978-0133577396 Chapter 11

subject Type Homework Help
subject Pages 8
subject Words 1979
subject Authors Lawrence Snyder

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Fluency with Information Technology, 6e (Snyder)
Chapter 11 Social Implications of IT: Computers in Polite Society
11.1 True/False Questions
1) When communicating via email, it is important to remember that you aren't there in person, so
you should explain yourself more completely.
2) It is impossible to convey emotion in an email.
3) One message covering multiple topics is better than multiple messages, each with a single
topic.
4) Including the question with the reply is a courtesy; it provides the context for your answer.
5) Email backlogs should be answered in the order they were received.
6) The majority of participants in crowdsourcing are typically motivated by large monetary
rewards for themselves.
7) A well-conceived password should be easy to remember and difficult to guess.
8) A password should never be written down.
9) When choosing a security question that will be used to challenge your identity in the event of
a forgotten password, the security question should have an answer that has not been publically
disclosed.
page-pf2
10) With stringent laws against spam in many places, and spammers being prosecuted, spam is
no longer a common problem.
11) The use of shareware implies the obligation to pay for it.
work.
13) Determining if email is spam is really just a program's best guess, and some mistakes are
inevitable.
15) It is possible with the help of Internet service providers (ISPs) and companies like Microsoft
to figure out who is online.
16) The word netiquette only applies to etiquette for email.
17) You should never forward an email without the sender's permission.
18) When a new password is created for your computer system, it is scrambled or encrypted and
then stored in that form.
19) Most email in the United States is a private conversation between only the sender and the
recipient.
20) If your software is "acting" strange or your computer is "behaving" unusually, these could be
indicators of a software problem such as disk fragmentation or a computer virus infection.
21) Any email that appears to give you something for nothing can safely be deleted. The world
just doesn't work that way.
page-pf3
22) One-way ciphers are reversible; in other words, they can be decoded.
23) Information is placed in the public domain, meaning that it is free for anyone to use, in any
form.
24) It is legal to give commercial software to your friends, but not to sell it.
1) When software is "acting strange," you should:
A) not become alarmed; it's probably a minor glitch
B) save your work with a new file name, exit, and restart
C) immediately shutdown the computer
D) reinstall the software program
2) All of the following are difficult to convey in an email message except:
A) emotion
B) sarcasm
C) emphasis
D) ambiguity
3) Most email is:
A) private
C) easy to forward
D) subject to censorship
4) Before forwarding email, you should:
A) get the sender's permission
B) notify the sender that you are forwarding it
C) send a disclaimer
D) all of the above
page-pf4
5) The textbook author advocates:
A) changing passwords at least once per year
B) using a different password for every account
C) using three different passwords
D) ignoring password policies of employers
6) Passwords:
A) are maintained on a list by the system administrator
B) can be viewed by a superuser
C) must be changed monthly
D) are encrypted and are compared using the encryption, not "clear text"
7) Which is a way in which the online world is different from the usual offline interactions?
A) Our range of interactions is much broader than it was when we lived in villages.
B) Families and relatives influence our online behavior very little.
C) We can be anonymous on the Internet.
D) All of the above
8) Which of the following is probably legal?
A) You buy a computer game and make copies for your friends.
B) You and your buddies pool your money to buy software, which you share.
C) You buy one copy of a piece of software, but install it on your laptop and desktop computer.
D) You buy one copy of a piece of software, but install it at home, your office, and on your
spouse's laptop.
9) An example of a good password is a:
A) user's nickname
B) user's boy or girl friend's name
C) a word transformed with numbers and symbols for some letters
D) a standard single dictionary word
10) The 419 scam has many, many variations, but they all require:
A) secrecy
B) your money
C) urgency
D) all of the above
page-pf5
11) Which of the following will help protect you from phishing?
A) Open attachments only when you know who sent them and why.
B) Pay attention to the domain name of the company.
C) Only give information online when you have initiated the transaction by going to the
company site.
D) All of the above
12) Before sending or posting very emotional content by email or online:
A) sleep on it
B) send it right away so that you don't change your mind
C) make a list of the people that might be interested and send it to all of them
D) consider that email is private and your thoughts will always be secure
13) Which of the following is not an example of crowdsourcing?
A) Be a Martian Project
B) Free Rice
C) Google
D) Foldit
14) Most login protocols:
A) shut off access after just one failed login attempt
B) allow several but not unlimited login attempts
C) respond to failed login attempts instantly
D) allow unlimited login attempts
15) A good minimum length for a password is how many character?
A) 3
B) 6
C) 8
D) 12
16) When choosing a password, a good choice for helping you remember it is to:
A) use a date of importance such as your birthday
B) choose a topic of interest and then modify a phrase from that topic to obscure it
C) choose a random series of numbers and letters
D) use your name or a name of a family member
page-pf6
17) The origin of the word "spam" as used to describe junk mail is believed to be:
A) a shortening of the phrase "spurious messages"
B) the nickname of a small town in Russia
C) unknown
D) a Monty Python skit
18) You receive an email from your bank informing you that they are performing an audit and
have found possible problems with your account. They ask you to log in to resolve the issue.
This is an example of:
A) a legitimate email
B) an advance-fee fraud
C) phishing
D) spam
19) Generally speaking, a software license gives you:
A) ownership of the software
B) use of the software
C) permission to resell the software
D) all of the above
20) Companies that make products available as open source software:
A) are promoting wide distribution of the software
B) are non-profit organizations
C) keep the source code private (providing only binary)
D) are vendors like Microsoft and Adobe
21) Information that you did not create, but can treat as your own, is said to be:
A) shareware
B) in the public domain
C) fair use
1) ________ are small, character-based graphics used to display emotion in an electronic
message.
2) ________ information has been recoded to hide its meaning.
page-pf7
3) ________, originally developed for email use, but is now interpreted more broadly as civilized
behavior in any of the social settings on the Internet.
4) The content of an email message should be described in the ________.
5) ________ refers to solving a problem or achieving a goal by combining the contributions of a
large, unconstrained volunteer population.
6) A(n) ________ is another term for a system's administrator.
7) When a creator posts his or her work on the Internet with a(n) ________ license, people are
allowed to copy and distribute it.
8) Software that is available on the Web and paid for on the honor system is called ________.
9) A(n) ________ is an email screening software that checks pre-delivery for content typical of
unsolicited commercial email.
11) ________ is short for password harvesting fishing, a tactic in which hackers use deception to
fool you into giving them your personal information.
12) ________ are nasty email exchanges in which a few people fight, but cc a group of others.
13) When you are unable to answer your email for a few days, it is polite to set up a(n) ________
reply saying you are away, and perhaps indicating when you expect to read your email again.
14) Creations of the human mind that have value to others are referred to as ________.
15) The point of a(n) ________ is to limit computer or software system access to only those who
know a not-likely-to-be-guessed sequence of keyboard characters.
page-pf8
16) Unsolicited commercial email (UCE) is popularly known as ________.
17) Offensensitivity, a term credited to Berke Breathed in Bloom County, relates to people being
________ by certain things. As a guideline, using the Internet with an open mind and maturity
can avoid considerable nastiness.
18) The Nigerian Widow scam is an example of a(n) ________ fraud.
19) A(n) ________ refers to the legal protection of many forms of intellectual property.
20) The first top-level ________ are .com, .gov, .edu, .mil, .int, .org, and .net.
21) Software for which the program is publicly available is known as ________ software.
22) ________ has developed licenses that allow works to be shared easily.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.