quiz 5 practice
Unlock all answers in this set
Unlock answersquestion
Some netiquette rules to consider when using social media include all of the following EXCEPT ____.
answer
freely tag friends in your photos
question
Which of the following is another name for ecash?
answer
emoney
question
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.
answer
censorship
question
A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world.
answer
violent, interactive simulated games
question
Which of the following is an example of a repetitive stress injury?
answer
carpal tunnel syndrome
question
Net Nanny is an example of ____.
answer
content-filtering software
question
One of the biggest roadblocks to ecash and ewallet technologies is _____.
answer
fear
question
Google Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items.
answer
RFID
question
The FCC ordered ____ to stop throttling BitTorrent Internet traffic.
answer
Comcast
question
The first known flash mob happened ____.
answer
at Macy's in New York City
question
Each person's digital shadow is ____.
answer
the digital information generated about a person by organizations
question
____ supports network neutrality.
answer
Google
question
In the United States, the ____ oversees the handling of Internet traffic.
answer
FCC
question
Ecommerce hosting companies offer _____ that provide all the necessary software tools to deliver ecommerce applications.
answer
servers
question
____ computing refers to the ability to access information at any time and in any place.
answer
Pervasive
question
An online B2B transaction uses a(n) _____ network to exchange information on the web.
answer
EDI
question
Carpal tunnel syndrome can cause ____.
answer
a numb sensation in the wrists and hands
question
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.
answer
web empowerment
question
Compulsive online gambling and pornography are examples of ____.
answer
computer addiction
question
Violence in a virtual world ____.
answer
may increase the likelihood of violence in the real world, but to date the studies are not conclusive
question
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.
answer
libel
question
The idea of digital etiquette came into being ____.
answer
with the advent of chat rooms and electronic mail
question
Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible.
answer
networks
question
____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.
answer
Ubiquitous
question
___ is an example of following good ergonomic practices.
answer
Adjusting the angle of a keyboard for comfort
question
Controlling the amount of ____ we receive in our email Inbox is one way to control information overload.
answer
spam