ANSWERS COMPLETE STUDY GUIDE 2024 UPDATE (100%
CORRECT) GRADE A+
Which of the following is NOT an example of cyberbullying?
Tony spreads a false rumor about John, and then John begins to receive
insulting and threatening text messages from multiple students.
An audience member heckles a stand-up comedian at a live show.
A basketball player writes multiple disparaging remarks and insults on a
teammate's Facebook wall.
Creating a website to post embarrassing photos of a subject without the subject's
consent.
An audience member heckles a stand-up comedian at a live show.
Most video sharing sites earn revenues through _____.
user subscriptions
advertisements
selling videos and related merchandise to users
annual contribution drives, asking users to donate to the company
advertisements
Which of the following social-media activities is most likely to NEGATIVELY
impact a hiring decision for a potential employee?
Unprofessional screen name
Creativity
Wide range of interests
Interacting with the company's social media
unprofessional screen name
Search engines are getting better at doing "_____" searching of more types of
data, such as images and videos.
deeper
lower
narrow
higher
Deeper
A _____ attack is achieved by submitting huge numbers of access requests
simultaneously to one website, which overloads that site's web server.
Web Refutal
Denial of Service
Site Blocker
Page Rejection
Denial of Service
, In 2012, the social data value of a user on Facebook was about _____ (in USD).
30 cents
100 dollars
10,000 dollars
1,000,000 dollars
100 dollars
After Amanda Todd's death, which country introduced new anti-bullying laws to
prevent the sharing of intimate photos without consent?
The United States
The Netherlands
Canada
England
Canada
A _____ is malicious code that attaches itself to a host program and is activated
when the program is ran.
worm
virus
trojan
spyware
virus
An email _____ is text automatically added to the end of every email you send.
reply
filter
subject
signature
signature
_____ uses one key to convert a message into an unreadable form, and then a
second mathematically related key to convert the message back into readable
form.
Decryption
Public-key cryptography
Symmetric-key cryptography
Two-step verification
public-key cryptography
_____ is a type of business model where users pay for a vendor's apps, which
process and store data on the cloud.
Software as a service (Saas)
Infrastructure as a service (Iaas)
Platform as a service (Paas)
None of the above
Software as a service (Saas)
_____ is the business practice where company A uses company B to do work that
company A's employees might otherwise do.
Crowdsourcing