Deck 12: Internet Use, Ethics, and Technology

ملء الشاشة (f)
exit full mode
سؤال
Which among the following is not applicable to internet use

A)Do not use email to strangers
B)Do not give out your email address to people you doesn't know
C)Do not open email attachments from people you don't know
D)Pretend to be someone else when you are online.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which among the following is applicable to internet use

A)Do not sent Spam, Worms and Viruses into cyberspace
B)Do not be rude or use bad language while you use email
C)Do not disclose your personal information such as your bank a/c number, passwords etc
D)All of these
سؤال
Which among the following is unethical use of cell phone

A)Do not accept call while driving
B)Switch off cell phone inside an aircraft
C)Do capture the images of others without permission of that person
D)Keep silent tone in meetings
سؤال
A repetitive strain injury (RSI) in computer users caused by

A)Improperly positioned key-boards
B)a/c room
C)Proper lighting
D)Adjustable chair
سؤال
Which of the following is not true of ethical computing guidelines

A)Not to use computer to promote lies
B)Use computers with consideration and respect for others
C)Avoid causing harm to othrs when using computer
D)Snoop in other people's computer files.
سؤال
The following metric is a measure of the journal quality

A)Impact factor
B)Prize
C)Article size
D)None of the above
سؤال
The main advantage(s) of online education is (are)

A)Personalized education
B)Better flexibility
C)Better accessibility
D)All of the above
سؤال
Pick the odd one out

A)Spam
B)Spyware
C)Antivirus
D)Hoax
سؤال
A ............. is a small text file which is placed on your computer on the request made by the web server to your browser.

A)Spam
B)Cookie
C)Web bugs
D)Worms
سؤال
----- is an example of software being created independent of any money- making incentive or any property rights

A)Spyware
B)Adware
C)Freeware
D)Malware
سؤال
A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

A)Software piracy
B)Personal privacy
C)Computer theft
D)Identity theft
سؤال
Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

A)Black-hat hackers
B)White-hat hackers
C)Both Black-hat hackers and White-hat hackers
D)Neither Black-hat hackers nor White-hat hackers
سؤال
If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

A)Quarantining
B)Searching
C)Phishing
D)All of these
سؤال
The discrepancy between the "haves" and "have-notes" with regards to computer technology is commonly referred as:

A)Social Justice
B)Intellectual Property Right
C)Digital Divide
D)Accountability
سؤال
An online archive of multidiscipline journal articles in the most significant professional journals.

A)ICPR
B)Jstor
C)Orkut
D)Facebook
سؤال
Which among the following is true

A)Internet is a democratic technology
B)Internet protects personal privacy
C)Internet facilitate the spread of right information
D)None of the above
سؤال
Which among the following skills need for locating appropriate information on the Internet

A)the ability to use Internet tools such as search engines
B)having knowledge of search techniques and ability to execute the search.
C)One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
D)All of these
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Internet Use, Ethics, and Technology
1
Which among the following is not applicable to internet use

A)Do not use email to strangers
B)Do not give out your email address to people you doesn't know
C)Do not open email attachments from people you don't know
D)Pretend to be someone else when you are online.
Pretend to be someone else when you are online.
2
Which among the following is applicable to internet use

A)Do not sent Spam, Worms and Viruses into cyberspace
B)Do not be rude or use bad language while you use email
C)Do not disclose your personal information such as your bank a/c number, passwords etc
D)All of these
All of these
3
Which among the following is unethical use of cell phone

A)Do not accept call while driving
B)Switch off cell phone inside an aircraft
C)Do capture the images of others without permission of that person
D)Keep silent tone in meetings
Do capture the images of others without permission of that person
4
A repetitive strain injury (RSI) in computer users caused by

A)Improperly positioned key-boards
B)a/c room
C)Proper lighting
D)Adjustable chair
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not true of ethical computing guidelines

A)Not to use computer to promote lies
B)Use computers with consideration and respect for others
C)Avoid causing harm to othrs when using computer
D)Snoop in other people's computer files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
The following metric is a measure of the journal quality

A)Impact factor
B)Prize
C)Article size
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
The main advantage(s) of online education is (are)

A)Personalized education
B)Better flexibility
C)Better accessibility
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
Pick the odd one out

A)Spam
B)Spyware
C)Antivirus
D)Hoax
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ............. is a small text file which is placed on your computer on the request made by the web server to your browser.

A)Spam
B)Cookie
C)Web bugs
D)Worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
----- is an example of software being created independent of any money- making incentive or any property rights

A)Spyware
B)Adware
C)Freeware
D)Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

A)Software piracy
B)Personal privacy
C)Computer theft
D)Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

A)Black-hat hackers
B)White-hat hackers
C)Both Black-hat hackers and White-hat hackers
D)Neither Black-hat hackers nor White-hat hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

A)Quarantining
B)Searching
C)Phishing
D)All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
The discrepancy between the "haves" and "have-notes" with regards to computer technology is commonly referred as:

A)Social Justice
B)Intellectual Property Right
C)Digital Divide
D)Accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
An online archive of multidiscipline journal articles in the most significant professional journals.

A)ICPR
B)Jstor
C)Orkut
D)Facebook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which among the following is true

A)Internet is a democratic technology
B)Internet protects personal privacy
C)Internet facilitate the spread of right information
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which among the following skills need for locating appropriate information on the Internet

A)the ability to use Internet tools such as search engines
B)having knowledge of search techniques and ability to execute the search.
C)One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
D)All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.