Presentation is loading. Please wait.

Presentation is loading. Please wait.

1. Cyber Access 1. You intend to participate in a youth conference in an outskirt area, There are only FOUR hostels available nearby but with no access.

Similar presentations


Presentation on theme: "1. Cyber Access 1. You intend to participate in a youth conference in an outskirt area, There are only FOUR hostels available nearby but with no access."— Presentation transcript:

1 1. Cyber Access 1

2 You intend to participate in a youth conference in an outskirt area, There are only FOUR hostels available nearby but with no access. Which hostel location is likely enabling him to get internet access? A. Hostel near government office. B. Hostel near school. C. Hostel near public library. D. Hostel near shopping bazaar. 2

3 Omar is 11 years old who spent long hours on online games. Why should Omar’s parents be concerned? A. He may become a cyber bully victim. B. He may experience rye-strain. C. He may improve his social skills in the real life. D. He may involve in cybercrime activities. 3

4 Which activity is unethical when using a public internet access terminal? A. offer movie links to friends in other countries. B. Participate in public online surveys. C. Share personal photos on social networking site. D. Upload huge video file onto video sharing website. 4

5 Which activity is inappropriate when using the internet? A. Give bad comments about a film on the producer’s blog. B. Purchase controlled medication from an online pharmacy. C. Show how to duplicate a CD on video sharing website. D. Using credit card when shopping online. 5

6 Which location with internet access below is the safest place to do online banking transaction? A. Brother’s home. B. Community cyber centre. C. Local public library. D. University internet café. 6

7 Which is Not likely to happen if you continuously play online game 12 hours every day? A. Develop online gaming addiction. B. Experience sleep disorder. C. Improve keyboarding skills. D. Lack interest in social interaction. 7

8 A tourist told you that he couldn’t get access to the internet in your area. Which is the best way to help him get connect to the internet? A. Direct him to the nearest Community Internet Center. B. Offer him your personal internet account for minimal fee. C. Share your bank card PIN number only with close friends. D. Show him where to locate an unprotected Wi-Fi connection. 8

9 John is searching material on Green IT for his presentation on the internet. Which action is the most appropriate for John in getting resources from these online services? A. Copy nature photos from commercial image hosting site. B. Download copyrighted music from a peer-to-peer file sharing site. C. Download video on pollution from public domain site. D. Duplicate a paragraph in an article on Green IT from online journal. 9

10 You are a volunteer for a non-profit organization in a third world country, which is the proper way to help the locals gain a sustainable internet access? A. Ask minimal fees for sharing your own internet access password. B. Assist them to establish a local Community Internet Centre. C. Be an Internet Service Provider agent to offer access for profit. D. Show them how to locate nearby unsecured wireless network. 10

11 2. Cyber Literate 11

12 Sabah needs to complete her class assignment on earthquakes before the end of the month. Which website would you recommend to Sabah in order to get accurate and updated information about the topic? A. A website constantly updated by a senior seismology student. B. A website moderated by group of seismologists. C. A website regularly updated by the school. D. A website sponsored by seismology magazine. 12

13 Which of the following activities will NOT give negative impact on your digital footprint when using social networking site? A. Post anything that would be ethically questionable. B. Post information that you are comfortable with but others might feel insulted. C. Post information that you think your family, friends, employers and colleagues wouldn’t mind reading. D. Post your family problem and invite others to support you. 13

14 Shaima’s overseas friend wants to transfer money to her. She asked Shaima to provide her bank details. Which is the best way for Shiama to send the details safely? A. Call and provide the details. B. Send details by using email. C. Send the details by using Instant Messaging. D. Send the details by using SMS. 14

15 What is the negative implication of having a digital footprint on your future career? A. Employers can find your information online. B. Employers may get wrong impression about you. C. probably no employers will hire you. D. You become famous among your colleagues. 15

16 You received an email notification from your bank to update your banking details. It requires you to click on a link provided in the email to activate the update. Which is the most appropriate action to take? A. Click the link and provide all information required. B. Click the link, provide information and contact the bank. C. Do not click the link and delete the email. D. Do not click the link, reply the email and ask the reason. 16

17 Fatima wants to know about UAE’s Cybercrime Law. Which website offers the most reliable information? A. www.Cybercrime.comwww.Cybercrime.com B. www.Cybercrime.govwww.Cybercrime.gov C. www.Cybercrime.netwww.Cybercrime.net D. www.Cybercrime.orgwww.Cybercrime.org 17

18 Digital footprint is the information, activities, and behaviors of someone which is stored in the digital environment. A. True. B. False 18

19 Nataly posted a complaint about her mathematics teacher Miss Ronza on a social networking site. Some of Nataly’s online friends responded by posting a doctored photo of Miss Ronza with devil horns and blood coming out of her mouth. Can this action be considered as Cyber bully? A. No, complaining is not considered as cyber bully. B. No, making jokes of other pictures is not cyber bully. C. Yes, complaining about others on public is considered as cyber bully. D. Yes, damaging others reputation on public is considered as cyber bully. 19

20 3. Cyber Rule 20

21 Which of the following considered as a privacy invasion? A. Disclosing the name of convicted criminal to the public. B. Planting a listening device in someone’s bedroom. C. Posting your personal details on Wikipedia. D. Using a celebrity’s image in a commercial without consent. 21

22 Ameena bought an album of a singer, and uploaded the songs onto sharing website, what would be the implication to the singer? A. The singer will be popular in a short time. B. The singer will earn less income. C. The singer will produce another album. D. The singer will retire from the industry. 22

23 Video conferencing requires the persons at the other end to authorize acceptance before the video call can be activated. What is the main reason for this requirement? A. To avoid identity theft activities. B. To prevent hacking activities. C. To prevent malware spreading. D. To protect privacy and safety. 23

24 Ahmad developed a new software programme and wanted to sell it online. What is the best way for him to protect the software Intellectual Property ownership? A. Control activation key via registration. B. Patent the software. C. Prepare End User License Agreement. D. Subscribe to “https” service. 24

25 Which of the following activity is considered as an act of software infringement concerning software you bought online? A. Making duplicate CD as personal back up. B. Reinstalling on second PC via license migration. C. Sharing the software in peer-to-peer website. D. Sharing the software with friends on your PC. 25

26 You bought articles, photos, movies and music via online. Which activity from those purchases is considered as an act of digital offense? A. Cite the articles for assignment. B. Duplicate the movies for sibling. C. Turn the music into ringtone. D. Use the photos in your blog. 26

27 Ameer has just started working on his class assignment, he found a thesis paper on the internet on the same topic and directly used it without making any changes. Is Ameer’s action ethical? A. No, it is considered a plagiarism. B. No, it is considered as a scamming. C. Yes, it is considered as a fair use. D. Yes, it is considered as sharing material. 27

28 Which is Not protected under Cyber Law? A. File sharing. B. Ideas. C. Jurisdiction. D. Privacy. 28

29 4. Cyber Safety 29

30 Which activity is considered unethical when using school shared resources? A. Download materials from the internet for school assignment. B. Print personal documents via network printer. C. Save class activities photos on the server. D. Upload 2 MB of individual project video for school assignment to the internet. 30

31 Which of the following measures is NOT the best way to protect your personal data on your computer? A. Activate the firewall. B. Activate password settings. C. Install latest operating system. D. Update the anti-virus software. 31

32 Which of the following case is not the main purpose of computer hacking activities? A. Changing the date and time of the operating system. B. Exposure of confidential user information. C. Manipulation of sensitive data. D. Stealing important information. 32

33 Why performing an online banking at Cyber Café is not recommended? A. Cyber Café connections are not secure. B. Heavy bandwidth usage slows down transactions. C. There are many users sharing a computer. D. There is minimal privacy. 33

34 Under which condition security breaches could happen to your personal computer? A. Connecting to a password protected free wireless internet. B. Connecting to a password paid wireless internet. C. Connecting to the school server to download files. D. Connecting to your neighbor’s open wireless internet. 34

35 What is the best reason of having passwords on all computers at the school computer laboratory? A. To limit the usage time by the students. B. To prevent from unauthorized access. C. To protect from viruses. D. To keep all documents safe. 35

36 What is the best way to keep safe your personal information on social networking site? A. Disclose upon request only. B. Do not share it with anyone. C. Limit information to share. D. Share with close online friends only. 36

37 Why performing an online banking at Cyber Café is NOT recommended? A. Cyber Café connections are not secure. B. Heavy bandwidth usage slows down transactions. C. There are many users sharing a computer. D. There is minimal privacy. 37

38 Under which condition security breaches could happen to your personal computer? A. Connecting to password protected free wireless internet. B. Connecting to password protected paid wireless internet. C. Connecting to the school server to download files. D. Connecting to your neighbor’s open wireless internet. 38

39 Identify an activity that is unacceptable in a peer-to-peer networking environment? A. Download video trailers. B. Exchange friend’s photos. C. Share personal documents. D. Upload recent movies. 39

40 Which condition will most probably expose you to identify theft? A. Bank in cash via Cash Deposit Machine at the bank. B. Reply an e-mail you received from the bank. C. Transfer money via online banking on your personal computer. D. Withdraw cash from ATM at the bank. 40

41 Which activity is considered unethical when using school shared resources? A. Download materials from the internet for school assignment. B. print personal documents via network printer. C. Save class activities photos on the server. D. Upload 2MB of individual projects video for school assignments to the internet. 41

42 5. Cyber Interaction & Collaboration 42

43 You noticed someone has uploaded a video insulting your country’s national anthem onto a video sharing site. What actions should you take to remove the video (Choose two answers). A. Create hate blog to condemn the author. B. File complaint to the local authorities. C. Lobby viewers to boycott the video. D. post negative comments about the video. E. Report to website administrator. 43

44 Alia videotaped her friends playing. She decided to upload the video onto a video sharing site. Which of the following is the most ethical? A. Never upload as they didn’t wear proper attire. B. Never upload unless she has their agreements. C. Upload but later she has to inform her friends. D. Upload without mentioning the names. 44

45 While signing up for a social networking website, Zainab has the option to disclose her personal information to others. Which information below is safe for her to reveal? A. E-mail address. B. Nick name. C. Phone number. D. School address. 45

46 Create profiles which impersonate others. A. Ethical behavior. B. Unethical behavior. 46

47 Post status initiating blood donation campaign. A. Ethical behavior. B. Unethical behavior. 47

48 Post status that condemns others. A. Ethical behavior. B. Unethical behavior. 48

49 Share motivational video with others. A. Ethical behavior. B. Unethical behavior. 49

50 Share video on how to crack software. A. Ethical behavior. B. Unethical behavior. 50

51 Tag photos to your friend list without their consent. A. Ethical behavior. B. Unethical behavior. 51

52 Upload a public domain video. A. Ethical behavior. B. Unethical behavior. 52

53 Upload video on the implications of using pirated software. A. Ethical behavior. B. Unethical behavior. 53

54 Abeer is the administrator of her school online forum. She allows all posts made by her friends while reject and delete others. Accordingly, some students make a report to the school administration regarding that. Is Abeer’s action ethical? A. No, she doesn’t have the right to reject or delete post. B. No, she is discriminating others. C. Yes, she has the right to allow or reject any post. D. Yes, she is protecting the forum from any misuse. 54

55 Building up a community for business. A. Good. B. Bad. 55

56 Connecting people with common interest and world view. A. Good. B. Bad. 56

57 Create new relationship and reconnect with friends and family. A. Good. B. Bad. 57

58 Discuss sensitive issues and ask others to give comments. A. Good. B. Bad. 58

59 Get other people personal information for personal benefit. A. Good. B. Bad. 59

60 Make a gossip about your teacher social life. A. Good. B. Bad. 60

61 Make up stories to earn people’s sympathy. A. Good. B. Bad. 61

62 Share information with others on global warming issues. A. Good. B. Bad. 62

63 What will likely happen if you are talking on your mobile phone while driving on a rainy day without using a hand-free device? A. You maybe struck by lightening. B. You may improve your multi-tasking skills. C. You may involve in an accident. D. You will be more alert. 63

64 Ameena explains to Afra how to get into people’s email accounts and send fake emails from their accounts. What is the best action should Afra take? A. Ask Ammena to prove her words. B. Ask Ameena to stop her activity. C. Tell Ammena to share it with others. D. Try it herself as to experience it. 64

65 What is the consequence of sending unsolicited email to multiple mailing lists obtained from the internet? A. Your email account will be shut down by the email administrator. B. Your email inbox will be flooded with replies. C. Your email will be distributed to other mailing lists. D. Your email will be returned undelivered. 65

66 You came across a foreign Blog condemning your country’s High Court verdict for putting a drug trafficker in the prison. What is the best action for you to take? A. Create an online hate group to counter the accusation. B. Ignore it as he is entailed to his own opinion. C. post flame comments to rationalize the court’s action. D. Report to the webmaster as it is a national matter. 66

67 Which activity below indicates unethical use of technology? A. Copy of a popular hit song from a public domain music site. B. Download and share movies from video sharing site. C. Post negative comments in an online public forum. D. Text messaging to friend while travelling in fast train. 67 Part 1 Revision ends

68 6. Cyber Enterprise 68

69 Which is the best way to protect yourself from identity theft? A. Change our online banking password periodically. B. Give only your account’s details to trusted parties. C. Keep all account details in your mobile phone for easy access. D. Share your bank card PIN number only with close friends. 69

70 What is the potential consequence of online impulsive buying? A. Better managed monthly budget. B. Earned discount vouchers from the store. C. Tendency to buy unnecessary goods. D. Wiser decision making when purchasing. 70

71 Which of the following measures is the best way to keep safe your bank card PIN number? A. Save it in your computer and secure the file with password. B. Store it in your mobile phone with false name. C. Write it at the back of the bank card for easy access. D. Write it on a piece of paper and destroy it when you can remember it. 71

72 7. Cyber Care 72

73 Which of the following options best fit the symptoms below? -Use internet every day. -Loosing track of time while surfing the net. -Staying home more loosing social contact. A. Computer vision syndrome. B. Internet addiction. C. Repetitive strain injuries. D. Stress and depression. 73

74 Which of the following social problem associated with internet addiction? A. Breakdown of real-life relationships. B. Poor academic performance. C. Repetitive stress injury. D. Sleep disorder. 74

75 Which of the following is a probable threat to your health as a result of prolong exposure to the computer screen? A. Color blindness. B. Eye strain. C. Long-sighted. D. Short-sighted. 75

76 What type of computer monitor should you choose if you wish to buy one? A. A flat screen monitor. B. A large monitor. C. A monitor that consumes less electricity. D. A monitor with the latest design. 76

77 How can you reduce the health hazards related to computer usage? A. Look away from the screen regularly for ten seconds. B. Play soothing music in the background. C. Rest your wrists on a hard surface while typing. D. Use scenic nature screen saver. 77

78 What is the best way to dispose your computer equipment? A. Dump into the sea to turn it into an artificial reef. B. Sell to companies that export them to developing nations. C. Send it to computer recycle center. D. Throw it out together with household rubbish. 78

79 8. Cyber Accountability 79

80 When copying any original work from the internet, which element you should NOT take into considerations in order to avoid copyright infringement? A. The intended use qualifies as fair use. B. The work is available under a license agreement. C. The work is protected by copyright. D. The work is for personal use. 80

81 An Acceptable Use Policy (AUP) of a school states that “Any registered user identified as a security risk or having a history of problems in using other computer systems maybe denied access to district network services.” Is this statement fair? A. No, because it discriminates user just based on history or assumptions. B. No, because it hinders the progress of internet usage in the school. C. Yes, because they will definitely cause security problems in the future. D. Yes, because those with history tend to repeat their wrong doings. 81

82 Which of these elements SHOULD NOT be included when preparing an Acceptable Use Policy (AUP)? A. Advantages of the service. B. Code of conduct. C. Personal details. D. Statement of philosophy. 82

83 You wanted to use a copyrighted music in your blog, what should you do? A. Email the music owner for permission. B. Just use it and consider it as fair use. C. Modify and use it in your blog. D. Write to the blog hosting site for permission. 83

84 Amal posted a comment about an restaurant on her social networking wall, her friends started flaming the issue until it creates factions among them. what is the most ethical action should Amal do to diffuse the issue? A. Delete all comments made by her friends immediately. B. Hid the post. C. Post a clarification and apology for the misunderstood post. D. Report as abuse because it is considered as hate speech. 84

85 An Acceptable Use Policy (AUP) of a school states that “Any registered user identified as a security risk or having a history of problems in using other computer systems maybe denied access to district network services.” Is this statement fair? A. No, because it discriminate users just based on history of assumptions. B. No, because it hinders the progress of internet usage in the school. C. Yes, because they will definitely cause security problems in future. D. Yes, because those with history tend repeat their wrong doings. 85

86 You find a copyrighted image on the internet you wish to use in your class project. What is the most ethical way to use it? A. Do not use it. B. Get permission. C. Give credit. D. Just use it. 86

87 You wanted to use a copyrighted music for your personal blog, what should you do? A. Email the music owner for permission. B. Just use it and consider as fair use. C. Modify and use it in your blog. D. Write for the blog hosting site for permission. 87

88 Maitha saw a computer left idle in the library for a period of time by the previous user without logging off her facebook account. What is the most ethical action should Maitha take? A. Continue use the account. B. Ignore and leave as it is. C. Log out from the account. D. Switch off the computer. 88

89 Your friend won a song completion organized by the school. But you found out that the song has similar melody to a popular Japanese song. What should you do? A. Ask the organizer to ban your friend from future competition. B. Ask your friend to clarify the matter. C. Report the matter to the Japanese composer. D. Report to the organizer and provide evidence. 89


Download ppt "1. Cyber Access 1. You intend to participate in a youth conference in an outskirt area, There are only FOUR hostels available nearby but with no access."

Similar presentations


Ads by Google