Living Online

Ace your homework & exams now with Quizwiz!

What is how data and information is used, techniques and technologies used to protect sensitive data and information, and who has access to data and information associated with?

Internet privacy

In business _______________ is the practice of creating a name, symbol/design (logo) that differentiates one product/service from other products/services.

branding

In order to create an SSL connection a web server requires an SSL _________________.

certificate

Search engine _______________ (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

optimization

Custom websites that are used to enhance a personal brand, which include information about schools attended, jobs, and extracurricular activated are called ___________ websites.

personal

If someone illegally copies a program they have committed software _____________.

piracy

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, this is called _____________.

software piracy

There are many internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the internet. These laws are created by both _________ and federal government. The main federal governmental organization that oversees internet privacy is the Federal Trade Commission (FTC).

state

A social media post that has been shared, copied, and spread across multiple dial media platforms and Internet sites by many people is called a __________ post.

viral

Human knowledge and ideas that the law protects against unauthorized use by others is considered _____________ property.

intellectual

Julia tyoes specific terms into a search engine (Google, Bing, Yahoo, etc,) when she wants to find an article on the World Wide Web. This is called a __________ search.

keyword

The average American spends over ___ hours a day viewing a display screen.

10

The TPP covers just under ____ percent of global GDP.

40

The TPP also stipulates the length of copyright terms. In the United States, perpetual copyrights and patents are prohibited, but extensions to copyright are allowed. Under the TPP, copyrighted works will pass into the public domain ______ years after the death of the creator, extending the term for some countries such as New Zealand by a further 20 years.

70

If typed into a search window, which of the following would show only the results of social media postings about pepperoni pizza? A) #pepperonipizza B) Pepperoni AND pizza C) www.pepperonipizza.com D) Pepperoni Pizza

A) #pepperonipizza

A domain name A) A text version of an IP address B) is the www portion C) The same as top level domain D) is the http:// portion

A) A text version of an IP address

Which of the following HTML objects will find web pages with hyperlinks? A) Anchor B) Image C) Wigi Text D) Site

A) Anchor

This email function allows users to maintain an organized Inbox without deleting emails A) Archiving B) Uploading C)FTP D) Downloading

A) Archiving

You should evaluate websites based on which 2 of the following criteria? A) Bias B) Objectivity C) Emotion D) Design

A) Bias B) Objectivity

Bandwidth is using measure in A) Bits per second B) Hertz C) Bytes per second D) MhZ

A) Bits per second

Which of the statements below are things to pay attention to when building an awesome personal brand? A) Create a personal website B) Make sure you know about your online presence C) Do not be too focused on what you share D) People's perception is not that important. It is the real you that matters.

A) Create a personal website B) Make sure you know about your online presence

A legal contract between the software manufacturer and the user of an application A) EULA B) Single-User License C) Network License D) Site License

A) EULA

Search __________ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine. A) Engine B) Effort C) Electronic D) Enhanced

A) Engine

A handy for people to remember websites is A) Use the domain name B) Write it down C) Always search using google D) Ask a friend

A) Use the domain name

Personal branding can be accomplished through a variety of means including: A) Business cards B) Email messages C) Text messages D) All of the above

D) All of the above

You should use LinkedIn to connect with other professionals including: A) Business contacts B) Colleagues C) Peers from college D) All of the above

D) All of the above

Which of the following are ethical or privacy concerns when using social media? A) Every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. B) Every action you make online leaves a cyber-footprint. C) The data that is collected from social media sites is beneficial to marketers, businesses, and any entity that needs data on online behavior D) Any browsing conducted in privacy mode is protected from tracking by others on the internet.

A) Every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. B) Every action you make online leaves a cyber-footprint. C) The data that is collected from social media sites is beneficial to marketers, businesses, and any entity that needs data on online behavior

3 commonly used search engines include which of the following? A) Google B) Bing C) Yahoo D) Microsoft Edge

A) Google B) Bing C) Yahoo

A bit is a represented by which one of these A) Mbs B) CBs C) MBs D) KBs

A) Mbs

A Byte is A) One character of information B) 8 characters of information C) Only a 0 or 1 D) Only a special character

A) One character of information

Robert wants to creat a professional identity using professionally-oriented social media sites. Which of the following are popular professionally-oriented social-media sites? A) Opportunity B) YouTube C) Miniclip D) Linkedin

A) Opportunity D) Linkedin

Best practices when using social media to create a personal brand include: A) Post regularly to your social media sites B) Keep an updated profile C) Consider joining chat and internet groups that reflect your personal and professional interests D) As a rule of thumb you should check/post to your social media sites once a month

A) Post regularly to your social media sites B) Keep an updated profile C) Consider joining chat and internet groups that reflect your personal and professional interests

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called ____________________. A) Quarantine B) Safety C) Partition D) Sector

A) Quarantine

Select the 3 statements about Boolean operators. A) Quotation marks make the search engine look for occurrences where the words are together rather than searching for individual occurrences B) The tactful use of quotation marks can return more relevant search results. C) Connect your search words with "AND" when you are searching for multiple items in the same page. D) AND is not common Boolean operator

A) Quotation marks make the search engine look for occurrences where the words are together rather than searching for individual occurrences B) The tactful use of quotation marks can return more relevant search results. C) Connect your search words with "AND" when you are searching for multiple items in the same page.

If you're reading an article and are concerned that it may be biased in one way or another, select 3 things that you can do to judge the author's objectivity. A) Remember that bias is introduced into everything, even though it may be unintentional B) Try to be aware of all sides of any issue. C) When viewing a website, investigate the background and other writings of the author and the site. D) Since bias is everywhere, no source is credible.

A) Remember that bias is introduced into everything, even though it may be unintentional B) Try to be aware of all sides of any issue. C) When viewing a website, investigate the background and other writings of the author and the site.

Select what's true about Search Engine Companies A) SEC stands for Search Engine Company B) The information contained in a search engine database is determined by how each specific company records URL information C) It is common practice for the wed site owner to submit their URL and associated information to the search engine company (SEC) D) SECs use indexes to slow down the search process

A) SEC stands for Search Engine Company B) The information contained in a search engine database is determined by how each specific company records URL information C) It is common practice for the wed site owner to submit their URL and associated information to the search engine company (SEC)

Wyatt owns a company that is about to launch an ecommerce website. He is concerned about securing the web visits and transactions. He is investigating a popular encryption technology called ______________ that is used for establishing an encrypted link between a web server and web browser. A) SSL B) SLL C) SSS D) SLS

A) SSL

The amount of time spent in a 24 hour period in front of a display screen is referred to as _________ time. A) Screen B) View C) Engaged D) Watch

A) Screen

If a web adress starts with HTTPS://, you are using A) Secure Socket Layer B) SST C) A virtual private network connection D) World Wide Web Socket

A) Secure Socket Layer

Which of the following are common software licenses? A) Single-user B) Site C) Network D) Global

A) Single-user B) Site C) Network

Which of the following are common software licenses? A) Site B) Network C) Single-user D) Global

A) Site B) Network C) Single-user

According to the FTC, which 2 of the following are important U.S. internet privacy laws/rules? A) The Red Flags Rule B) FCRA C) COPPA D) FTCA

A) The Red Flags Rule C) COPPA

If you use BCC: A) The TO: and CC: do not see the BCC: B) Only the TO: sender is aware of the BCC: C) Only the BCC: recipient receives the message D) Both the To: and CC: recipients are aware of the BCC:

A) The TO: and CC: do not see the BCC:

Tweets can be made up of text, images, and video. A) True b) False

A) True

Which of the following should be considered when using twitter? A) Twitter accounts contain personal information B) Most of the communication taking place on Twitter is viewable by everyone C) If you have a situation where a twitter user has been blocked, but the situation escalates you can file a formal report through twitter. D) You cannot protect tweets so that manual approval is required to view them.

A) Twitter accounts contain personal information B) Most of the communication taking place on Twitter is viewable by everyone C) If you have a situation where a twitter user has been blocked, but the situation escalates you can file a formal report through twitter.

A digital identity is composed of a variety of digital attributes including which 3 of the following? A) Usernames and passwords B) Personal data such as your social security number and birthdate C) Online search activities D) The type of spreadsheet software you are using.

A) Usernames and passwords B) Personal data such as your social security number and birthdate C) Online search activities D) The type of spreadsheet

What is a business' brand derived from? A) Who they are B) Who they want to be C) Who people perceive them to be D) What their competition perceived them to be

A) Who they are B) Who they want to be C) Who people perceive them to be

James want to determine the owner of a website. He will conduct a __________ search. A) WhoIS B) Boolean C) Domain D) Who Owns It

A) WhoIS

Internet addiction also referred to as Internet __________ Disorder (IAD) is excessive Internet use to the degree that it negatively affects daily life.

Addiction

Jerome wants to search for articles about banana pudding but his web search results also show results for chocolate pudding as well as articles about bananas. What should Jerome enter into the search window so that he only finds articles with the words banana pudding in them? A) (banana pudding) B) "banana pudding" C) banana AND pudding D) banana OR pudding

B) "banana pudding"

Programs that are used to scan files in order to identify and remove computer virus and other malicious programs are referred to as _____________ software. A) Firewall B) Anti-virus C) Operating System D) Pop-up blocker

B) Anti-virus

Choose what's true about Internet censorship. A) Companies in the United States cannot restrict employee access to resources on the Internet B) Many countries actively censor content on the Internet. C) The suppression of content (images, articles, videos, etc,) that can be accessed via the internet D) In the United States, direct censorship of the Internet by the government is prohibited by the First Amendment with the exception of obscenity such as child pornography

B) Many countries actively censor content on the Internet. C) The suppression of content (images, articles, videos, etc,) that can be accessed via the internet D) In the United States, direct censorship of the Internet by the government is prohibited by the First Amendment with the exception of obscenity such as child pornography

Find the incorrect statement about fee-based antivirus and free anti-virus software. A) Most of the free anti-virus programs perform almost as effectively as their fee-based counterparts B) One of the positives of free anti-virus software is their spam detection performance C) One to the main differences between free and fee anti-virus software is the number of features

B) One of the positives of free anti-virus software is their spam detection performance

This email function goes to the sender and anyone in the senders To: and CC: line A) BCC: B) Reply All: C) CC: D) Reply

B) Reply All:

Best practices when using social media to create a personal brans include: A) Make sure to post personal information so people can get an idea of who you really are B) Responding quickly to mentions of your name on social media sites C) Using the same name, profile pictures, and imagery across all social media platforms D) You should consider creating a username that is not taken that can be used across the various social media sites you plan to use

B) Responding quickly to mentions of your name on social media sites C) Using the same name, profile pictures, and imagery across all social media platforms D) You should consider creating a username that is not taken that can be used across the various social media sites you plan to use

Which of the following are examples of cyberbullying? A) Beating another online player in Madden 2018 by a score of 49-0 B) Sending threatening email and chat messages to someone C) Sending false information via a Twitter message D) Not accepting a Facebook friend request

B) Sending threatening email and chat messages to someone C) Sending false information via a Twitter message

Restricts the use of software to one user at a time. A) EULA B) Single-User License C) Network License D) Site License

B) Single-User License

Voice service over the internet is known as A) Asynchronous telephone service (ATS) B) VOIP C) String Network D) Telephonynet

B) VOIP

Select what's true about using the Boolean operators "OR" and "NOT". A) Boolean operators make using search engines less efficient B) You can also use /^ to execute an OR search C) Use "NOT" if you want to exclude certain results from your search D) Use "OR" when you are searching for documents including one or another of your search words

B) You can also use /^ to execute an OR search C) Use "NOT" if you want to exclude certain results from your search D) Use "OR" when you are searching for documents including one or another of your search words

_______ percent of human resource professionals said that a personal website provide more insight into a candidate than a traditional resume alone. A) 22 B) 32 C) 67 D) 47

C) 67

Which of these business email etiquette rules is false? A) Avoid using all caps B) Avoid jargon C) Avoid using a salutation D) Avoid test style shortcuts

C) Avoid using a salutation

Volume of data that can be carried in an amount of time A) Byte B) Mhz C) Bandwidth D) CATS

C) Bandwidth

Experts suggest making connections with the three Cs: Company, ____________ and Colleagues. A) Contemporaries B) Classmates C) College D)Community

C) College

An email signature A) Is automatically created by the email program B) Requires digital pencil C) Creates a consistent professional close to every mail D) Is outdated and unnessary

C) Creates a consistent professional close to every mail

Which of the following are ways to safely download antivirus software? A) Conduct a Google search and download from one of the sites that are listed B) Visit a freeware site and download one of the options that are listed C) Download the software from a trusted site like www.cnet.com D) Download the software from a known anti-virus software vendor

C) Download the software from a trusted site like www.cnet.com D) Download the software from a known anti-virus software vendor

When you use the internet, your ISP assigns an address to your router. This is known as A) Dynaflow B) Static IP address C) Dynamic IP address D) IP swapping

C) Dynamic IP address

Va'Jahn is conducting research for an assignment in his marketing class. He is concerned about which references he can use. His use of copyrighted material is protected by ____________ of information. This means he is permitted to use copyrighted information for commentary or editorial purposes without seeking permission. However, he must properly site the source in order to comply with fair use standards. A) Proper use B) Explicit use C) Fair use D) Educational use

C) Fair use

An organization's private network, restricted to authorized users A) Internet B) World Wide Web C) Intranet D) VPN

C) Intranet

Which is not an advantage of phone calls A) Better than email for conveying nuance B) Provides for voice inflection C) Much more appropriate after normal working hours D) More appropriate for bad news if face to face no practical

C) Much more appropriate after normal working hours

Enable anyone on a network the right to use software. A) EULA B) Single-User License C) Network License D) Site License

C) Network License

Felipe is starting to create a professional online identity. Which of the following are true regarding creating an professional online identity? A) Posts on Facebook will not impact a person's professional identity B) You should remain as anonymous as possible on professional-oriented social media sites C) Post your photo on professionally-oriented social media sites D) Regularly update your profile on professionally-oriented social media sites

C) Post your photo on professionally-oriented social media sites D) Regularly update your profile on professionally-oriented social media sites

Which of the following could online activities in your personal social media and email accounts can negatively impact your online professional identity? A) Post Instagram photos of a recent company community service event B) Post pictures of a recent family vacation C) Send an email about confidential company information D) Tweet negative comments about your boss and the business you work for

C) Send an email about confidential company information D) Tweet negative comments about your boss and the business you work for

Microsoft business collaboration platform that allows employees to collaborate on docs, etc A) Windows B) Outlook C) Sharepoint D) Skype

C) Sharepoint

The first social media site to allow users to create profiles, organize groups, and invite friends was called _________________. A) AOL B) Facebook C) Sixdegrees.com D) Myspace

C) Sixdegrees.com

Highest level in domain name system that identifies servers or sites A) Top Level Dynamic Interchange B) Top down address C) Top level domain D) Top limit digital name

C) Top level domain

Which of the following are protected by intellectual property laws against unauthorized use or distribution? A) Open Educational Resources B) Software ideas C) Video games D) Movies

C) Video games D) Movies

Gigabyte is..... A) Thousand bytes B) jillion bytes C) billion bytes D) trillion bytes

C) billion bytes

Symbolized by a "B" A) bit B) bite C) byte D) byt

C) byte

Copying files from a server on the internet onto your own computer A) uploading B) the transfer process C) downloading D) streaming

C) downloading

The protocol defines how the web pages transfer from a web server to a device. A) html B) hvac C) http D) ftp

C) http

1000 bytes of data is a A) megabyte B) megabit C) kilobyte D) kilobit

C) kilobyte

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is ______________ Commons.

Creative

Which of the following statements about facebook is true? A) You can permanently erase your profile and associated information from Facebook B) Photo tagging does not create a link to your Facebook timeline C) Anything posted on Facebook is private once even if it is shared with others D) Cyberstalking and online predators are a real problem on Facebook

D) Cyberstalking and online predators are a real problem on Facebook

A transmission using SSL means that the data is A) Faster because it is supersonic B) Compressed C) Scrambled D) Encrypted

D) Encrypted

Select the correct order, from smallest to largest A) MB,TB,GB,TB B) GB,MB,KB,TB C) TB,KB,MB,GB D) KB,MB,GB,TB

D) KB,MB,GB,TB

Maria wants to ensure she is using correct ergonomic posture. Which of the following is correct ergonomic posture? A) Wrists bent without any support B) Legs crossed and positioned anywhere on the floor C) Computer monitor positioned at least 3 feet from her body D) Keep legs parallel to the floor with feet flat on the ground

D) Keep legs parallel to the floor with feet flat on the ground

You have become the victim of cyberbullying. Which of the following is a step you should take to address the issue? A) Do not report the issue to the proper authorities B) Fight back at the bully online C) Try to resolve the bullying yourself D) Record evidence of the bullying

D) Record evidence of the bullying

Software is installed on the device of qualified users who request the software inside an organization. A) EULA B) Single-User License C) Network License D) Site License

D) Site License

If an organization's IP address is permanently assigned, this is known as A) MAC address B) Network Interface Address C) Dynamic IP address D) Static IP address

D) Static IP address

In business, online chat is often used A) To avoid a printed record on the conversation B) To reduce stress at work C) To have a private conversations with a co-worker D) To provide technical assistance

D) To provide technical assistance

What is purchasing behavior, social media postings, and online search activities associated to?

Digital Identity

Search _______________ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

Engine

Intellectual property ___________ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

Laws

A legal contract between the software manufacturer and the user of an application is called an End-User __________ Agreement.

License

The world'd most popular social network site for business professionals is ______________.

Linkedin

Use the Boolean operator ____ if you want to exclude certain results fro your search.

NOT

The principle that ISPs should give consumers access to legal Internet content on an equal basis. Net __________ means ISPs will be banned from slowing the delivery of a TV show simply because it's streamed by a video company tat completes with a subsidiary of the ISP.

Neutrality

Use ___ when you are searching for documents including one or another of your search words.

OR

The TPP stands for

Trans-Pacific Partnership

Most search engines use similar technology to execute an Internet search. The search engine uses a ______________ of Internet URLs, each record in the database contains information including the site URL, description and title, and keywords included in the site.

database


Related study sets

ATI: RN Comfort, Rest, and Sleep Assessment 2.0

View Set

U.S. History - Ch. 15, Sec. 3 - Questions

View Set

3.1-3.10 AP-Style MC Practice & Quizzes

View Set

CPC Practice Exam - 150 Questions

View Set

Part 4: Writing to Evaluate Mortimer's Style 222

View Set

Chapter 16 - Nursing's Challenge: To continue to evolve

View Set

Chapter 1: Canada's Population Patterns

View Set