Homework - Chapter 12
Total Page:16
File Type:pdf, Size:1020Kb
Homework - Chapter 12
Answers to the questions in this assignment must be based on the material covered in chapter 12 of your textbook!
When submitting your answers use the Word Processor’s highlighter to highlight your answer, save the document and email me the file with your answers highlighted.
TRUE/FALSE
T F 1. Communicating via email is not appropriate for all situations.
T F 2. It is impossible to convey emotion in an email.
T F 3. One message covering multiple topics is better than multiple messages, each with a single topic.
T F 4. Email never fails to be delivered.
T F 5. Email backlogs should be answered in the order they were received.
T F 6. Multiple, small distribution lists are better than fewer, large lists.
T F 7. A well-conceived password should be easy to remember and difficult to break.
T F 8. A good choice for a password is one that can be found in dictionaries and has an obvious personal association.
T F 9. When you are unable to answer your email for a long time, it is polite to set up an automated reply saying you are away.
T F 10. Using a single password for all of your accounts is unwise.
T F 11. Viruses are often distributed through email attachments.
T F 12. The use of shareware implies the obligation to pay for it.
T F 13. For your work to have copyright protection, the copyright symbol, ©, must be listed on your work.
T F 14. The copyright symbol need not be listed on your work to be binding.
T F 15. Web pages cannot be copyrighted.
T F 16. You can be confident but not certain that software will work as it should. T F 17. Proofreading is one of the best ways to prevent confusion and ambiguity in an email message.
T F 18. Software that is available for free is called shareware.
T F 19. The limited use of copyrighted material for educational or scholarly use is called fair use.
T F 20. Phishing is when hackers use deception in order to fool you into giving them your personal information.
MULTIPLE CHOICE
21. To show emphasis in an email message, you should enclose words in: a. *asterisks* b. (parentheses) c. “quotes” d. any of the above
22. By observing the following rules and general courtesies, your email can be more pleasant and effective: a. Answer a backlog of email in reverse order b. Get the sender’s permission before forwarding email c. Use targeted distribution lists d. All of the above
23. Email is: a. Private b. Copyrighted c. easy to forward d. subject to censorship
24. Before forwarding email, you should: a. get the sender’s permission b. notify the sender that you are forwarding it c. send a disclaimer d. all of the above
25. If policies within a company are not forcing users to change their password periodically, a user should still change his/her password : a. at least once a week b. at least once a month c. at least once a year d. only when you suspect hacking 26. Passwords: a. are maintained on a list by the system administrator b. can be viewed by a superuser c. must always be changed monthly d. are encrypted and are not viewable as “clear text”
27. Virus protection software will protect your computer from: a. all known viruses b. viruses for the length of the software license c. most known viruses and entitle you to periodic updates of virus definitions d. less than half the known viruses
28. Which of the following is probably legal? a. You buy a computer game and give copies to your friends. b. You and your buddies pool your money to buy software, and then you each install it on your home computers. c. You buy one copy of a piece of software, but install it at home and at your office. d. You buy one copy of a piece of software, but install it at home, your office, and on your spouse’s laptop.
29. A computer program is considered correct when: a. its behavior exactly matches its specifications b. its failure rate approaches zero c. it doesn’t fail in the first hours of use d. there are no known bugs
30. All systems: a. contain inherent risks b. can be made bug-free c. can be made fail-safe d. should have a fail-soft mode
31. Which of the following puts you at greater risk of being hacked? a. using a web site that doesn't use encryption when providing personal information b. opening an executable (.exe) attachment from an unknown sender c. using email to respond to unsolicited requests for personal information d. all of the above
32. Using ALL CAPS for an email message conveys: a. Sarcasm b. whispering c. Anger d. humor
33. The best way to end a flame war is to: a. cc all parties b. cool down before you reply c. use humor or sarcasm d. proofread your message
34. Email: a. never fails to be delivered b. is usually delivered in four hours or less c. notifies you only if your message isn’t delivered in three days d. is only about 90 percent reliable
35. A list moderator does all of the following except: a. configures the list-serve for its members b. edits all messages sent to the list c. maintains a list of members subscribed to the list-serve d. handles errors and problems for the list-serve
36. When you forget your password: a. you must request for a new account b. the system administrator looks up your password c. the system administrator unscrambles your password and gives it to you d. the system administrator assigns a new password for you to use
37. Computer viruses and worms have been around since: a. the early days of computers b. the early days of the Internet c. the late 1980s d. the late 1990s
38. Computer viruses are typically spread by: a. copying software from an infected computer b. touching an infected computer c. opening email from an infected computer d. sending email to an infected computer
39. Most software: a. contains bugs b. is bug-free c. contains no known bugs d. works exactly as it should in every circumstance
40. ______are little, character-based graphics used to display emotion in an electronic message. a. Emoticon b. Netisymbols c. Worms d. heuristics
SHORT ANSWERS
41. The popular rules of conduct for email and the Internet are called ______.
42. The content of an email message should be described in the ______. This will provide the recipient of the email the opportunity to get an idea of what the email is about. 43. A ______is an independent program that makes copies of itself from machine to machine across network connections.
44. A ______is a program that ‘infects’ another program by embedding a copy of itself so that when the infected program runs, the virus makes copies of itself, infecting other programs.
45. Email has a ______property, that is, the ability to send the same message to many people at the same time.
46. A ______is a programmed response to your email that you can configure to be sent when you when you are away and will not be checking your email.
47. The individual who controls access to a computer system, including logins and passwords, is call an ______.
48. ______cannot be copyrighted.
49. ______is non-material, human creations that people can claim ownership to.
50. ______is the illegal use of email to scam users into surrendering their personal information, usually items like social security numbers, bank account numbers and credit card numbers.