quiz 5 practice

Unlock all answers in this set

Unlock answers
question
Some netiquette rules to consider when using social media include all of the following EXCEPT ____.
answer
freely tag friends in your photos
question
Which of the following is another name for ecash?
answer
emoney
question
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.
answer
censorship
question
A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world.
answer
violent, interactive simulated games
question
Which of the following is an example of a repetitive stress injury?
answer
carpal tunnel syndrome
question
Net Nanny is an example of ____.
answer
content-filtering software
question
One of the biggest roadblocks to ecash and ewallet technologies is _____.
answer
fear
question
Google Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items.
answer
RFID
question
The FCC ordered ____ to stop throttling BitTorrent Internet traffic.
answer
Comcast
question
The first known flash mob happened ____.
answer
at Macy's in New York City
question
Each person's digital shadow is ____.
answer
the digital information generated about a person by organizations
question
____ supports network neutrality.
answer
Google
question
In the United States, the ____ oversees the handling of Internet traffic.
answer
FCC
question
Ecommerce hosting companies offer _____ that provide all the necessary software tools to deliver ecommerce applications.
answer
servers
question
____ computing refers to the ability to access information at any time and in any place.
answer
Pervasive
question
An online B2B transaction uses a(n) _____ network to exchange information on the web.
answer
EDI
question
Carpal tunnel syndrome can cause ____.
answer
a numb sensation in the wrists and hands
question
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.
answer
web empowerment
question
Compulsive online gambling and pornography are examples of ____.
answer
computer addiction
question
Violence in a virtual world ____.
answer
may increase the likelihood of violence in the real world, but to date the studies are not conclusive
question
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.
answer
libel
question
The idea of digital etiquette came into being ____.
answer
with the advent of chat rooms and electronic mail
question
Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible.
answer
networks
question
____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.
answer
Ubiquitous
question
___ is an example of following good ergonomic practices.
answer
Adjusting the angle of a keyboard for comfort
question
Controlling the amount of ____ we receive in our email Inbox is one way to control information overload.
answer
spam
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New