module 3 - social media and your digital identity

Ace your homework & exams now with Quizwiz!

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

$50.00

Select all that apply: Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following? - systems -procedures -processes -audiovisuals

- procedure - processes - systems

Select all that apply Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)? - red flags rule - ftca -fcra -coppa

- the red flags rule - coppa

Select all that apply According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following? - literacy works -thoughts -music -pictures

-literacy works -music -pictures

Software theft occurs when someone engages in which three of the following?

-steals software programs -illegally copies program (piracy) -illegally activates/registers a program

Select all that apply Internet privacy is a wide-ranging term that refers to a variety of considerations including which three of the following? - technique/technologies used to protect sesntive and private data, comm, and preferences - what hardware/software you use - how data/info is used - who has access to data/info

-technique/technologies used - how data/info is used - who has access to data/ information

The Internet era use of emoticons can be traced to September _____, when computer scientist Scott Fahlman suggested to the Carnegie Mellon University message board that emoticons could be used to distinguish jokes from serious statements online.

1982

BSA-The Software alliance is headquartered in Washington, DC and operates in more than _____ countries.

60

Which of the following should be considered when using Twitter? Multiple select question. If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter. Most of the communication taking place on Twitter is viewable by everyone Twitter accounts contain personal information You cannot protect tweets so that manual approval is required to view them

A,B,C

Which of the following statements are true about Instagram? Multiple select question. Instagram charges a fee to download the app. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. Instagram is a subsidiary of (is owned by) Facebook.

According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. Instagram is a subsidiary of (is owned by) Facebook.

Which of the following statements are true about acceptable use policy (AUP)? Multiple select question. An AUP often accompanies most software applications AUP covers a broad spectrum of computer resources A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources End user licence agreement (EULA) and AUP are the same thing.

An AUP often accompanies most software applications AUP covers a broad spectrum of computer resources A well-written AUP should clearly state what a user is and is not allowed to do with these resources as well as general etiquette to follow when using shared resources

Which of the following are parts of a radio frequency identification (RFID) system? Multiple select question. Antenna Transponder Network Transceiver

Antenna Transponder Transceiver

Which of the following are considered e-commerce transactions? - b2c - c2c -b2b -g2b

B2C C2C B2B

Match the transaction to the correct type of e-commerce method. B2C, C2C,B2B

B2C: a consumer makes a purchase from Overstock.com. C2C: A consumer makes arrangements to buy used snowboard equipment from another consumer on Craigslist.com. B2B: Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the Internet.

Which of the following statements are true about best practices for the use of an employee-monitoring program? Multiple select question. Be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it. The use of Web and Internet filters are not advised when designing an employee-monitoring program. Preventing employee access to time-wasting or inappropriate sites can help to stop trouble before it begins. Check reports sporadically.

Be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it. Preventing employee access to time-wasting or inappropriate sites can help to stop trouble before it begins

Which of the following are examples of EFT transaction? Direct deposit of your paycheck Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket Writing a paper check to pay your utility bill Using your debit card to purchase gas

Direct deposit of your paycheck Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket Using your debit card to purchase gas

Which of the following statements are the appropriate practices regarding online dating services?

Do not give out too much personal information before actually meeting the person. Make sure your initial meeting is in a public place.

There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?

Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement. Accidentally downloading pornography that is labeled as a different file.

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

EDI

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT

_____ software is designed to track and record the use of network and hardware resources in the workplace by employees.

Employee-monitoring

Which of the following are e-mail etiquette considerations?

Keep your messages brief yet specific to the subject of the message Avoid ambiguity Use proper spelling and grammar in your messages

Which of the following are e-mail etiquette considerations? Multiple select question. In professional messages you should use emoticons Keep your messages brief yet specific to the subject of the message Use proper spelling and grammar in your messages Avoid ambiguity

Keep your messages brief yet specific to the subject of the message Use proper spelling and grammar in your messages Avoid ambiguity

Which of the following statements are true about LinkedIn? Multiple select question. It is a good idea to post family reunion photos on LinkedIn to personalize your profile. LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities. LinkedIn never charges for any services. LinkedIn should be used as an integrated component of creating your professional brand identity.

LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities. LinkedIn should be used as an integrated component of creating your professional brand identity.

Which two of the following statements are true about BitTorrent? Multiple select question. To make file transfer faster BitTorrent breaks small files into larger ones. Movie streaming and Torrent sites account for more than half of all Internet traffic. Files on BitTorrent have been checked and are guaranteed to be free of malware. BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files.

Movie streaming and Torrent sites account for more than half of all Internet traffic. BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files.

_____ are free openly licensed learning resources that are available online for instructors and students. There are a variety of these resources available including textbooks, assignments, games, and digital media.

OER

Select which of the following are true about personal websites. Multiple select question. Personal websites are created as a means to showcase your skills and differentiate yourself from the competition. A recent study by Domaine.ME found that 17 percent of human resource (HR) professionals said that a personal website provides more insight into a candidate than a traditional resume alone. Personal websites include information about schools attended, jobs, and extracurricular activities. A personal website is one of the most critical elements to building an awesome personal brand.

Personal websites are created as a means to showcase your skills and differentiate yourself from the competition. Personal websites include information about schools attended, jobs, and extracurricular activities. A personal website is one of the most critical elements to building an awesome personal brand.

Commonly downloaded files include which three of the following? Multiple select question. Programs/apps Updates VoIP calls Video files

Programs/apps Updates Video files

Select the characteristics of PayPal. Multiple select question. Tells the seller which bank the buyer uses Provides buyer protection against fraud Free for the buyer to use PayPal charges a small fee for downloading its mobile app

Provides buyer protection against fraud Free for the buyer to use

Which of the following statements are true regarding RFID? Multiple select question. RFID stands for radio frequency integrity High-frequency RFID can transmit signals more than 100 miles RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.

RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.

Which of the following are email etiquette considerations? Multiple select question. Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. You do not have to worry about what you say in an e-mail because it is unlikely you will ever have to meet the person face-to-face. Write your messages carefully. Once you send a message you cannot rescind it. Be cautious so you do not hit "reply all" if you do not intend to do so.

Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. Write your messages carefully. Once you send a message you cannot rescind it. Be cautious so you do not hit "reply all" if you do not intend to do so.

There are risks associated with downloading content from the Internet. Which of the following are important to consider when downloading from the Internet? Multiple select question. Your antivirus software will ensure your files are safe. The source of the content. It is important to consider if the content came from a legitimate source. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer. Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses.

The source of the content. It is important to consider if the content came from a legitimate source. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer. Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses.

Genealogical DNA testing allows users to check their genetic backgrounds. Which of the following two are disadvantages associated with this testing? Multiple select question. The Internal Revenue Service (IRS) can more easily track you down in the case of tax evasion. The military may determine your genes are important to national defense. There is the potential for insurance companies to one day use this information to your disadvantage. Potential that your personal DNA data may be misused.

There is the potential for insurance companies to one day use this information to your disadvantage. Potential that your personal DNA data may be misused.

Which of the following are considered Intellectual property? Trademarks Trade secrets General ideas Patents

Trademarks Trade secrets Patents

Which of the following statements are true about Facebook? Multiple select question. Facebook does not share information Unless you specify differently, photo tagging creates a link to your Facebook timeline. Every time you post something on any social media site, you are impacting your online identity. Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others.

Unless you specify differently, photo tagging creates a link to your Facebook timeline. Every time you post something on any social media site, you are impacting your online identity. Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others.

Which of the following statements are true about best practices when using LinkedIn? Multiple select question. You cannot use LinkedIn to apply for jobs. Use up-to-date information and images on LinkedIn. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page. LinkedIn does not include a resume tool, so you will have to create one and upload it to the site.

Use up-to-date information and images on LinkedIn. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page.

Which of the following are examples of EFT transaction? Multiple select question. Writing a paper check to pay your utility bill Using your debit card to purchase gas Direct deposit of your paycheck Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket

Using your debit card to purchase gas Direct deposit of your paycheck Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket

Select all that apply Which of the following statements are true about WhatsApp Messenger? Multiple select question. Whats App is a popular way to make phone calls and send text messages via mobile app. WhatsApp uses your cellular data plan to exchange messages and cannot be used with Wi-Fi connections. WhatsApp has over 2 billion users worldwide. WhatsApp messenger is only available for Android operating system.

Whats App is a popular way to make phone calls and send text messages via mobile app. WhatsApp has over 2 billion users worldwide.

The most downloaded cross-platform messaging app that allows you to send and receive messages without having to pay for SMS (text messaging) is

WhatsApp

Select all that apply Which of the following statements are true about employee-monitoring software? Multiple select question. Why is this software used? A current study identified that 21 to 31 percent of employees sent e-mails with sensitive information outside the company network. The use of employee-monitoring software does not need to be explicitly stated in the AUP of the organization. Employee-monitoring software is designed to track and record the use of network and hardware resources in the workplace by employees. Employee-monitoring software can be used to track e-mail, monitor network and Internet usage, and set Web filters.

Why is this software used? A current study identified that 21 to 31 percent of employees sent e-mails with sensitive information outside the company network. Employee-monitoring software is designed to track and record the use of network and hardware resources in the workplace by employees. Employee-monitoring software can be used to track e-mail, monitor network and Internet usage, and set Web filters.

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of: Multiple choice question. computers networks websites all of the above

all of above

There are a variety of emoji that are used by different operating systems and programs including: -ios -android -skype -all of above

all of above

Multiple Choice Question You should use LinkedIn to connect with other professionals including: Multiple choice question. business contacts colleagues peers from college All of the above

all of the above

Which of the following are ethical concerns when using social media? Multiple choice question. Often unknowingly, every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. Every action you make online leaves a cyber footprint. Information is collected by nearly all online companies including Google, Apple, Facebook, Instagram, Twitter, and thousands of other companies. The data collected from social media sites are beneficial to marketers, businesses, and any entity that needs data on online behavior. All of the above

all of the above

A popular peer-to-peer file sharing protocol that allows users to share software, movies, and other files is _____. Multiple choice question. BitTorrent hypertext transfer Adobe Reader file transfer protocol

bittorrent

Experts suggest making connections with the three Cs: Company, _____, and Colleagues.

college

A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is _____ Commons.

creative

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.

creative

Which of the following statement is true about Facebook?

cyberstalking and online predators

Multiple Choice Question The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic: Multiple choice question. data interchange diary interchange digital interchange document interchange

data interchance

Every action you make online leaves a cyber or ___ footprint.

digital

Signed into law by President Clinton in 1998, The ____ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

digital

match the phrases with the term they are most closely associated with: - digital identity - internet privacy

digital identity- online search activities, social media posting, purchasing behavior internet privacy - who has access to data/information, techniques and tech used to protect sensitive data/info, how data/info is used

Free openly licensed learning resources that are available online for instructors and students to use are called Open ____ Resources.

educational

Popular online dating sites include:

eharmony, zoosk, match

Pictures or graphics that are used in text and e-mail messages are called

emoji

The standard code of respectful behavior in society or among members of a particular profession or group is called

etiquette

While Instagram, Snapchat, and Twitter have grown rapidly, the most widely used social media site is

facebook

International laws on Internet privacy are very similar.

false

true or false Snaps are temporary and cannot be saved and forwarded to others.

false

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio ______ Identification.

frequency

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ______ Transfer.

funds

Emoticon is a blending of the words emotion and ______ and refers to keyboard characters that are used to represent facial expressions and objects.

icon

Initially used in e-mail, chat, and text messages as a form of informal correspondence, _____ acronyms are widely used today.

internet

International laws on ____ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. - intranet - network - internet - system

internet

the right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet is called ____ privacy.

internet

Personal branding can be accomplished through a variety of means including:

interpersonal skills social media Web presence

Select all that apply Social media integrates a variety of multimedia including which three of the following? Multiple select question. Messages Images Video Laptops

messages, images, video

A key component in an employee- _____ program is the utilization of Web and Internet filters.

monitoring

Select all that apply Which of the following are protected by intellectual property laws against unauthorized use or distribution? - movies - open educational resources - video games - software ideas

movies, videogames

Which of the following are considered Intellectual property? Multiple select question. General ideas Patents Trade secrets Trademarks

patents, trade secrets, trademarks

Instagram is generally considered a ______-sharing app although it can be used for sharing videos.

photo

Best practices when using social media to create a personal brand include: post regularly to your social media sites. keep an updated profile. as a rule of thumb you should check/post to your social media sites once a month consider joining chat and Internet groups that reflect your personal and professional interests.

post regularly to your social media sites. keep an updated profile. consider joining chat and Internet groups that reflect your personal and professional interests.

Using DNA ancestry testing services such as 23 and Me and Ancestry.com can open interesting avenues of discovery. One disadvantage to using these services is the potential loss of ___, as your personal DNA data will be loaded into a large database.

privacy

Which of the following are associated with Facebook?

profile, pages, likes

The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in 1998. The Act implements two World Intellectual _______ Organization treaties.

property

If you suspect you have received pirated software you can report the incident to the BSA at _____.

reporting.bsa.org

The formal term for a greeting to the recipient of an e-mail message is called a

salutation

Put the following elements in the correct order in which they appear in an e-mail.

salutation body complimentary close signature line

To adjust your privacy settings in Facebook, make sure you are logged in, then click on your ______ to access the security settings.

settings

The first social media site to allow users to create profiles, organize groups, and invite friends was called _____.

sixdegrees.com

With over 6 billion image and video views per day ______ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

snapchat

The practice of using social media to expand the number of business and contacts people have is called _____ networking.

social

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

If someone illegally copies a program, then they have committed software ____

theft

A transceiver can both send and receive information. true or false

true

It is important to avoid using Internet acronyms in formal messages and with people you are not familiar with, such as professors and employers.

true

Passports issued by the United States and many other countries include radio frequency identification (RFID) chips.

true

Tweets can be made up of text, images, and video.

true

t/f If you do not adjust your privacy settings on Instagram anyone can follow you.

true

true or false If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

true

Electronic etiquette covers the use of: Multiple select question. text messages writing a letter and sending it in the mail social media e-mail

txt, social medial, email

Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet

web 2.0

What is a business' brand identity derived from? Multiple select question. Who people perceive them to be Who they are Who they want to be What their competition perceives them to be

who they are, they want to be, who people perceive them to be


Related study sets

The United States enters the War 3

View Set

Quiz: Module 06 Wireless Networking

View Set

Supervision and Human Relations - Exam 2 Study Set

View Set

Exam 2 TX GOVT (Ch 6, Ch 5, Ch 4)

View Set

Pt 8, Pt 7, pt 6, Pt 5, Pt 4, Pt 3, Pt 2, Pt 1, Test 1

View Set

Canvas Final Exam Review Notes 3

View Set

NURS 1118 4.1 Outcomes Patient Education

View Set

Penguin Dictionary of Literary Terms and Criticism - A II

View Set