Web Ethics & Safety exam with correct answers 2024
The following terms describes a "granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production" - correct answer Copyright ______ can be protected by copyright law? - correct answer An e-mail The maximum penalty for online piracy ______. - correct answer Prison for up to ten years OR a fine of $250,000 ______ defines plagiarism? - correct answer Use of other people's words, thoughts or ideas without crediting the source The following is NOT a possible result of plagiarism. - correct answer Receiving a fine Josh has been sending malicious text messages to one of his classmates and writing negative comments on Facebook ® about this person. ______ describes Josh's behavior. - correct answer Cyberbullying David's friend told him she was cyberbullied. What should David NOT do? - correct answer Post mean comments to attack the bully Allison has noticed her 16-year-old son, Jeffrey, has been spending a lot of time on the Internet recently. What should Allison NOT do in order to protect Jeffrey from potential Internet dangers? - correct answer Post her private information on social networking sites Victoria received a semi-nude picture of someone she knows through her cell phone. What is an appropriate reaction? - correct answer Delete it immediately Eric just purchased a new computer and would like to protect his computer from viruses. What action should Eric take? - correct answer Install an anti-virus software Sharron's computer was infected by viruses. ______ could be a possible cause? - correct answer Sharron downloaded free movies from the Internet. ______ is NOT one of the possible results of inappropriate Internet use? - correct answer Your computer can have hardware problems. Colby spent a lot of his free time in a local coffee shop, where the Internet access is free. However, the coffee shop owner has not set up a password for the Wi-Fi network. The following online activity is safe for Colby to do at the coffee shop? - correct answer Conduct academic research ______ can provide protections to Nike®'s slogan "Just Do It"? - correct answer Trademark Cathy is a high school science teacher and she would like to copy some online educational materials to distribute to her students. What materials can Cathy NOT make copies of? - correct answer The entire Astronomy Today book ______ defines sexting? - correct answer Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices According to a recent survey conducted by The National Campaign, how many teenagers reported they have received nude or semi-nude pictures? - correct answer 48 percent According to Stephanie Winters, how many students ages 13 to 19 are engaging in sexting? - correct answer One-fifth According to Stephanie Winters, the following is true? - correct answer Most sexts are sent between boyfriends and girlfriends Sharron Davis use the following case to explain the harm of sexting? - correct answer Jessica Logan's story The following statement defines a computer virus? - correct answer Computer program which replicates and spreads itself from one computer to another The following term describes a "collection of computers controlled by users other than their owners to perform automated tasks over the Internet" - correct answer Botnet The following situation CANNOT cause a computer to become infected. - correct answer Copying a file from a computer to a flash drive According to Greg Bazar, the following is NOT an example of individual loss caused by viruses. - correct answer More late fees The following is NOT a discussed safe computing practice? - correct answer Conducting defragmentation The following statement about hackers is NOT correct? - correct answer All hackers are trying to break into others' computers for their financial benefit According to the Federal Trade Commission, how many Americans have their identity stolen each year? - correct answer Nine million The following term can be defined as "crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?" - correct answer Identity theft The following is NOT a discussed prevention method from identity theft? - correct answer Install anti-virus software According to Greg Bazar, what type of passwords can hackers break through within one minute? - correct answer Passwords less than six characters in length ______ is NOT a network security device? - correct answer Ethernet cable Greg Bazar use ______ as an analogy to describe a router? - correct answer Dock Greg Bazar use ______ as an analogy to describe a switch? - correct answer Traffic light ______ defines an Intrusion Detection System? - correct answer Device which monitors network activities for malicious attacks and produces reports to a management station ______ describes a "security component which encrypts data and keeps it private within a public network"? - correct answer Virtual Private Network ______ defines cyberbullying? - correct answer Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet According to the Cyberbullying Research Center, how many more times are cyberbullying victims likely to have attempted suicide than those who were not cyberbullied? - correct answer Two times According to Sharron Davis, how long after losing a child can the parents start to find a new normal? - correct answer Ten years According to a recent study by the Cyberbullying Research Center, how many students ages 11 to 18 have been cyberbullied? - correct answer 21.2 percent According to the Cyberbullying Research Center, how many students ages 11 to 18 admitted they have bullied others through the Internet? - correct answer 20.1 percent Which of the following is NOT an appropriate prevention from cyberbullying? - correct answer Calling the police The following is the correct reaction when someone you do not know asks you to add him or her as a friend on Facebook®. - correct answer Politely reject the request Which of the following is the Gold en Rule? - correct answer Treat others how you would want to be treated Which of the following is NOT an appropriate response to cyberbullying? - correct answer Retaliating against the bully According to Sharron Davis, the following is a parent's responsibility to cyberbullying. - correct answer Educate children about the consequences of cyberbullying Approximately how many sex offenders are there in the United States? - correct answer 645,000 The following method is appropriate to use to prevent predators from finding you online. - correct answer Keep private information private To avoid online predators, you should NEVER do the following under any circumstance. - correct answer Meet with a stranger from the Internet Through which of the following channels do 82 percent of sex offenders gain information about their target? - correct answer Social media sites The following action is NOT a parent's responsibility to prevent their children from being victims of online predators. - correct answer Ask for police protection
Written for
- Institution
- Nud
- Course
- Nud
Document information
- Uploaded on
- April 26, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
web ethics safety exam with correct answers 2024
Document also available in package deal