Name: ______

Internet Safety Quiz

Multiple Choice

  1. ____ Copyright protections given to authors include control over:
  2. The right to sell or distribute copies of the work
  3. The right to make copies of the work
  4. The right to prepare new works based on the protected work
  5. All of the above
  1. ____ Which of the following examples of creative expression cannot be copyrighted?
  2. A photograph
  3. A novel
  4. An unrecorded verbal presentation
  5. A videotape
  6. ____ Which of the following is true of DMCA?
  7. Outlaws the manufacture or distribution of code-cracking devices used to illegally copy software
  8. Requires that “web-casters” pay licensing fees to record companies
  9. Expects internet service providers to remove material from users’ websites if the material constitutes copyright infringement
  10. All of the above
  11. ____ Which of the following works are not in the public domain
  12. Judicial opinions
  13. Ideas
  14. GEICO commercials
  15. Words, names, slogans
  1. ____ The internet is difficult to police because
  2. Anyone can publish information and offer goods and services on the internet.
  3. Because of the global nature of the internet, it is difficult for legal authorities to have the necessary jurisdiction to enforce laws across worldwide borders.
  4. The sometimes anonymous nature of the internet contributes to deception, misuse, and cyber crime
  5. All of the above
  6. ____ Hardware or software that makes your computer secure by blocking outside, unauthorized access is best described as a (an)
  7. Filter
  8. Firewall
  9. Anti-virus program
  10. Spyware program
  11. ____ Which of the following are good tips to follow for chat rooms or social networking sites?
  12. Do not give out personal information such as address, phone numbers, information about yourself or your parents work address or phone number, or the address of your school
  13. Make sure any pictures you want to exchange are appropriate and approved firstby your parents.
  14. Do not meet with people you have met online without clearing it with your parents first. If a meeting is decided, meet and remain in a public place and bring a parent along.
  15. All of the above

Short Answer

  1. What is spyware and how do you get it?
  1. What is Fair Use?

True or False

  1. ____ A virus is a program that spreads itself by infecting files or the system area of your computer.
  2. ____ Viruses can make copies of themselves, operate without your knowledge, destroy data, spread to other computers, and may require expensive repairs.
  3. ____State employees may not copyright their work.
  4. ____ Using 50% or more of a work makes it less likely to be considered “fair use”.
  5. ____ Copyright is a legal device that gives the creator of a work of literature, art, or other tangible expression the right to control how the work is used.
  6. ____ An email message can be considered to be original expression.
  7. ____ It is generally good advice to credit the source of your information.
  8. ____ Unpublished works are less likely to be considered as fair use.
  9. ____ Fair use limits copyright holders’ exclusive rights when works are being used for non-profit or educational purposes.
  10. ____ Permission to use copyrighted material is required when the intended use is commercial.
  11. ____ Files you download can contain a virus or spyware.
  12. ____ Spyware can monitor your browsing habits.
  13. ____ Sharing files is safe on a Peer-To-Peer network because the files are automatically scanned for viruses.
  14. ____ Communication on the internet is private
  15. ____ A good policy is not to write, send an email, or visit a site if you would be uncomfortable having the information appear on the front page of a newspaper or be featured on the evening news.
  16. ____ Logs of incoming and outgoing emails are usually kept on a system server

26. ____ It is unethical for anyone to use the works of others in ways that are unfair to them.

Matching - (Place the letter that best describes the term next to each number.)

27. ____ / P2P or Peer-to-peer / A / Unsolicited commercial email
28. ____ / Cookies / B / Programs installed on your computer that permit unauthorized
people to gain access to your computer and sometimes send out spam from it
29. ____ / Phishing / C / Program that can reproduce itself over a network and use up your computers resources
30. ____ / Client-server / D / Type of network where each computer is equal and has the same capabilities
31. ____ / Spam / E / Type of software that often comes with free downloads
32. ____ / Trojans / F / Small text file that a website can put on your hard drive to collect information
33. ____ / Adware / G / Type of network where some computers are designated to serve other computers
34. ____ / Worm / H / Scam where spam may lure personal information such as credit card numbers , bank account or social security information from unsuspecting victims

Troubleshooting Scenario

35. You have noticed that recently your computer has been acting very sluggish. Sometimes certain keys don’t work or you get error messages. It takes a long time to open and launch programs or save files. You are bombarded with pop-up ads and sometimes your browser redirects you to sites you don’t want.

a. What is the likely cause of this behavior?

b. How can you fix it?

c. How can you prevent it from happening again?

1

J. Black -- 2006