LONG QUIZ ETECH - SITUATIONAL EXAM

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Email Spoofing

You receive an email from a familiar sender, but it's promoting a product you've never heard of. What internet danger could this be?

2
New cards

Pharming

A seemingly legitimate website redirects all your online traffic to a fake site, aiming to steal your login credentials. What cyber threat is this?

3
New cards

Spyware

A program installed on your computer is silently collecting information without your knowledge. What internet danger does this represent?

4
New cards

Phishing

You receive an email claiming to be from a trusted bank, asking for your account details to resolve an issue. What online threat is this?

5
New cards

Computer worm

A file you downloaded from an untrustworthy source is replicating itself across your computer network. What type of malware is this?

6
New cards

Trojan horse

A software claims to enhance your computer's performance but secretly disables your antivirus. What internet danger is this?

7
New cards

Email Spoofing

Your friend receives an email from your address but you didn't send it, and it contains a suspicious link. What internet threat is this?

8
New cards

Computer Worm

A USB drive you plugged into your computer infected it with a program that spreads to other devices. What malware is this?

9
New cards

Hacker

Someone gains unauthorized access to your computer, aiming to control it.

10
New cards

True

Before you post something on the web, ask yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control over who sees your posts.(True or False)

11
New cards

True

Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. (True or False)

12
New cards

False

Set your post to "private." In this way, search engines will not be able to scan that post. (True or False)

13
New cards

True

Avoid using names. Names are easy for search engines to scan. (True or False)

14
New cards

False

If you feel that a post can affect your or others' reputation, ask the one who posted it to not pull it down or do not report it as appropriate. (True or False)

15
New cards

1

Write the number of the commandments associated with this statement."Thou shalt not use a computer to harm other people."

16
New cards

7

Write the number of the commandments associated with this statement. "Thou shalt not use other people's computer resources without authorization."

17
New cards

5

Write the number of the commandments associated with this statement. “Thou shalt not use a computer to bear false witness”

18
New cards

False

“Thou shalt use a computer to bear false witness” (True or False)

19
New cards

True

Thou shalt not interfere with other people's computer work.(True or False)

20
New cards

False

9. Thou shalt think about the economic consequences of the program you write. (True or False)

21
New cards

False

“Thou shalt appropriate other people's intellectual output.” (True or False)

22
New cards

False

Sharing your first name poses a minimal risk, as hackers already know plenty about individuals. (True or False)

23
New cards

True

Sharing both your first and last names increases vulnerability, especially with the capability of search engines for image searches leading to potential cybercrimes like identity theft. (True or False)

24
New cards

False

Sharing only your middle name is not as risky as divulging your full name. (True or False)

25
New cards

False

Sharing your home phone number online is less risky than sharing your personal phone number. (True or False)

26
New cards

False

Sharing information about your current and previous schools is safe as it helps with verification. (True or False)

27
New cards

Folksonomy

You are browsing a social media platform, and you notice that users can add relevant keywords to their posts to categorize them. What features does this represent?

28
New cards

Rich User Experience

You visit a website where the content dynamically changes based on your preferences and interactions. What Web 2.0 features is demonstrated here?

29
New cards

Long Tail

A service allows users to pay for internet usage time instead of a fixed monthly fee. Which Web 2.0 features does this align with?

30
New cards

User Participation

You visit an online store where customers can leave reviews, and comments, and participate in polls about the products. Which features of Web 2.0 is being implemented here?

31
New cards

Software as a Service

You come across a platform where users can "rent" software applications for a small fee whenever they need them. What Web 2.0 features is evident in this scenario?

32
New cards

Mass Participation

You're impressed by the diversity of content on a website, which is contributed by people from various cultures. What Web 2.0 features is evident in this scenario?

33
New cards

Social Networks

You are looking for a platform to connect with people who share your passion for photography. Which type of social platform would be most suitable?

34
New cards

Bookmarking Sites

You often come across interesting articles and want to save and share them with friends. Which type of social platform would you use?

35
New cards

Social News

You've come across a breaking news story and want to share it with a community. Which type of social platform allows you to post your own news items or links to other news sources?

36
New cards

Media Sharing

You've captured an amazing sunset photo and want to showcase it to a wider audience. Which type of social Media would be ideal for sharing images?

37
New cards

Microblogging

You enjoy sharing brief updates about your day and staying updated on others' activities. Which type of social Media is designed for short updates?

38
New cards

Blogs and Forums

You are passionate about a niche topic and want to engage in discussions with like-minded individuals. Which type of social platform would you likely choose?

39
New cards

Convergence

Imagine you're part of a tech team developing a smart home system. Your project involves integrating various technologies like voice recognition, IT devices, and security systems to create a unified, seamless experience for homeowners. What concept best describes the synergy of these technologies working towards a common goal?

40
New cards

Social Media

You are an avid traveler and want to share your journey with others. You're looking for a platform that not only allows you to post photos and updates but also encourages discussions and modifications by fellow travelers. Which category of online platforms best fits your needs?

41
New cards

Assistive Media

You have a visually impaired friend who is seeking a service to assist with reading

42
New cards

Identify or choose a topic.

What is the first step in the process of contextualized online search?

43
New cards

Topic or task definition.

What is the second step after choosing a topic in the contextualized online search process?

44
New cards

Make your research strategies

Which step involves planning how you will search for information related to your chosen topic?

45
New cards

Make research strategies

What comes after identifying resources in the contextualized online search process?

46
New cards

Evaluate the results of your research.

When in the process should you assess the quality and relevance of the information you've gathered?

47
New cards

Create a list of references for citation.

What is the final step in the contextualized online search process?

48
New cards

False

Organized Data Mining It is not a well-planned design of the database of all the research materials either inside the computer or hard copies. (True or false)

49
New cards

True

Research presentation is the ability to present ideas and draw conclusions from the research, being able to explain in writing the purpose, steps, goals, and objectives of the research. (True or false)

50
New cards

False

Critical thinking requires the ability to look, verbalize, conceptualize, and gather data attuned to the context of the subject. And then, apply synthesis, focus, and critical thinking to extract useful information from the pile of research (True or false)

51
New cards
52
New cards
53
New cards
54
New cards
55
New cards
56
New cards