Show Recommended textbook solutions
Advanced Engineering Mathematics10th EditionErwin Kreyszig 4,134 solutions
Chemistry for Engineering Students2nd EditionLawrence S. Brown, Thomas A. Holme 945 solutions
Fundamentals of Engineering Economic Analysis1st EditionDavid Besanko, Mark Shanley, Scott Schaefer 215 solutions
Munson, Young and Okiishi's Fundamentals of Fluid Mechanics8th EditionAndrew L. Gerhart, John I. Hochstein, Philip M. Gerhart 1,344 solutions Upgrade to remove ads Only ₩37,125/year
Terms in this set (45)Chapter 6 ..... After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A Trojan How can an attacker execute malware through a script? An attacker can attach a script to a program that you download which then infects your computer. How can you protect a computer from electrical spikes and surges? Use a surge protector.
How does encryption work? It scrambles the information until the key is used to unscramble it. How is a worm different from a Trojan? A worm spreads through a network, whereas a Trojan hides inside another program. How will you decide which browser security settings to allow and which ones to block? I will need to review each browser security setting and use my best judgement. In terms of privacy, which of the following is a best practice? Keeping your Social Security number hidden in a locked box in your home Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? He can use remote wiping to retrace the thief's steps. Technology can lead to all of the following behavioral risks EXCEPT _____. higher satisfaction with life There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. creating malware What is a digital certificate? Technology used to verify a user's identity What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? phishing What would a password manager allow you to do? Create and store multiple strong passwords. Which is a first step to deter thieves from accessing your financial information? Do not provide personal information over the phone or through email. Which of the following is a characteristic of a strong password? letters, numbers, and symbols Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Ergonomics With more and more people using technology, what physical health diagnosis is on the rise? repetitive strain injury You can monitor and protect your financial data in all of the following ways EXCEPT _____. Requesting a credit report and freezing your credit. To protect your information and help you to remember passwords, use your social media account login information to log into another site. False Chapter 14 ... Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources? Wikis can be heavily biased. Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________. digital inclusion Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________. digital citizenship Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________. digital detox During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________. the digital divide Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do? Verify the content with an authoritative source. Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________. catfishing Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid? Repetitive strain injury Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently? Screen reader Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing? Digital rights management (DRM) Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________. digital footprint Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question? Acceptable use policy (AUP) Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone? Reset the old phone to factory settings. Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________. a hoax Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting? People with color blindness What rules should guide your behavior when you interact with friends and coworkers on social media? Netiquette When Hafsa writes a research paper for her psychology class, ________________ allow (s) her to quote small portions of a research study published by an industry leading expert without asking his permission first. the fair use doctrine
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device? Remove the battery and throw it in the trash. Which of the following problematic behaviors relies on the use of digital technology? Cyberbullying Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two. -Switch to a standing desk. A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics. False Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks. False Students also viewedComputer Concepts, Module 1422 terms study_bug23 Computer Concepts Module 1422 terms Pepepepepepepepepepo ITE 115 Chapter 1420 terms focusonsuccess8Plus CMIS22 terms an-dee Other sets by this creatorAbnormal Psychology Chapter 4 Terms34 terms klaudiaklaudia0127 Abnormal Psychology Chapter 3 Terms16 terms klaudiaklaudia0127 Abnormal Psychology Chapter 2 Terms33 terms klaudiaklaudia0127 Abnormal Psychology Chapter 1 Terms15 terms klaudiaklaudia0127 Verified questions
biology For each question, select the best answer from the four alternatives. Which of the following sets of materials consists of good electrical conductors? (a) copper, aluminum, nickel, (b) platinum, rubber, ebonite, (c) plastic, wood, paper, (d) porcelain, wax, carbon. Verified answer
engineering Transconductance indicates how effectively the input voltage controls the\ a. Voltage gain\ b. Input resistance\ c. Supply voltage\ d. Output current Verified answer
chemistry Calculate the probability of finding the electron in a shell $1.0 \mathrm{pm}$ thick at distances from the nucleus of $0.50 \mathrm{a}_1$ and $4 \mathrm{a}_{a-}$. Compare the results with the probabilities at $a_0$. Are these probabilities in accord with the surface density plot shown in Figure 6.12b? Verified answer health Define the term bullying. Verified answer Recommended textbook solutionsFundamentals of Engineering Economic Analysis1st EditionDavid Besanko, Mark Shanley, Scott Schaefer 215 solutions
Chemistry for Engineering Students2nd EditionLawrence S. Brown, Thomas A. Holme 945 solutions Chemical Reaction Engineering3rd EditionOctave Levenspiel 228 solutions Chemistry for Engineering Students3rd EditionBrown 1,047 solutions What is the process of ensuring that the person requesting access to a computer or other resources is not an imposter?Authentication enables organizations to keep their networks secure by permitting only authenticated users or processes to gain access to their protected resources. This may include computer systems, networks, databases, websites and other network-based applications or services.
How can you protect personal information gathered?6 Ways to Protect Your Personal Information Online. Create strong passwords. ... . Don't overshare on social media. ... . Use free Wi-Fi with caution. ... . Watch out for links and attachments. ... . Check to see if the site is secure. ... . Consider additional protection.. How can you protect a computer from electrical spikes and surges?The most effective way to protect your computer from a power surge is to use a surge protector. Not to be confused with a power strip, a surge protector is a device with one or more outlets in which you plug electronic devices to protect them from power surges.
Why would you include a banner on your website quizlet?Why would you include a banner on your website? It makes the website more easily identifiable to visitors. Which of the following specifies the format and appearance of page content on webpages? Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage.
|