Study

Computer Literacy Review

  •   0%
  •  0     0     0

  • Which keyboard key allows you to select adjacent files?
    SHIFT
  • What types of works can be plagiarized and are protected by Copyright Laws?
    Essays, music, Movies, artwork, songs, photographs, computer software, etc.
  • What is a spoofed site?
    a website set up to look like another website (fake site)
  • What are some issues that can occur when you spend a lot of time online?
    It can hurt friendships, grades, mental health, etc.
  • How can cyberbullying and social media posts affect your future?
    Lose scholarships, get denied from college acceptance, jail time
  • What does Anitvirus software do?
    it searches for files that cause harm and tries to fix them by erasing or disabling the commands
  • Why is it not a good idea to keep all your credit cards in your wallet or purse?
    Because it can get stolen.
  • Name two ways to prevent identity theft. (There were eight.)
    Educate, Check credit report annually, Check monthly statements, Don't give out info, Secure websites, Strong Passwords, Shred Mail, Firewall
  • What is the best practice for your PINs for credit or debit cards?
    To memorize them.
  • Which keyboard key allows you to select NON adjacent files?
    CTRL
  • What does a firewall do?
    prevents other computers on the internet from accessing a computer OR prevents a program on the computer from accessing the Internet
  • What is cyberbullying?
    the electronic posting of mean-spirited messages about a person (such as a student) often done anonymously
  • What is software used to track a computer user's internet usage?
    Spyware
  • Why is it important to disregard Internet hoaxes, chain emails, and constant messaging?
    It can contain harmful viruses and could clog up your email
  • What is the way you tell your readers that certain material in your work came from another source?
    Citation, cite your source
  • What is the best way to find out if something is true?
    Research the information
  • What do you do if you are a victim of identity theft? (There are five.)
    Contact FTC, notify the 3 credit bureaus, file police report, contact creditors, make complaints in writing
  • What is the ability to imagine the feelings that someone else is experiencing?
    Empathy
  • Why are people meaner online than in person?
    They can stay anonymous.
  • What are examples of sensitive information that should not be shared in emails?
    credit card numbers, social security numbers, passwords
  • What is tricky about online communication whether it is email or text?
    Lack of emotional details and tone so it leads to misunderstandings.
  • What makes a good password?
    A mix of letters (uppercase and lowercase), numbers, and symbols that you can remember.
  • What is a redirect from a legitimate site that sends a customer to a criminal's spoofed site?
    Pharming
  • What is the fastest growing crime in America?
    Identity Theft
  • What is the unauthorized use of or damage to a computer or computer files called?
    Security Threat
  • What are some tips to consider when sending an email?
    tone, grammar, be brief, have professional fonts, and use punctuation
  • What are ways your identity can be stolen?
    dumpster diving, shoulder surfing, wallet is stolen, through business records, spoofing, phishing, con game (phone calls)
  • What is the practice of spying on a user of an ATM, computer, or other electronic device in order to obtain their personal access information?
    Shoulder Surfing
  • What is the act of defrauding an account holder by sending emails to try to gain access to financial information?
    Phishing
  • What is identity theft?
    when someone takes your personal information and pretends to be you
  • What are two examples of Security Threats?
    Virus, Spoofed site, phishing, shoulder surfing, pharming, malware, spyware
  • When shopping online, what signals that you are on a secure site to protect against security threats?
    https in the website or a locked symbol
  • What is plagiarism?
    taking someone else's work and passing it off as your own
  • How do you identify the bully, target, and the upstander?
    the bully is the one doing the harmful action, the target is who the bully is doing the bullying to, and the upstander is the person who stands up for the targe