Internet Security

Ace your homework & exams now with Quizwiz!

The two main factors concerning your digital identity are privacy and ________

security

Social networking is based on the 6 degrees of _________ concept which posits that you can connect with anyone through a chain of no more than six instructions or personal links

seperation

When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called _______ ________.

software piracy

Parts of RFID system include

transceiver, transponder, and antenna

WhatsApp users can create groups and send _______ images, videos and messages for free

unlimited

If your debit card has been compromised and you wait more than two days, but fewer than 2 months, you are liable up to how much?

$500

Which of the following statements about Instagram are true? 1) if you don't want to be tracked turn off geo tagging in the settings under Location Settings 2)it is important to adjust your privacy so you can determine who follows you 3) your profile section must be accurate 4) instagram is difficult to integrate with apps like FB and foursquare

1 and 2

A digital identity is composed of a variety of attributes including which? 1)usernames and passwords 2) online search activities 3) personal data such as your social security number and birthdate 4) the spreadsheet software you're using

1, 3, and 3

Software theft occurs when someone engages in all of the following except: 1)stealing software programs 2)erasing a program you purchased then sold to a friend 3)illegally registering a program 4)illegally copying a program

2

Twitter recommends using no more than _____ hashtags per tweet?

2

Which of the following statement about FACEBOOK is TRUE? 1) photo tagging doesn't create a link to your timeline 2) potential employers are prohibited from searching fb pages 3)cyberstalking and online predators are a real problem on fb 4)anything posted on fb is private

3

All of the following are true about RFID except: 1) RFID doesn't require line of sight scanning 2)it can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip 3)RFID stands for Radio Frequency Identification 4) high frequency RFID can transmit signals further than 1500 ft

4

If your debit card has been compromised and you wait two days you are liable up to how much?

500


Related study sets

Writing Workshop: Narrative Writing - American Individualism

View Set

Chapter 64: Arthritis and Connective Tissue Diseases

View Set

Chapter 10 & 11 Final Exam Review

View Set

444: Exam 3 - Davis Success & Lecture notes

View Set