Computer Science Chapter 11 – Flashcards

Unlock all answers in this set

Unlock answers
question
When communicating via email, it is important to remember that you aren't there in person, so you should explain yourself more completely.
answer
True
question
It is impossible to convey emotion in an email.
answer
False
question
One message covering multiple topics is better than multiple messages, each with a single topic.
answer
False
question
Including the question with the reply is a courtesy; it provides the context for your answer.
answer
True
question
Email backlogs should be answered in the order they were received.
answer
True
question
The majority of participants in crowdsourcing are typically motivated by large monetary rewards for themselves.
answer
False
question
A well-conceived password should be easy to remember and difficult to break.
answer
True
question
A password should never be written down.
answer
False
question
When choosing a security question that will be used to challenge your identity in the event of a forgotten password, the security question should have an answer that has not been publically disclosed.
answer
True
question
With stringent laws against spam in many places, and spammers being prosecuted, spam is no longer a common problem.
answer
False
question
The use of shareware implies the obligation to pay for it.
answer
True
question
For your work to have copyright protection, the copyright symbol, ©, must be listed on your work.
answer
False
question
Determining if email is spam is really just a program's best guess, and some mistakes are inevitable.
answer
True
question
Web pages cannot be copyrighted.
answer
False
question
It is possible with the help of Internet service providers(ISPs) and companies like Microsoft to figure out who is online.
answer
True
question
The word netiquette only applies to etiquette for email.
answer
False
question
You should never forward an email without the sender's permission.
answer
True
question
When a new password is created for your computer system, it is scrambled or encrypted and then stored in that form.
answer
True
question
Most email in the United States is a private conversation between only the sender and the recipient.
answer
True
question
If your software is "acting" strange or your computer is "behaving" unusually, these could be indicators of a software problem such as disk fragmentation or a computer virus infection.
answer
True
question
Any email that appears to give you something for nothing can safely be deleted. The world just doesn't work that way.
answer
True
question
One-way ciphers are reversible; in other words, they can be decoded.
answer
False
question
Information is placed in the public domain, meaning that it is free for anyone to use, in any form.
answer
True
question
It is legal to give commercial software to your friends, but not to sell it.
answer
False
question
When software is "acting strange," you should:
answer
Save your work with a new file name, exit, and restart
question
All of the following are difficult to convey in an email message except:
answer
Emphasis
question
Most email is:
answer
Private
question
Before forwarding email, you should:
answer
Get the sender's permission
question
The textbook author advocates:
answer
Using three different passwords
question
Passwords:
answer
Are encrypted and are compared using the encryption, not "clear text"
question
In what way is the online world we live in today different from the past?
answer
All of the above
question
Which of the following is probably legal?
answer
You buy one copy of a piece of software, but install it on your laptop and desktop computer.
question
An example of a good password is a:
answer
A word with letters, numbers, and symbols
question
The 419 scam has many, many variations, but they all require:
answer
Secrecy, urgency and your money
question
Which of the following will help protect you from phishing?
answer
Only give information online when you have initiated the transaction by toing to the company site. Pay attention to the domain name of the company. Open attachments only when you know who sent them and why.
question
Before sending or posting very emotional content by email or online:
answer
Sleep on it
question
Which of the following is not an example of crowdsourcing?
answer
Google
question
Most login protocols:
answer
Allow several but not unlimited login attempts
question
A good minimum length for a password is how many character?
answer
8
question
When choosing a password, a good choice for helping you remember it is to:
answer
Choose a topic of interest and then modify a phrase from that topic to obscure it
question
The origin of the word "spam" as used to describe junk mail is believed to be:
answer
A Monty Python skit
question
You receive an email from your bank informing you that they are performing an audit and have found possible problems with your account. They ask you to log in to resolve the issue. This is an example of:
answer
Phishing
question
Generally speaking, a software license gives you:
answer
Use of the software
question
Companies that make products available as open source software:
answer
Are promoting wide distribution of the software. Are vendors like Microsoft and Adobe. Keep the source code private (providing only binary)
question
Information that you did not create, but can treat as your own, is said to be:
answer
In the public domain
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New