1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Email Spoofing
You receive an email from a familiar sender, but it's promoting a product you've never heard of. What internet danger could this be?
Pharming
A seemingly legitimate website redirects all your online traffic to a fake site, aiming to steal your login credentials. What cyber threat is this?
Spyware
A program installed on your computer is silently collecting information without your knowledge. What internet danger does this represent?
Phishing
You receive an email claiming to be from a trusted bank, asking for your account details to resolve an issue. What online threat is this?
Computer worm
A file you downloaded from an untrustworthy source is replicating itself across your computer network. What type of malware is this?
Trojan horse
A software claims to enhance your computer's performance but secretly disables your antivirus. What internet danger is this?
Email Spoofing
Your friend receives an email from your address but you didn't send it, and it contains a suspicious link. What internet threat is this?
Computer Worm
A USB drive you plugged into your computer infected it with a program that spreads to other devices. What malware is this?
Hacker
Someone gains unauthorized access to your computer, aiming to control it.
True
Before you post something on the web, ask yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control over who sees your posts.(True or False)
True
Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. (True or False)
False
Set your post to "private." In this way, search engines will not be able to scan that post. (True or False)
True
Avoid using names. Names are easy for search engines to scan. (True or False)
False
If you feel that a post can affect your or others' reputation, ask the one who posted it to not pull it down or do not report it as appropriate. (True or False)
1
Write the number of the commandments associated with this statement."Thou shalt not use a computer to harm other people."
7
Write the number of the commandments associated with this statement. "Thou shalt not use other people's computer resources without authorization."
5
Write the number of the commandments associated with this statement. âThou shalt not use a computer to bear false witnessâ
False
âThou shalt use a computer to bear false witnessâ (True or False)
True
Thou shalt not interfere with other people's computer work.(True or False)
False
9. Thou shalt think about the economic consequences of the program you write. (True or False)
False
âThou shalt appropriate other people's intellectual output.â (True or False)
False
Sharing your first name poses a minimal risk, as hackers already know plenty about individuals. (True or False)
True
Sharing both your first and last names increases vulnerability, especially with the capability of search engines for image searches leading to potential cybercrimes like identity theft. (True or False)
False
Sharing only your middle name is not as risky as divulging your full name. (True or False)
False
Sharing your home phone number online is less risky than sharing your personal phone number. (True or False)
False
Sharing information about your current and previous schools is safe as it helps with verification. (True or False)
Folksonomy
You are browsing a social media platform, and you notice that users can add relevant keywords to their posts to categorize them. What features does this represent?
Rich User Experience
You visit a website where the content dynamically changes based on your preferences and interactions. What Web 2.0 features is demonstrated here?
Long Tail
A service allows users to pay for internet usage time instead of a fixed monthly fee. Which Web 2.0 features does this align with?
User Participation
You visit an online store where customers can leave reviews, and comments, and participate in polls about the products. Which features of Web 2.0 is being implemented here?
Software as a Service
You come across a platform where users can "rent" software applications for a small fee whenever they need them. What Web 2.0 features is evident in this scenario?
Mass Participation
You're impressed by the diversity of content on a website, which is contributed by people from various cultures. What Web 2.0 features is evident in this scenario?
Social Networks
You are looking for a platform to connect with people who share your passion for photography. Which type of social platform would be most suitable?
Bookmarking Sites
You often come across interesting articles and want to save and share them with friends. Which type of social platform would you use?
Social News
You've come across a breaking news story and want to share it with a community. Which type of social platform allows you to post your own news items or links to other news sources?
Media Sharing
You've captured an amazing sunset photo and want to showcase it to a wider audience. Which type of social Media would be ideal for sharing images?
Microblogging
You enjoy sharing brief updates about your day and staying updated on others' activities. Which type of social Media is designed for short updates?
Blogs and Forums
You are passionate about a niche topic and want to engage in discussions with like-minded individuals. Which type of social platform would you likely choose?
Convergence
Imagine you're part of a tech team developing a smart home system. Your project involves integrating various technologies like voice recognition, IT devices, and security systems to create a unified, seamless experience for homeowners. What concept best describes the synergy of these technologies working towards a common goal?
Social Media
You are an avid traveler and want to share your journey with others. You're looking for a platform that not only allows you to post photos and updates but also encourages discussions and modifications by fellow travelers. Which category of online platforms best fits your needs?
Assistive Media
You have a visually impaired friend who is seeking a service to assist with reading
Identify or choose a topic.
What is the first step in the process of contextualized online search?
Topic or task definition.
What is the second step after choosing a topic in the contextualized online search process?
Make your research strategies
Which step involves planning how you will search for information related to your chosen topic?
Make research strategies
What comes after identifying resources in the contextualized online search process?
Evaluate the results of your research.
When in the process should you assess the quality and relevance of the information you've gathered?
Create a list of references for citation.
What is the final step in the contextualized online search process?
False
Organized Data Mining It is not a well-planned design of the database of all the research materials either inside the computer or hard copies. (True or false)
True
Research presentation is the ability to present ideas and draw conclusions from the research, being able to explain in writing the purpose, steps, goals, and objectives of the research. (True or false)
False
Critical thinking requires the ability to look, verbalize, conceptualize, and gather data attuned to the context of the subject. And then, apply synthesis, focus, and critical thinking to extract useful information from the pile of research (True or false)