Deck 11: Social Implications of IT

ملء الشاشة (f)
exit full mode
سؤال
When communicating via email, it is important to remember that face-to-face conversations can convey unspoken meaning while this may not be true for written communication .
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
It may be difficult to convey emotion in an email but emoticons can always express all human emotions adequately .
سؤال
It is better to write one email message that covers multiple topics than to write several messages, each covering one topic .
سؤال
When you reply to an email, it is best to include the context of the message you are replying to .
سؤال
Email backlogs should be answered in the order in which they were received .
سؤال
The majority of participants in crowdsourcing are motivated by large monetary rewards for themselves .
سؤال
A well-conceived password should be easy to remember and hard to guess .
سؤال
When choosing a security question that will be used to challenge your identity in the event of a forgotten password, the security question should have an answer that has not been publicly disclosed .
سؤال
With stringent laws against spam in so many places, spam is no longer a common problem .
سؤال
The use of shareware implies an obligation to pay for it .
سؤال
For your work to have copyright protection, the copyright symbol (©) must be listed on your work .
سؤال
A program that determines if an email is spam is always accurate .
سؤال
Web pages cannot be copyrighted .
سؤال
It is possible to figure out who is online, with the help of Internet Service Providers and companies like Microsoft .
سؤال
The word netiquette refers exclusively to email etiquette .
سؤال
When a new password is created for your computer system, it is encrypted and then stored in that form .
سؤال
Most email in the United States is a private conversation between the sender and the recipient .
سؤال
If your software is acting strange or your computer is behaving in a manner that seems unusual, you might have a computer virus .
سؤال
If your software is acting strange or your computer is behaving in a manner that seems unusual, this might indicate a software problem, such as disk fragmentation .
سؤال
One-way ciphers are reversible; they can be decoded .
سؤال
Information placed in the public domain is free for anyone to use in any form .
سؤال
It is legal to give commercial software to your friends but not to sell it .
سؤال
A password manager can create passwords that you don't have to remember .
سؤال
When you are working in a software program and it starts acting strange, you should

A) save your work with a new file name, exit, and restart
B) immediately shut down the computer
C) reinstall the software program
D) do nothing since minor glitches happen all the time
سؤال
Most email is

A) copyrighted
B) subject to censorship
C) easy to forward
D) private
سؤال
Before forwarding email, you should

A) include a disclaimer
B) notify the sender that you are forwarding it
C) get the sender's permission
D) All of these
سؤال
The textbook authors advocate

A) using a different password for every account
B) using three different passwords
C) changing passwords at least once a year
D) ignoring password policies of employers
سؤال
Which of the following is NOT difficult to convey in an email message?

A) emotion
B) sarcasm
C) ambiguity
D) emphasis
سؤال
Which of the following statements is TRUE about passwords?

A) They are encrypted and are compared using the encrypted version .
B) They are maintained in a list by the system administrator .
C) They must be changed every three months .
D) They can be viewed by a superuser .
سؤال
Which of the following is probably legal?

A) You and your friends pool your money to buy a computer game and then share it by making copies for each of you .
B) You buy one copy of a computer game and install it on your laptop and your desktop computer .
C) You buy one copy of a computer game and install it on your laptop, your brother's laptop, and your computer at work .
D) You buy a computer game and make copies for your friends .
سؤال
An example of a good password is

A) a word that includes symbols or numbers to represent some letters
B) the user's birthday
C) the user's pet's name
D) the user's nickname
سؤال
Before sending or posting emotional content by email or online

A) remember that, since email is private, your thoughts will be secure
B) send it to all the people you can think of who might be interested in your email
C) sleep on it
D) send it quickly, before you change your mind
سؤال
Which of the following is NOT an example of crowdsourcing?

A) Google
B) Foldit
C) Freerice
D) Be a Martian project
سؤال
Most login protocols

A) allow unlimited login attempts
B) shut off access after a single failed login attempt
C) allow several but not unlimited login attempts
D) None of these
سؤال
When choosing a password, a good way to help you remember it is to

A) choose something you're interested in and modify a phrase about that topic to obscure it
B) use the name of someone close to you
C) use an important date, such as your birthday
D) choose a random series of numbers and letters
سؤال
The origin of the word "spam"(used to describe junk email) is believed to be

A) the nickname of a small town in Russia
B) a shortened form of the phrase "spurious messages"
C) from a Monty Python skit
D) unknown
سؤال
You receive an email from your bank informing you that they are performing an audit and have found a problem with your account . They ask you to log in to help resolve the problem . This is an example of

A) a legitimate email
B) phishing
C) an advance-fee fraud
D) spam
سؤال
Generally speaking, a software license gives you

A) permission to resell the software
B) ownership of the software
C) use of the software
D) All of these
سؤال
Companies that make products available as open source software

A) are vendors like Microsoft and Adobe
B) will open the source code to a user for a fee
C) are promoting wide distribution of the software
D) are non-profit organizations
سؤال
Information that you did not create but can treat as your own is said to be

A) in the public domain
B) shareware
C) fair use
D) copyrighted
سؤال
Select all that apply . Which of the following can be considered a way the online world is different from usual offline interactions?

A) It is now impossible to contact friends who live in another state without using social media .
B) Families and relatives have less influence on our online behavior than on our offline interactions .
C) We can be anonymous on the Internet .
D) The range of interactions is much broader than it was when people lived in villages .
سؤال
Select all that apply . The 419 scam has many variations but they all require

A) that you will get a monetary reward for your help
B) that you contact a third person to join you in the interaction
C) that you keep the operation confidential
D) that the scammer needs money
سؤال
Select all that apply . Which of the following will help protect you from phishing?

A) Only go to websites from educational or government domains .
B) Open attachments only when you know who sent them and why .
C) Never open any attachment .
D) Only give information online when you have initiated the transaction by going to the company's website .
سؤال
Small character-based graphics used to display emotion in an electronic message are called ________ .
سؤال
Information that has been recoded to hide its meaning has been ________ .
سؤال
Civilized behavior in any of the social settings on the Internet is referred to as ________ .
سؤال
The content of an email should be briefly described in the ________ .
سؤال
Solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population is known as ________ .
سؤال
A(n) ________ is another term for a system administrator .
سؤال
A(n) ________ license allows a person to post his or her work on the Internet and allows others to copy and distribute it .
سؤال
Software that is available on the web and paid for using the honor system is known as ________ .
سؤال
A(n) ________ is an email screening software that checks pre-delivery for content typical of unsolicited commercial email .
سؤال
________ is the limited use of copyrighted material for educational or scholarly purposes .
سؤال
A tactic in which hackers use deception to fool people into giving out personal information is called ________ .
سؤال
Nasty email exchanges in which a few people fight but carbon copy a group of others are known as ________ .
سؤال
Creations of the human mind that have value to others are referred to as ________ .
سؤال
The point of a(n) ________is to limit computer or software access to only those who know the specific sequence of keyboard characters .
سؤال
Unsolicited commercial email (UCE) is popularly known as ________ .
سؤال
The Nigerian Widow scam is an example of ________ fraud .
سؤال
Many forms of intellectual property are legally protected by ________ .
سؤال
When a program contains code that is available to the public, this is known as ________ software .
سؤال
The following are top-level ________: . com, . gov, . edu, . mil, . int, . org, . net
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Social Implications of IT
1
When communicating via email, it is important to remember that face-to-face conversations can convey unspoken meaning while this may not be true for written communication .
True
2
It may be difficult to convey emotion in an email but emoticons can always express all human emotions adequately .
False
3
It is better to write one email message that covers multiple topics than to write several messages, each covering one topic .
False
4
When you reply to an email, it is best to include the context of the message you are replying to .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
5
Email backlogs should be answered in the order in which they were received .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
6
The majority of participants in crowdsourcing are motivated by large monetary rewards for themselves .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
7
A well-conceived password should be easy to remember and hard to guess .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
8
When choosing a security question that will be used to challenge your identity in the event of a forgotten password, the security question should have an answer that has not been publicly disclosed .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
9
With stringent laws against spam in so many places, spam is no longer a common problem .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
10
The use of shareware implies an obligation to pay for it .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
11
For your work to have copyright protection, the copyright symbol (©) must be listed on your work .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
12
A program that determines if an email is spam is always accurate .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
13
Web pages cannot be copyrighted .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
14
It is possible to figure out who is online, with the help of Internet Service Providers and companies like Microsoft .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
15
The word netiquette refers exclusively to email etiquette .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
16
When a new password is created for your computer system, it is encrypted and then stored in that form .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
17
Most email in the United States is a private conversation between the sender and the recipient .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
18
If your software is acting strange or your computer is behaving in a manner that seems unusual, you might have a computer virus .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
19
If your software is acting strange or your computer is behaving in a manner that seems unusual, this might indicate a software problem, such as disk fragmentation .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
20
One-way ciphers are reversible; they can be decoded .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
21
Information placed in the public domain is free for anyone to use in any form .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
22
It is legal to give commercial software to your friends but not to sell it .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
23
A password manager can create passwords that you don't have to remember .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
24
When you are working in a software program and it starts acting strange, you should

A) save your work with a new file name, exit, and restart
B) immediately shut down the computer
C) reinstall the software program
D) do nothing since minor glitches happen all the time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
25
Most email is

A) copyrighted
B) subject to censorship
C) easy to forward
D) private
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
26
Before forwarding email, you should

A) include a disclaimer
B) notify the sender that you are forwarding it
C) get the sender's permission
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
27
The textbook authors advocate

A) using a different password for every account
B) using three different passwords
C) changing passwords at least once a year
D) ignoring password policies of employers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is NOT difficult to convey in an email message?

A) emotion
B) sarcasm
C) ambiguity
D) emphasis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following statements is TRUE about passwords?

A) They are encrypted and are compared using the encrypted version .
B) They are maintained in a list by the system administrator .
C) They must be changed every three months .
D) They can be viewed by a superuser .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is probably legal?

A) You and your friends pool your money to buy a computer game and then share it by making copies for each of you .
B) You buy one copy of a computer game and install it on your laptop and your desktop computer .
C) You buy one copy of a computer game and install it on your laptop, your brother's laptop, and your computer at work .
D) You buy a computer game and make copies for your friends .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
31
An example of a good password is

A) a word that includes symbols or numbers to represent some letters
B) the user's birthday
C) the user's pet's name
D) the user's nickname
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
32
Before sending or posting emotional content by email or online

A) remember that, since email is private, your thoughts will be secure
B) send it to all the people you can think of who might be interested in your email
C) sleep on it
D) send it quickly, before you change your mind
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is NOT an example of crowdsourcing?

A) Google
B) Foldit
C) Freerice
D) Be a Martian project
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
34
Most login protocols

A) allow unlimited login attempts
B) shut off access after a single failed login attempt
C) allow several but not unlimited login attempts
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
35
When choosing a password, a good way to help you remember it is to

A) choose something you're interested in and modify a phrase about that topic to obscure it
B) use the name of someone close to you
C) use an important date, such as your birthday
D) choose a random series of numbers and letters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
36
The origin of the word "spam"(used to describe junk email) is believed to be

A) the nickname of a small town in Russia
B) a shortened form of the phrase "spurious messages"
C) from a Monty Python skit
D) unknown
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
37
You receive an email from your bank informing you that they are performing an audit and have found a problem with your account . They ask you to log in to help resolve the problem . This is an example of

A) a legitimate email
B) phishing
C) an advance-fee fraud
D) spam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
38
Generally speaking, a software license gives you

A) permission to resell the software
B) ownership of the software
C) use of the software
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
39
Companies that make products available as open source software

A) are vendors like Microsoft and Adobe
B) will open the source code to a user for a fee
C) are promoting wide distribution of the software
D) are non-profit organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
40
Information that you did not create but can treat as your own is said to be

A) in the public domain
B) shareware
C) fair use
D) copyrighted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
41
Select all that apply . Which of the following can be considered a way the online world is different from usual offline interactions?

A) It is now impossible to contact friends who live in another state without using social media .
B) Families and relatives have less influence on our online behavior than on our offline interactions .
C) We can be anonymous on the Internet .
D) The range of interactions is much broader than it was when people lived in villages .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
42
Select all that apply . The 419 scam has many variations but they all require

A) that you will get a monetary reward for your help
B) that you contact a third person to join you in the interaction
C) that you keep the operation confidential
D) that the scammer needs money
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
43
Select all that apply . Which of the following will help protect you from phishing?

A) Only go to websites from educational or government domains .
B) Open attachments only when you know who sent them and why .
C) Never open any attachment .
D) Only give information online when you have initiated the transaction by going to the company's website .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
44
Small character-based graphics used to display emotion in an electronic message are called ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
45
Information that has been recoded to hide its meaning has been ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
46
Civilized behavior in any of the social settings on the Internet is referred to as ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
47
The content of an email should be briefly described in the ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
48
Solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population is known as ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
49
A(n) ________ is another term for a system administrator .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
50
A(n) ________ license allows a person to post his or her work on the Internet and allows others to copy and distribute it .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
51
Software that is available on the web and paid for using the honor system is known as ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
52
A(n) ________ is an email screening software that checks pre-delivery for content typical of unsolicited commercial email .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ is the limited use of copyrighted material for educational or scholarly purposes .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
54
A tactic in which hackers use deception to fool people into giving out personal information is called ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
55
Nasty email exchanges in which a few people fight but carbon copy a group of others are known as ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
56
Creations of the human mind that have value to others are referred to as ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
57
The point of a(n) ________is to limit computer or software access to only those who know the specific sequence of keyboard characters .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
58
Unsolicited commercial email (UCE) is popularly known as ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
59
The Nigerian Widow scam is an example of ________ fraud .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
60
Many forms of intellectual property are legally protected by ________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
61
When a program contains code that is available to the public, this is known as ________ software .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
62
The following are top-level ________: . com, . gov, . edu, . mil, . int, . org, . net
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.