1/216
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
T
In Wikipedia, it is possible to edit the text of most articles.
T
Any data entering a digital device could be malware.
F
IMSI catchers are operated by cellular service companies.
F
Android devices automatically encrypt data stored on the device when a user activates the login password.
F
Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.
T
Password managers can generate unique passwords that have very good entropy.
F
Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
T
OS X devices include a utility that automatically encrypts data stored locally.
T
Portable software does not require installation.
T
Applications include menu options for opening and saving files calling on the operating system’s file management routines to get the job done.
T
Web apps are examples of cloud computing.
B
Which of the following operating systems is not found on Apple devices?
A. iOS
B. Linux
C. Mac OS
D. OS X
T
Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.
T
In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.
T
Wikipedia articles can be edited by anyone at any time, and the accuracy and reliability of Wikipedia information are controversial.
T
Instant messaging technologies were available on local area networks even before the Internet was open to the public.
T
Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online.
T
Webmail is typically a free service.
T
By some estimates, nearly 40% of all online identities are fake.
T
Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work.
F
On mobile devices, Voice over Internet Protocol (VoIP) uses the voice stream, not the data stream.
F
Geocoding is the process of adding location data to photos, Web sites, hypertext markup language (HTML) documents, audio files, blog posts, and text messages.
F
Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.
T
IM technology offers a degree of anonymity because typed messages have no associated voice or video.
T
Private messages can be forwarded by recipients, so they do not necessarily remain private.
F
Privacy is only important if you have something to hide.
T
Wiki software provides a set of tools for creating and editing content.
C
A message _________________ contains the sender and recipient addresses date and subject line.
A. SMTP
B. IMAP
C. header
D. DOCTYPE
A
The telecommunications technique used by local email is sometimes referred to as __________.
A. store-and-forward
B. private asynchronous
C. open source
D. private synchronous
A
Instant messaging is a(n) ______________, real-time technology for two or more people to type messages back and forth while online.
A. synchronous private
B. asynchronous private
C. asynchronous public
D. synchronous public
C
_________-party apps are external programs that interact with social networking services.
A. First
B. Second
C. Third
D. All of the above
A
A(n) _________ is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.
A. wiki
B. tweet
C. blog
D. microblog
C
______ is an example of a content community.
A. LinkedIn
B. Twitter
C. Wikipedia
D. Yelp
D
A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose.
A. transformative
B. Creative Commons
C. copyrighted
D. derivative
B
Which of the following terms is NOT part of an email system?
A. Server
B. Synchronous
C. Mailbox
D. Message
A
Critics of copyrights often advocate __________________.
A. copyleft
B. NPOV
C. trademarks
D. none of the above
B
The protocols POP3 (Post Office Protocol version 3) and __________ can be used to manage your incoming mail.
A. SMTP
B. IMAP (Internet Message Access Protocol)
C. NPOV
D. RSS
D
Which term is used to describe an online, personal journal in the form of a Web page that contains posts on one or more topics that are usually displayed in reverse chronological order?
A. Wiki
B. Content community
C. Chat
D. Blog
C
Which popular social media category is best for sharing media and information?
A. Social networking
B. Geosocial networking
C. Content community
D. Online communication
A
Which of the following is NOT a type of location service?
A. Sociogram
B. Cell tower triangulation
C. GPS trilateration
D. Hotspot triangulation
B
Which of the following would be found on a standard Wikipedia page?
A. RSS feed
B. Community edit: Requests for improvements
C. Original research
D. None of the above
B
Online __________ is/are two or more online personas with the same name or user name.
A. sockpuppets
B. doppelgangers
C. impersonation
D. cyberbullying
C
Which one of the following is NOT a Wikipedia content standard?
A. NPOV
B. NOR
C. RSS
D. V
A
The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder.
A. fair use
B. open source
C. public domain
D. Creative Commons
A
What provides a visual model for classifying and comparing various social media services?
A. Social media honeycomb
B. Social media services
C. Geosocial services
D. Content communities
B
Which one of the following is a microblogging service?
A. Facebook
B. Twitter
C. LinkedIn
D. RSS
D
Which of the following is NOT considered to be intellectual property?
A. Trademark
B. Copyright
C. Patents
D. Public domain
D
A person's presence on a social media is referred to as a(n) _________.
A. online identity
B. persona
C. avatar
D. all of the above
C
Commonly held expectations of privacy include which of the following?
A. Freedom from intrusive surveillance
B. The expectation that individuals can control their own personally identifiable information
C. Both of the above
D. Neither of the above
A
A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.
A. transformative
B. Creative Commons
C. copyrighted
D. derivative
B
_________ tags make it possible to search for photos or videos using keywords.
A. Media
B. Metadata
C. BBS
D. HTML
D
What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?
A. RSS reader
B. Blog aggregator
C. Neither of the above
D. Both A and B
A
A basic social media profile generally includes which of the following?
A. A user name
B. An email address
C. A phone number
D. All of the above
C
To find detailed information about the origin of an email message, look at the ________________.
A. SMTP
B. IMAP
C. header
D. HTML
A
The bulletin board systems of the 1970s are considered to be the forerunners of _____________.
A. Content communities
B. Geosocial networking
C. Sociograms
D. Email
D
___________ networking provides a platform for users to carry out interactions based on their current locations.
A. Social
B. Communication
C. Honeycomb
D. Geosocial
D
Which of the following is a VoIP service?
A. FaceTime
B. Snapchat
C. Google Talk
D. All of the above
B
__________ is/are online service(s) that facilitate communication and interaction among people who want to share information.
A. Email
B. Social media
C. Crowdsourcing
D. Geolocation
B
Which of the following is the least important characteristic of content communities?
A. Reputation
B. Identity
C. Conversations
D. Sharing
C
Which of the following elements would NOT be found on a blog page?
A. Comments from readers
B. An archive of older articles
C. SMTP (Simple Mail Transfer Protocol) services
D. A way for readers to add the blog to their favorites list
B
On a communication matrix, where would blogs be found?
A. Public synchronous
B. Public asynchronous
C. Private synchronous
D. Private asynchronous
C
Along with a profile image, which of the following would also be included in a user profile?
A. Sockpuppet
B. Anonymity
C. Tagline
D. Tweet
C
If a Creative Commons license contains ND, what does that indicate?
A. When the work is used, the copyright holder must be given credit for the work in a citation or another appropriate manner.
B. New works based on the original must be distributed under the same license as the original work.
C. The work must not be changed when it is redistributed or shared.
D. The work may not be used for commercial purposes.
A
Communicating false statements that damages the reputation of another individual is referred to as ___________________.
A. defamation
B. cyberbullying
C. impersonation
D. fake news
C
In the words of Justice Brandeis, what is the "right to be let alone"?
A. Anonymity
B. Social discovery
C. Privacy
D. Impersonation
A
A nonprofit organization called ____________ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.
A. Creative Commons
B. public domain
C. Share Alike
D. none of the above
T
Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities.
F
Editing the source content of wikis is discouraged at media content communities.
T
YouTube is an example of social media.
T
When using Snapchat, senders can specify the period of time during which recipients are permitted to view a snap.
F
The number of teens using Facebook increased 30% in 2014.
T
In Wikipedia, it is possible to edit the text of an article in HTML.
T
Copyright holders can assign any combination of CC rights to create a license.
T
In some academic settings, Wikipedia is not regarded as a reliable source of information.
T
In the United States, copyrights do not expire until 70 years after the author's death.
F
Microsoft Windows is used exclusively on desktop systems.
F
There is a universal standard for categorizing software and various categorization schemes have few similarities.
F
Most handheld devices can use either Web apps or mobile apps but not both.
T
If you wanted to run multiple operating systems simultaneously on one computer, you would use a virtual machine.
F
A formula, such as =B6+(C6*.1), does not contain cell references.
T
Every peripheral device connected to a computer is regarded as an input or output resource.
T
The term service pack usually applies to operating system updates.
F
Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously.
F
Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.
T
Mobile devices tend to be populated by entertainment apps, games, and social media services.
T
You won't find a desktop with application windows on an iOS device.
T
Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
T
The kernel stays in random access memory (RAM) the entire time your computer is on.
T
Paragraph style includes the alignment of text within the margins and the space between each line of text.
B
Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?
A. .docx
B. .xlsx
C. .accdb
D. .excel
D
In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.
A. record
B. label
C. value
D. formula
C
The software application associated with a specific file type is called a(n) __________ application.
A. derivative
B. transformative
C. default
D. root
D
Which of the following is part of the process for installing software on a PC?
A. Scan the hard drive for registry errors
B. Defragment the hard drive
C. Add the device to the network
D. None of the above
B
Operating systems provide file organization tools called ___________.
A. Disk Management
B. file management utilities
C. Disk Utility
D. file-naming conventions
A
Two of the most common open source and free software licenses are ___________.
A. BSD (Berkeley Software Distribution) and GPL (General Public License)
B. EULA (end-user license agreement) and VoIP
C. EULA and GPL
D. None of the above
C
Which type of software must include the source code, which allows programmers to modify and improve the software?
A. Shareware
B. Freeware
C. Open source
D. Public domain
B
An operating system's ____________ capability supports a division of labor among all the processing units.
A. multithreading
B. multiprocessing
C. multitasking
D. all of the above
A
The main directory on a storage device is referred to as the ________ directory.
A. root
B. boot
C. partition
D. DOS
A
A(n) ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location.
A. site license
B. single-user license
C. multiple-user license
D. copyright
D
Which of the following is a file management utility?
A. Finder
B. File Explorer
C. Neither of the above
D. Both A and B