Deck 11: Social Implications of IT
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
Play
Full screen (f)
Deck 11: Social Implications of IT
1
When communicating via email, it is important to remember that face-to-face conversations can convey unspoken meaning while this may not be true for written communication .
True
2
It may be difficult to convey emotion in an email but emoticons can always express all human emotions adequately .
False
3
It is better to write one email message that covers multiple topics than to write several messages, each covering one topic .
False
4
When you reply to an email, it is best to include the context of the message you are replying to .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Email backlogs should be answered in the order in which they were received .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
The majority of participants in crowdsourcing are motivated by large monetary rewards for themselves .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
A well-conceived password should be easy to remember and hard to guess .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
When choosing a security question that will be used to challenge your identity in the event of a forgotten password, the security question should have an answer that has not been publicly disclosed .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
With stringent laws against spam in so many places, spam is no longer a common problem .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
The use of shareware implies an obligation to pay for it .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
For your work to have copyright protection, the copyright symbol (©) must be listed on your work .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
A program that determines if an email is spam is always accurate .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
Web pages cannot be copyrighted .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
It is possible to figure out who is online, with the help of Internet Service Providers and companies like Microsoft .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
The word netiquette refers exclusively to email etiquette .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
When a new password is created for your computer system, it is encrypted and then stored in that form .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Most email in the United States is a private conversation between the sender and the recipient .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
If your software is acting strange or your computer is behaving in a manner that seems unusual, you might have a computer virus .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
If your software is acting strange or your computer is behaving in a manner that seems unusual, this might indicate a software problem, such as disk fragmentation .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
One-way ciphers are reversible; they can be decoded .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
Information placed in the public domain is free for anyone to use in any form .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
It is legal to give commercial software to your friends but not to sell it .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
A password manager can create passwords that you don't have to remember .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
When you are working in a software program and it starts acting strange, you should
A) save your work with a new file name, exit, and restart
B) immediately shut down the computer
C) reinstall the software program
D) do nothing since minor glitches happen all the time
A) save your work with a new file name, exit, and restart
B) immediately shut down the computer
C) reinstall the software program
D) do nothing since minor glitches happen all the time
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Most email is
A) copyrighted
B) subject to censorship
C) easy to forward
D) private
A) copyrighted
B) subject to censorship
C) easy to forward
D) private
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
Before forwarding email, you should
A) include a disclaimer
B) notify the sender that you are forwarding it
C) get the sender's permission
D) All of these
A) include a disclaimer
B) notify the sender that you are forwarding it
C) get the sender's permission
D) All of these
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
The textbook authors advocate
A) using a different password for every account
B) using three different passwords
C) changing passwords at least once a year
D) ignoring password policies of employers
A) using a different password for every account
B) using three different passwords
C) changing passwords at least once a year
D) ignoring password policies of employers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is NOT difficult to convey in an email message?
A) emotion
B) sarcasm
C) ambiguity
D) emphasis
A) emotion
B) sarcasm
C) ambiguity
D) emphasis
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following statements is TRUE about passwords?
A) They are encrypted and are compared using the encrypted version .
B) They are maintained in a list by the system administrator .
C) They must be changed every three months .
D) They can be viewed by a superuser .
A) They are encrypted and are compared using the encrypted version .
B) They are maintained in a list by the system administrator .
C) They must be changed every three months .
D) They can be viewed by a superuser .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is probably legal?
A) You and your friends pool your money to buy a computer game and then share it by making copies for each of you .
B) You buy one copy of a computer game and install it on your laptop and your desktop computer .
C) You buy one copy of a computer game and install it on your laptop, your brother's laptop, and your computer at work .
D) You buy a computer game and make copies for your friends .
A) You and your friends pool your money to buy a computer game and then share it by making copies for each of you .
B) You buy one copy of a computer game and install it on your laptop and your desktop computer .
C) You buy one copy of a computer game and install it on your laptop, your brother's laptop, and your computer at work .
D) You buy a computer game and make copies for your friends .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
An example of a good password is
A) a word that includes symbols or numbers to represent some letters
B) the user's birthday
C) the user's pet's name
D) the user's nickname
A) a word that includes symbols or numbers to represent some letters
B) the user's birthday
C) the user's pet's name
D) the user's nickname
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
Before sending or posting emotional content by email or online
A) remember that, since email is private, your thoughts will be secure
B) send it to all the people you can think of who might be interested in your email
C) sleep on it
D) send it quickly, before you change your mind
A) remember that, since email is private, your thoughts will be secure
B) send it to all the people you can think of who might be interested in your email
C) sleep on it
D) send it quickly, before you change your mind
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is NOT an example of crowdsourcing?
A) Google
B) Foldit
C) Freerice
D) Be a Martian project
A) Google
B) Foldit
C) Freerice
D) Be a Martian project
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
Most login protocols
A) allow unlimited login attempts
B) shut off access after a single failed login attempt
C) allow several but not unlimited login attempts
D) None of these
A) allow unlimited login attempts
B) shut off access after a single failed login attempt
C) allow several but not unlimited login attempts
D) None of these
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
When choosing a password, a good way to help you remember it is to
A) choose something you're interested in and modify a phrase about that topic to obscure it
B) use the name of someone close to you
C) use an important date, such as your birthday
D) choose a random series of numbers and letters
A) choose something you're interested in and modify a phrase about that topic to obscure it
B) use the name of someone close to you
C) use an important date, such as your birthday
D) choose a random series of numbers and letters
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
The origin of the word "spam"(used to describe junk email) is believed to be
A) the nickname of a small town in Russia
B) a shortened form of the phrase "spurious messages"
C) from a Monty Python skit
D) unknown
A) the nickname of a small town in Russia
B) a shortened form of the phrase "spurious messages"
C) from a Monty Python skit
D) unknown
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
You receive an email from your bank informing you that they are performing an audit and have found a problem with your account . They ask you to log in to help resolve the problem . This is an example of
A) a legitimate email
B) phishing
C) an advance-fee fraud
D) spam
A) a legitimate email
B) phishing
C) an advance-fee fraud
D) spam
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
Generally speaking, a software license gives you
A) permission to resell the software
B) ownership of the software
C) use of the software
D) All of these
A) permission to resell the software
B) ownership of the software
C) use of the software
D) All of these
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Companies that make products available as open source software
A) are vendors like Microsoft and Adobe
B) will open the source code to a user for a fee
C) are promoting wide distribution of the software
D) are non-profit organizations
A) are vendors like Microsoft and Adobe
B) will open the source code to a user for a fee
C) are promoting wide distribution of the software
D) are non-profit organizations
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Information that you did not create but can treat as your own is said to be
A) in the public domain
B) shareware
C) fair use
D) copyrighted
A) in the public domain
B) shareware
C) fair use
D) copyrighted
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
Select all that apply . Which of the following can be considered a way the online world is different from usual offline interactions?
A) It is now impossible to contact friends who live in another state without using social media .
B) Families and relatives have less influence on our online behavior than on our offline interactions .
C) We can be anonymous on the Internet .
D) The range of interactions is much broader than it was when people lived in villages .
A) It is now impossible to contact friends who live in another state without using social media .
B) Families and relatives have less influence on our online behavior than on our offline interactions .
C) We can be anonymous on the Internet .
D) The range of interactions is much broader than it was when people lived in villages .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
Select all that apply . The 419 scam has many variations but they all require
A) that you will get a monetary reward for your help
B) that you contact a third person to join you in the interaction
C) that you keep the operation confidential
D) that the scammer needs money
A) that you will get a monetary reward for your help
B) that you contact a third person to join you in the interaction
C) that you keep the operation confidential
D) that the scammer needs money
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
Select all that apply . Which of the following will help protect you from phishing?
A) Only go to websites from educational or government domains .
B) Open attachments only when you know who sent them and why .
C) Never open any attachment .
D) Only give information online when you have initiated the transaction by going to the company's website .
A) Only go to websites from educational or government domains .
B) Open attachments only when you know who sent them and why .
C) Never open any attachment .
D) Only give information online when you have initiated the transaction by going to the company's website .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
Small character-based graphics used to display emotion in an electronic message are called ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
Information that has been recoded to hide its meaning has been ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
Civilized behavior in any of the social settings on the Internet is referred to as ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
The content of an email should be briefly described in the ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
Solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population is known as ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
A(n) ________ is another term for a system administrator .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
A(n) ________ license allows a person to post his or her work on the Internet and allows others to copy and distribute it .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
Software that is available on the web and paid for using the honor system is known as ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) ________ is an email screening software that checks pre-delivery for content typical of unsolicited commercial email .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
________ is the limited use of copyrighted material for educational or scholarly purposes .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
A tactic in which hackers use deception to fool people into giving out personal information is called ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
Nasty email exchanges in which a few people fight but carbon copy a group of others are known as ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
Creations of the human mind that have value to others are referred to as ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
The point of a(n) ________is to limit computer or software access to only those who know the specific sequence of keyboard characters .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
Unsolicited commercial email (UCE) is popularly known as ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
The Nigerian Widow scam is an example of ________ fraud .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Many forms of intellectual property are legally protected by ________ .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
When a program contains code that is available to the public, this is known as ________ software .
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
The following are top-level ________: . com, . gov, . edu, . mil, . int, . org, . net
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck