Part 2 - Online Services & Ethics

Ace your homework & exams now with Quizwiz!

If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of _____.

$50

Waiting for more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of _____.

$500

If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days

1

After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.

10

In most cases, the Posts on a standard X account can be a maximum of __ characters.

280

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

BSA-The Software alliance is headquartered in Washington, DC and operates in more than _____ countries.

60

B2C (business-to-consumer)

A consumer makes a purchase from Overstock.com

C2C (consumer-to-consumer)

A consumer makes arrangments to buy used snowboard equipment from another consumer on Craigslist.com

Select all that apply Which of the following statements are true about ergonomics?

A very important element of an effective workplace safety plan Derived from the Greek words ergon (work) and nomoi (natural laws). The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer stations

B2B (business-to-business)

Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the internet

Select all that apply Which of the following are e-mail etiquette considerations?

Avoid ambiguity Keep your messages brief yet specific to the subject of the message Use proper spelling and grammar in your messages

Select all that apply Which of the following are considered e-commerce transactions?

B2C C2C B2B

A popular peer-to-peer file sharing protocol that allows users to share software, movies, and other files is _____.

BitTorrent

Select all that apply Which of the following have been cited as social risks associated with playing computer games online?

Computer/game addiction Identity theft Virtual mugging, cyber prostitution, and protection schemes

Select all that apply Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions?

Copyright and intellectual property rights Information privacy rights Quality of life

Signed into law by President Clinton in 1998, The _____ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

EDI (electronic data interchange)

The technical term for electronic or online banking. _____ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another.

EFT (electronic funds transfer)

While Instagram, Snapchat, and Twitter have grown rapidly, the most widely used social media site is _______.

Facebook

International laws on Internet privacy are very similar.

False

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

False

Snaps are temporary and cannot be saved and forwarded to others.

False

Select all that apply Select the characteristics of PayPal.

Free for the buyer to use Provides buyer protection against fraud

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic ________ Transfer.

Funds

Do you understand the Digital Millennium Copyrights Act? The DMCA protects ___ from liability for copyright violations of its users.

ISPs (internet service providers)

Select all that apply Software theft occurs when someone engages in which three of the following?

Illegally copying a program (called piracy) Illegally activating or registering a program Stealing software programs

Technological risk

Insecure or compromised game servers Viruses, worms, and malware

Select all that apply Which of the following statements are true about Instagram?

It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android. Instagram is a subsidiary of (is owned by) Facebook. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures."

The world's most popular social network site for business professionals is ________

LinkedIn

Select all that apply Which of the following statements are true about LinkedIn?

LinkedIn should be used as an integrated component of creating your professional brand identity. LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities.

In October 2021, Facebook changed its name to

Meta

Select all that apply Which of the following are protected by intellectual property laws against unauthorized use or distribution?

Movies Video games

Which of the following are ethical concerns when using social media?

Often unknowingly, every time you search for information on the Web, post to a social media site, make an online purchase your actions are being recorded. Every action you make online leaves a cyber footprint. Information is collected by nearly all online companies including Google, Apple, Facebook, Instagram, Twitter, and thousands of other companies. The data collected from social media sites are beneficial to marketers, businesses, and any entity that needs data on online behavior. All of the above (all true)

Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _________

Paypal

Select all that apply Which of the following statements are true regarding RFID?

RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals

Select all that apply Which of the following are email etiquette considerations?

Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. Write your messages carefully. Once you send a message you cannot rescind it. Be cautious so you do not hit "reply all" if you do not intend to do so.

The first social media site to allow users to create profiles, organize groups, and invite friends was called _____.

SixDegrees.com

With over 6 billion image and video views per day _________ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

Snapchat

Select all that apply Genealogical DNA testing allows users to check their genetic backgrounds. Which of the following two are disadvantages associated with this testing?

There is the potential for insurance companies to one day use this information to your disadvantage. Potential that your personal DNA data may be misused.

The main governmental organization that oversees Internet privacy in the United States is the Federal _________ Commission.

Trade

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

True

In X, Posts can be made up of text, images, and video.

True

The BitTorrent protocol allows users to share large files over the Internet.

True

You should use job-/career-specific keywords in your LinkedIn profile because the site automatically generates them based on your school and job information.

True

Select all that apply Which of the following statements are true about best practices when using LinkedIn?

Use up-to-date information and images on LinkedIn. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page.

Select all that apply Social media integrates a variety of multimedia including which three of the following?

Video Images Messages

Social risk

Virtual mugging, cyber prostitution, and protection schemes Computer/game addiction Identity theft

Social media was made possible by _____ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

Select all that apply What is a business' brand identity derived from?

Who they are Who people perceive them to be Who they want to be

Select all that apply Which of the following statements are true about employee-monitoring software?

Why is this software used? A current study identified that 21 to 31 percent of employees sent e-mails with sensitive information outside the company network. Employee-monitoring software can be used to track e-mail, monitor network and Internet usage, and set Web filters. Employee-monitoring software is designed to track and record the use of network and hardware resources in the workplace by employees.

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ________ use policy

acceptable

In business, _____ is the practice of creating a name, symbol/design (logo) that differentiates one product/service from other products/services.

branding

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of ________

computers networks websites all of the above (yes all)

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _________.

copyright

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is _____ Commons.

creative

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic _________ interchange.

data

Every action you make online leaves a cyber or _________ footprint

digital

Transferring a file from the Internet to your digital device is called _________

download

Select all that apply Electronic etiquette covers the use of:

e-mail text messages social media

Select all that apply Popular online dating sites include:

eHarmony Match Zoosk

_____ software is designed to track and record the use of network and hardware resources in the workplace by employees.

employee-monitoring

Derived from the Greek word ergon (work) and nomoi (natural laws), is an important element of workplace safety.

ergonomics

People use the __ symbol (#) before a relevant keyword or phrase (no spaces) in their Post to categorize those Posts and help them show more easily in X search.

hashtag

International laws on privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

internet

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

The world of highly immersive Internet experiences that usually involve the use of virtual reality or augmented reality is referred to as the ___

metaverse

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

Digital Identity

online search activities purchasing behavior social media postings

Instagram is generally considered a ______-sharing app although it can be used for sharing videos.

photo

If someone illegally copies a program, then they have committed software ________

piracy

X is an information network made up of videos or character messages called __.

posts

Along with the price, a major concern associated with genealogical DNA testing is ____________

privacy

Select all that apply Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following?

processes system procedure

On Facebook, your _____ is a collection of the photos, stories, and experiences that tell people about you and your experiences.

profile

If you suspect you have received pirated software you can report the incident to the BSA at _____.

reporting.bsa.org

The six degrees of _____ concept states that you can connect with anyone through a chain of no more than six introductions or personal links. Multiple choice question.

separation

To adjust your privacy settings in Facebook, make sure you are logged in, then click on your ________ to access the security settings.

settings

US-CERT classifies the risks of online computer gaming into two categories: Technological risks and _____ risks.

social

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC). Multiple choice question.

state

internet privacy

who has access to data and information how data and information is used techniques and technologies used to protect sensitive data and information


Related study sets

NUR 221 - Ch 3 WB - Chronic Illness and End-of-Life Care

View Set

Celebrating Freedom and American Democracy- 92%

View Set

Module 13 Chapter 6 Values, Ethics and Advocacy PrepU

View Set

PNB 3255 - Exam #1 - Class 6 - Cranial Nerves Lecture

View Set

Municipal Bonds: Local Government Securities (Ch. 8)

View Set

CompTIA Security+ Exam SY0-501 Wireless Security

View Set