CIS Chapter 3 Social Media and Your Digital Identity

Ace your homework & exams now with Quizwiz!

Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ____ per year as a result of pirated software.

$25 billion

Which of the following statements are true about Instagram?

-According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." -It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. -Instagram is a subsidiary of (is owned by) Facebook.

Which of the following are parts of a radio frequency identification (RFID) system?

-Atenna -Transponder -Transceiver

Which of the following are considered e-commerce transactions?

-B2B -C2C -B2C

Which of the following are examples of downloading a file?

-Copying a driver from a company's website and saving it to your computer -Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) -Copying a photo from Facebook and saving it to your desktop

Which of the following statement is true about Facebook?

-Cyberstalking and online predators are a real problem on Facebook

Which of the following statements are the appropriate practices regarding online dating services?

-Do not give out too much personal information before actually meeting the person. -Make sure your initial meeting is in a public place.

There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?

-Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement. -Accidentally downloading pornography that is labeled as a different file.

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

-EDI

There are risks associated with downloading content from the Internet. Which of the following are important to consider when downloading from the Internet?

-Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses. -The source of the content. It is important to consider if the content came from a legitimate source. -When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer.

Match the phrases with the term they are most closely associated with. Internet privacy

-How data and information is used -Techniques and technologies used to protect sensitive data and information -Who has access to data and information

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?

-Music -Literary works -Pictures

People use the ____________symbol (#) before a relevant keyword or phrase (no spaces) in their tweet to categorize those tweets and help them show more easily in Twitter search.

hashtag

Emoticon is a blending of the words emotion and ________ and refers to keyboard characters that are used to represent facial expressions and objects.

icon

To post content to Pinterest, you start with a(n) _____ or a photo.

image

Human knowledge and ideas that the law protects against unauthorized use by others is considered______ property.

intellectual

The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet is called ______ privacy.

internet

Internet-based software applications and interfaces that let individuals, businesses, and other entities interact with each other are called social

media

BitTorrent utilizes no central server, instead opt to utilize a _____ structure where each device connected to a network has equal access to the shared files.

peer-to-peer

Instagram is generally considered a ________-sharing app.

photo

When you personally share an image on Pinterest it is known as a _____.

pin

If someone illegally copies a program, then they have committed software

piracy

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software_____________has occured

piracy

In Instagram it is important to adjust your _______ settings so you can determine who follows you.

privacy

Using DNA ancestry testing services such as 23 and Me and Ancestry.com can open interesting avenues of discovery. One disadvantage to using these services is the potential loss of ___, as your personal DNA data will be loaded into a large database.

privacy

On Facebook, your _____ is a collection of the photos, stories, and experiences that tell people about you and your experiences.

profile

To adjust your privacy settings in Facebook, make sure you are logged in, then click on your to _________________access the security settings.

settings

The practice of using social media to expand the number of business and contacts people have is called _______________ networking.

social

Tweets can be made up of text, images, and video.

true

Twitter is an information network made up of 280-character messages called

tweets

WhatsApp users can create groups, and send _____ images, video, and audio messages for free.

unlimited

1. A digital identity is composed of a variety of digital attributes including which three of the following?

· Online search activities · Personal data such as your social security number and birth date · Usernames and passwords

Which of the following are associated with Facebook?

-Pages -Profiles -Likes

Select the characteristics of PayPal.

-Provides buyer protection against fraud -Free for the buyer to use

Match the phrases with the term they are most closely associated with. Who has access to data and informaton? Digital identity

-Purchasing behavior -Online Search activities -Social media postings

Which of the following statements are true regarding RFID?

-RFID does not require line-of-sight scanning -Can be used to identify or track a variety of objects including poker chips, products, and even animals.

Which of the following are email etiquette considerations?

-Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. -Be cautious so you do not hit "reply all" if you do not intend to do so. -Write your messages carefully. Once you send a message you cannot rescind it.

Software theft occurs when someone engages in which three of the following?

-Stealing software programs -Illegally activating or registering a program -Illegally copying a program (called piracy)

Internet privacy is a wide-ranging term that refers to a variety of considerations including which three of the following?

-Techniques and technologies used to protect sensitive and private data, communications, and preferences -How data and information is used -Who has access to data and information

Which of the following should be considered when using Twitter

-Twitter accounts contain personal information -If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter. -Most of the communication taking place on Twitter is viewable by everyone

Which of the following statements are true about Facebook?

-Unless you specify differently, photo tagging creates a link to your Facebook timeline. -Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. -Every time you post something on any social media site, you are impacting your online identity.

Which of the following are examples of EFT transaction?

-Using your debit card to purchase gas -Direct deposit of your paycheck -Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket

Which of the following statements are true about WhatsApp Messenger?

-Whats App is a popular way to make phone calls and send text messages via mobile app. -WhatsApp has over 2 billion users worldwide.

Popular online dating sites include:

-Zoosk -Match -eHarmony

1. Pros of online dating matches 2. Cons of online dating

1. -Online dating allows access to a wide variety of people -These sites are great for shy people 2. -Profiles on dating sites provide limited information and can be easily faked -Is the person really who they say they are?

1. If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____. 2. Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____. 3. After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate. 4. If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.

1. 50 2. 500 3. 10 4. 1

1. A consumer makes a purchase from Overstock.com 2. A consumer makes arrangements to buy used snowboard equipment with another consumer on Craigslist. 3. Alberstson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet.

1. B2C 2. C2C 3. B2B

Which of the following are ethical concerns when using social media? a) Often unknowingly, every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. b) Every action you make online leaves a cyber footprint. Information is collected by nearly all online companies including Google, Apple, Facebook, Instagram, Twitter, and thousands of other companies. c) The data collected from social media sites are beneficial to marketers, businesses, and any entity that needs data on online behavior.

All of the above

You should use LinkedIn to connect with other professionals including a) business contacts b) colleagues c) peers from college

All of the above

You should use LinkedIn to connect with other professionals including: a)Business contacts b) colleagues c) peers from college

All of the above

A leading advocate against software piracy for the global software industry is _______ The Software Alliance.

BSA

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

COPPA

International laws on Internet privacy are very similar

False

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

False

Snaps are temporary and cannot be saved and forwarded to others.

False

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ____________Transfer.

Funds

The DMCA protects ___ from liability for copyright violations of its users.

ISPS

The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet is called_______privacy.

Ineternet

International laws on _________ privacy , Correct Unavailable privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

Internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

Internet

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

Laws

It is a good idea to edit or remove skills endorsements from your ________(professional social media site) account that do not accurately reflect your skill set or experience.

LinkedIn

It is a good idea to edit or remove skills endorsements from your________ (professional social media site) account that do not accurately reflect your skill set or experience.

LinkedIn

The world's most popular social network site for business professionals is

LinkedIn

_____ are free openly licensed learning resources that are available online for instructors and students. There are a variety of these resources available including textbooks, assignments, games, and digital media. Multiple choice question. ORE

OER

A popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _____.

PayPal

Along with the price, a major concern associated with genealogical DNA testing is

Privacy

Passports issued by the United States and many other countries include ______________chips

RFID

The first social media site to allow users to create profiles, organize groups, and invite friends was called _____.

SixDegrees.com

In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection _____ or wallet.

Sleeve

With over 6 billion image and video views per day _____________ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

Snapchat

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

State

A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the Internet is Bit

Torrent

The main governmental organization that oversees Internet privacy in the United States is the Federal __________Comission

Trade

A transceiver can both send and receive information.

True

If you do not adjust your privacy settings on Instagram anyone can follow you.

True

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

True

You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information.

True

Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ____________ use policy.

acceptable

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of: a) computers b) networks c) websites

all of the above

A Radio frequency identification (RFID) systems consists of three components: ______________ , transponder, and transceiver.

antenna

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to- _______transaction.

consumer

Every action you make online leaves a cyber or _____________footprint.

digital

Pictures or graphics that are used in text and e-mail messages are called

emoji

The standard code of respectful behavior in society or among members of a particular profession or group is called

etiquette

Where in the profile and settings area of Twitter where would you click to protect tweets so that manual approval is needed to view them?

2

Tweets can be a maximum of _____ characters.

280

BSA-The Software alliance is headquartered in Washington, DC and operates in more than _____ countries.

60

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

Copyright

A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _____ Commons.

Creative

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.

Creative

The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Data

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

Data interchange

A digital presence created online by an individual or organization using a digital device is called a _____ identity.

Digital

Signed into law by President Clinton in 1998, The _____________ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Transferring a file from the Internet to your digital device is called

Downloading

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

Free openly licensed learning resources that are available online for instructors and students to use are called Open ________Resources.

Education


Related study sets

FTC (Federal Trade Commission) VOCAB

View Set

Final Exam Anthropology 208-003 (week 8-14)

View Set

Information Security and Assurance - C725 - Chapter 6

View Set

Lesson 1A - Networking Fundamentals

View Set

Chapter 8 - Appendicular Skeleton

View Set

Drivers Ed: Level 1 - Chapter 6 (Drive Responsibly)

View Set