INSY 2303 - Unit 5-8

5.0(1)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/216

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

217 Terms

1
New cards

T

In Wikipedia, it is possible to edit the text of most articles.

2
New cards

T

​Any data entering a digital device could be malware.

3
New cards

F

IMSI catchers are operated by cellular service companies.

4
New cards

F

​Android devices automatically encrypt data stored on the device when a user activates the login password.

5
New cards

F

​Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.

6
New cards

T

​Password managers can generate unique passwords that have very good entropy.

7
New cards

F

​Microsoft uses a service called Safe Browsing to alert users about sites to avoid.

8
New cards

T

​OS X devices include a utility that automatically encrypts data stored locally.

9
New cards

T

Portable software does not require installation.​

10
New cards

T

​Applications include menu options for opening and saving files calling on the operating system’s file management routines to get the job done.

11
New cards

T

Web apps are examples of cloud computing.​

12
New cards

B

Which of the following operating systems is not found on Apple devices?​

​A. iOS

B. ​Linux

​C. Mac OS

​D. OS X

13
New cards

T

Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.​

14
New cards

T

In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.​

15
New cards

T

Wikipedia articles can be edited by anyone at any time, and the accuracy and reliability of Wikipedia information are controversial.​

16
New cards

T

Instant messaging technologies were available on local area networks even before the Internet was open to the public.

17
New cards

T

​Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online.

18
New cards

T

Webmail is typically a free service.

19
New cards

T

By some estimates, nearly 40% of all online identities are fake.

20
New cards

T

Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work.

21
New cards

F

On mobile devices, Voice over Internet Protocol (VoIP) uses the voice stream, not the data stream.

22
New cards

F

Geocoding is the process of adding location data to photos, Web sites, hypertext markup language (HTML) documents, audio files, blog posts, and text messages.

23
New cards

F

Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.

24
New cards

T

IM technology offers a degree of anonymity because typed messages have no associated voice or video.

25
New cards

T

Private messages can be forwarded by recipients, so they do not necessarily remain private.

26
New cards

F

Privacy is only important if you have something to hide.

27
New cards

T

Wiki software provides a set of tools for creating and editing content.

28
New cards

C

A message _________________ contains the sender and recipient addresses date and subject line.

A. SMTP

B. IMAP

C. header

D. DOCTYPE

29
New cards

A

The telecommunications technique used by local email is sometimes referred to as __________.

A. store-and-forward

B. private asynchronous

C. open source

D. private synchronous

30
New cards

A

Instant messaging is a(n) ______________, real-time technology for two or more people to type messages back and forth while online.

A. synchronous private

B. asynchronous private

C. asynchronous public

D. synchronous public

31
New cards

C

_________-party apps are external programs that interact with social networking services.

A. First

B. Second

C. Third

D. All of the above

32
New cards

A

A(n) _________ is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.

A. wiki

B. tweet

C. blog

D. microblog

33
New cards

C

______ is an example of a content community.

A. LinkedIn

B. Twitter

C. Wikipedia

D. Yelp

34
New cards

D

A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose.

A. transformative

B. Creative Commons

C. copyrighted

D. derivative

35
New cards

B

Which of the following terms is NOT part of an email system?

A. Server

B. Synchronous

C. Mailbox

D. Message

36
New cards

A

Critics of copyrights often advocate __________________.

A. copyleft

B. NPOV

C. trademarks

D. none of the above

37
New cards

B

The protocols POP3 (Post Office Protocol version 3) and __________ can be used to manage your incoming mail.

A. SMTP

B. IMAP (Internet Message Access Protocol)

C. NPOV

D. RSS

38
New cards

D

Which term is used to describe an online, personal journal in the form of a Web page that contains posts on one or more topics that are usually displayed in reverse chronological order?

A. Wiki

B. Content community

C. Chat

D. Blog

39
New cards

C

Which popular social media category is best for sharing media and information?

A. Social networking

B. Geosocial networking

C. Content community

D. Online communication

40
New cards

A

Which of the following is NOT a type of location service?

A. Sociogram

B. Cell tower triangulation

C. GPS trilateration

D. Hotspot triangulation

41
New cards

B

Which of the following would be found on a standard Wikipedia page?

A. RSS feed

B. Community edit: Requests for improvements

C. Original research

D. None of the above

42
New cards

B

Online __________ is/are two or more online personas with the same name or user name.

A. sockpuppets

B. doppelgangers

C. impersonation

D. cyberbullying

43
New cards

C

Which one of the following is NOT a Wikipedia content standard?

A. NPOV

B. NOR

C. RSS

D. V

44
New cards

A

The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder.

A. fair use

B. open source

C. public domain

D. Creative Commons

45
New cards

A

What provides a visual model for classifying and comparing various social media services?

A. Social media honeycomb

B. Social media services

C. Geosocial services

D. Content communities

46
New cards

B

Which one of the following is a microblogging service?

A. Facebook

B. Twitter

C. LinkedIn

D. RSS

47
New cards

D

Which of the following is NOT considered to be intellectual property?

A. Trademark

B. Copyright

C. Patents

D. Public domain

48
New cards

D

A person's presence on a social media is referred to as a(n) _________.

A. online identity

B. persona

C. avatar

D. all of the above

49
New cards

C

Commonly held expectations of privacy include which of the following?

A. Freedom from intrusive surveillance

B. The expectation that individuals can control their own personally identifiable information

C. Both of the above

D. Neither of the above

50
New cards

A

A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.

A. transformative

B. Creative Commons

C. copyrighted

D. derivative

51
New cards

B

_________ tags make it possible to search for photos or videos using keywords.

A. Media

B. Metadata

C. BBS

D. HTML

52
New cards

D

What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?

A. RSS reader

B. Blog aggregator

C. Neither of the above

D. Both A and B

53
New cards

A

A basic social media profile generally includes which of the following?

A. A user name

B. An email address

C. A phone number

D. All of the above

54
New cards

C

To find detailed information about the origin of an email message, look at the ________________.

A. SMTP

B. IMAP

C. header

D. HTML

55
New cards

A

The bulletin board systems of the 1970s are considered to be the forerunners of _____________.

A. Content communities

B. Geosocial networking

C. Sociograms

D. Email

56
New cards

D

___________ networking provides a platform for users to carry out interactions based on their current locations.

A. Social

B. Communication

C. Honeycomb

D. Geosocial

57
New cards

D

Which of the following is a VoIP service?

A. FaceTime

B. Snapchat

C. Google Talk

D. All of the above

58
New cards

B

__________ is/are online service(s) that facilitate communication and interaction among people who want to share information.

A. Email

B. Social media

C. Crowdsourcing

D. Geolocation

59
New cards

B

Which of the following is the least important characteristic of content communities?

A. Reputation

B. Identity

C. Conversations

D. Sharing

60
New cards

C

Which of the following elements would NOT be found on a blog page?

A. Comments from readers

B. An archive of older articles

C. SMTP (Simple Mail Transfer Protocol) services

D. A way for readers to add the blog to their favorites list

61
New cards

B

On a communication matrix, where would blogs be found?

A. Public synchronous

B. Public asynchronous

C. Private synchronous

D. Private asynchronous

62
New cards

C

Along with a profile image, which of the following would also be included in a user profile?

A. Sockpuppet

B. Anonymity

C. Tagline

D. Tweet

63
New cards

C

If a Creative Commons license contains ND, what does that indicate?

A. When the work is used, the copyright holder must be given credit for the work in a citation or another appropriate manner.

B. New works based on the original must be distributed under the same license as the original work.

C. The work must not be changed when it is redistributed or shared.

D. The work may not be used for commercial purposes.

64
New cards

A

Communicating false statements that damages the reputation of another individual is referred to as ___________________.

A. defamation

B. cyberbullying

C. impersonation

D. fake news

65
New cards

C

In the words of Justice Brandeis, what is the "right to be let alone"?

A. Anonymity

B. Social discovery

C. Privacy

D. Impersonation

66
New cards

A

A nonprofit organization called ____________ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.

A. Creative Commons

B. public domain

C. Share Alike

D. none of the above

67
New cards

T

Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities.​

68
New cards

F

Editing the source content of wikis is discouraged at media content communities.​

69
New cards

T

YouTube is an example of social media.​

70
New cards

T

When using Snapchat, senders can specify the period of time during which recipients are permitted to view a snap.​

71
New cards

F

The number of teens using Facebook increased 30% in 2014.​

72
New cards

T

In Wikipedia, it is possible to edit the text of an article in HTML.​

73
New cards

T

Copyright holders can assign any combination of CC rights to create a license.​

74
New cards

T

In some academic settings, Wikipedia is not regarded as a reliable source of information.​

75
New cards

T

In the United States, copyrights do not expire until 70 years after the author's death.​

76
New cards

F

Microsoft Windows is used exclusively on desktop systems.

77
New cards

F

There is a universal standard for categorizing software and various categorization schemes have few similarities.

78
New cards

F

Most handheld devices can use either Web apps or mobile apps but not both.

79
New cards

T

If you wanted to run multiple operating systems simultaneously on one computer, you would use a virtual machine.

80
New cards

F

A formula, such as =B6+(C6*.1), does not contain cell references.

81
New cards

T

Every peripheral device connected to a computer is regarded as an input or output resource.

82
New cards

T

The term service pack usually applies to operating system updates.

83
New cards

F

Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously.

84
New cards

F

Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.

85
New cards

T

Mobile devices tend to be populated by entertainment apps, games, and social media services.

86
New cards

T

You won't find a desktop with application windows on an iOS device.

87
New cards

T

Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.

88
New cards

T

The kernel stays in random access memory (RAM) the entire time your computer is on.

89
New cards

T

Paragraph style includes the alignment of text within the margins and the space between each line of text.

90
New cards

B

Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?

A. .docx

B. .xlsx

C. .accdb

D. .excel

91
New cards

D

In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.

A. record

B. label

C. value

D. formula

92
New cards

C

The software application associated with a specific file type is called a(n) __________ application.

A. derivative

B. transformative

C. default

D. root

93
New cards

D

Which of the following is part of the process for installing software on a PC?

A. Scan the hard drive for registry errors

B. Defragment the hard drive

C. Add the device to the network

D. None of the above

94
New cards

B

Operating systems provide file organization tools called ___________.

A. Disk Management

B. file management utilities

C. Disk Utility

D. file-naming conventions

95
New cards

A

Two of the most common open source and free software licenses are ___________.

A. BSD (Berkeley Software Distribution) and GPL (General Public License)

B. EULA (end-user license agreement) and VoIP

C. EULA and GPL

D. None of the above

96
New cards

C

Which type of software must include the source code, which allows programmers to modify and improve the software?

A. Shareware

B. Freeware

C. Open source

D. Public domain

97
New cards

B

An operating system's ____________ capability supports a division of labor among all the processing units.

A. multithreading

B. multiprocessing

C. multitasking

D. all of the above

98
New cards

A

The main directory on a storage device is referred to as the ________ directory.

A. root

B. boot

C. partition

D. DOS

99
New cards

A

A(n) ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location.

A. site license

B. single-user license

C. multiple-user license

D. copyright

100
New cards

D

Which of the following is a file management utility?

A. Finder

B. File Explorer

C. Neither of the above

D. Both A and B