CGS2060 Protecting Yourself on the Internet Quiz
All of the following should be considered when using Twitter except - if a Twitter user has been blocked you can file a formal complaint through Twitter. - you can protect Tweets so that manual approval is required to view them. - Twitter accounts contain personal information. - most of the communication taking place on Twitter is viewable by everyone.
if a Twitter user has been blocked you can file a formal complaint through Twitter.
All of the following are part of an RFID system except _____. - transceiver - network - transponder - antenna
network
All of the following are protected against unauthorized use or distribution by intellectual property laws except - open educational resources - movies - video games - music
open educational resources
BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files. - network - client/server - peer-to-peer - hierarchy
peer-to-peer
All of the following are best practices when using LinkedIn except - use up-to-date information and images on LinkedIn. - you can use LinkedIn to apply for jobs. - LinkedIn includes a resume tool, so you will have to create one and upload it to the site. - post vacation photos to show your friends where you've travelled.
post vacation photos to show your friends where you've travelled.
On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences. - profile - information - personality - username
profile
Two main factors concerning your digital identity are privacy and ___. - hardware - security - software - platform
security
Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ . - writing private journal entries - social media - web presence - interpersonal skills
writing private journal entries
Twitter recommends using no more than ___ hashtags per Tweet. - 3 - 4 - 5 - 2
2
All of the following are considered e-commerce transactions except - B2C - C2C - G2B - B2B
G2B
Transferring a file from the Internet to your digital device is called _____. - downloading - uploading - storing - saving
downloading
Pictures or videos taken and shared on Snapchat are called _____. - Snoops - Pics - Snaps - Snips
Snaps
Software theft occurs when someone engages in all of the following except _______. - illegally copying a program - illegally registering a program - stealing software programs - erasing a program you purchased then sold to a friend
erasing a program you purchased then sold to a friend
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____. - web savvy - AUP - netiquette - ECC
netiquette
Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links. - closeness - proximity - links - separation
separation
A businesses brand is derived from all of the following except ______ . - what their competition perceived them to be. - who they are. - what goals they want to accomplish. - who people people perceive them to be.
what goals they want to accomplish.
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons. - Creative - Productive - Innovative - Calculated
Creative
Which of the following statements about Facebook is true? - Cyberstalking and online predators are a real problem on Facebook. - Photo tagging doesn't create a link to your Facebook Timeline. - Potential employers are prohibited from searching Facebook pages. - Anything posted on Facebook is private.
Cyberstalking and online predators are a real problem on Facebook.
In the United States the federal _____ covers most consumer oriented electronic transactions. - EFT Law - Transaction Commission - ETF Act - EFT Act
EFT Act
The main governmental organization that oversees Internet privacy is the Federal ___ Commission. - Internet - Trade - Ethernet - World Wide Web
Trade
As of 2017, tweets can be a maximum of ___ characters. - 140 - 160 - 280 - 120
280
All of the following are true about Instagram except - according to Instagram "Instagram is a fun and quirky way to share your life with friends through a series of pictures". - if you specify a location with your photo, you can opt yo have Instagram check you in on Foursquare. - Instagram charges a fee to download the app. - Instagram is a photo sharing app that is available for download to a variety of digital devices.
Instagram charges a fee to download the app.
All of the following statements about Instagram are true except - it is important to adjust your privacy settings so you can determine who follows you. - Instagram is difficult to integrate with apps like Facebook and Foursquare. - if you don't want to be tracked turn off geo-tagging in the settings under Location Services. - the Profile section on Instagram lists your name, birthday, gender, and phone number.
Instagram is difficult to integrate with apps like Facebook and Foursquare.
There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except - when sharing files via the Internet via file sharing programs you can unknowingly give outside users access to your computer. - files downloaded from unknown sites and file sharing sites often contain a variety of malware including spyware and viruses. - your anti-virus software will ensure your files are safe. - the source of the content. It is important to consider if the content came from a legitimate source.
your anti-virus software will ensure your files are safe.