
If you were to fall victim to a phishing scam, your identity could be stolen and your computing resources could be compromised and used for malicious activity.
true
If your Andrew ID and password are compromised, the information and resources of the broader campus community are at risk as well.
true
If your mobile device is stolen, you should report the incident to campus police.
true
In order to use the databases that Carnegie Mellon subscribes to, you have to be a CMU student, staff, or faculty member.
true
Malware is a general term for malicious software that includes computer viruses, worms, and Trojan Horses.
true
Maple is one of the software applications available through Virtual Andrew. You can consult the Software Catalog list.
true
Providing the location of a resource and a detailed description of the problem is a good practice when reporting issues to the Help Center.
true
Some academic software is only available in a computer lab and cannot be used via Virtual Andrew.
true
Some computer labs can be reserved for classes.
true
Some course reserves materials are digital.
true
Some file-sharing programs can consume bandwidth even when you are not actively downloading files.
true
The public computing computer labs are located in the academic buildings and residence halls.
true
Theft of PII may lead to identity theft.
true
There is a time limit on how long you can use a Web station.
true
To receive security news and alerts, you should subscribe to Computing Services' security news feed.
true
You can configure your personal computer to print to the Andrew Printing service
true
You can only use a Web station for 15 minutes.
true
You can use Virtual Andrew to access licensed software from your own computer or mobile device.
true
You should subscribe to Computing Services' RSS (Rich Site Summary) news feed to ensure that you are informed about the latest security threats?
true
Your print jobs will not be printed until you physically visit a print station and release them.
true
How can you access specialized academic software, such as Minitab, from your personal computer?
virtual andrew
Are you responsible for verifying the legitimacy of unexpected email attachments?
yes
Can you get a borrower's card to check out books at local, non-CMU libraries?
yes
Consider the following article: How Not to Deal With Climate Change . Does this article cover different perspectives?
yes
Is being vigilant for shoulder surfing considered a safe computing practice?
yes
Is plugging a USB drive that you found at the gym into your computer to find the owner a risky behavior that could lead to computer or account compromise?
yes
Is sharing your password with friends a risky behavior that could lead to a computer or account compromise?
yes
Steven is taking 73-100 this semester, and gets copies of his roommate's graded homework assignments who took the course last year to make sure he has the correct answers. Is this cheating?
yes
A large amount of spam being sent from your Andrew email account is detected. Select the action that is most likely to occur.
your andrew account is suspended