Communication and Media Literacy Review

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of cyber stalking?

  • To follow a person's movements and send threatening messages (correct)
  • To promote a product
  • To study online trends
  • To engage in friendly conversation

Which term is used to describe a deceptive email that seems to come from a legitimate source?

  • E-mail spoofing (correct)
  • Malware distribution
  • Cyberbullying
  • Data mining

What are the three types of bullying mentioned?

  • Verbal, Social, and Physical (correct)
  • Workplace, Academic, and Online
  • Emotional, Social, and Verbal
  • Physical, Cyber, and Psychological

How do viruses typically affect a computer?

<p>By altering or deleting data (A)</p> Signup and view all the answers

What does netiquette refer to?

<p>A collection of rules for online conduct (B)</p> Signup and view all the answers

What is the primary purpose of feedback in communication?

<p>To provide suggestions for improvement (B)</p> Signup and view all the answers

Which of the following best describes media literacy?

<p>The ability to access, analyze, evaluate, and create media (C)</p> Signup and view all the answers

Who invented the first electronic telegraph?

<p>Samuel Morse (D)</p> Signup and view all the answers

What does media convergence refer to?

<p>The combination of distinct media technologies and forms (A)</p> Signup and view all the answers

What is the difference between response and feedback in communication?

<p>Responses are reactions to messages, while feedback aims to improve the sender's performance (C)</p> Signup and view all the answers

What is a channel in the context of communication?

<p>The medium through which the message is conveyed (C)</p> Signup and view all the answers

Which theory allows for a free press without censorship?

<p>Social Responsibility Theory (C)</p> Signup and view all the answers

What is the most important element of media literacy?

<p>Analyzing the purpose of a media message (A)</p> Signup and view all the answers

What does the term 'barriers' refer to in communication?

<p>Obstacles affecting communication (C)</p> Signup and view all the answers

Which of the following describes propaganda?

<p>Ideas or statements that are often exaggerated or misleading (A)</p> Signup and view all the answers

What does 'Fair Use' refer to in copyright law?

<p>Limitations on the rights of authors concerning their works (D)</p> Signup and view all the answers

In the context of media influence, what does Third-Party Theory suggest?

<p>People believe they are less influenced than they actually are (C)</p> Signup and view all the answers

What are media codes?

<p>Technical and symbolic codes used to create meaning (C)</p> Signup and view all the answers

What does the term 'information literacy' entail?

<p>Identifying and evaluating the credibility of sources (B)</p> Signup and view all the answers

Which theory judges crimes by natural laws rather than the standards of regimes?

<p>Marxist and Leninist Theory (D)</p> Signup and view all the answers

What best describes cyber bullying?

<p>Victimization through electronic communication tools (B)</p> Signup and view all the answers

What is a key characteristic of new media?

<p>Media experiences are interactive. (A)</p> Signup and view all the answers

What defines digital piracy?

<p>Obtaining media without acknowledging the owners. (A)</p> Signup and view all the answers

Which of the following is a disorder related to excessive internet use?

<p>Computer addiction. (C)</p> Signup and view all the answers

Which type of cybercrime involves gaining unauthorized access to a computer system?

<p>Hacking. (D)</p> Signup and view all the answers

What is the function of a television broadcaster?

<p>Plan and present information on various subjects. (A)</p> Signup and view all the answers

How does agenda-setting theory influence media?

<p>It prioritizes issues to influence public perception. (C)</p> Signup and view all the answers

Which of the following is an aspect of information literacy?

<p>Organizing information from multiple sources. (D)</p> Signup and view all the answers

What is mobile communication primarily used for?

<p>Connecting users over distant locations. (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Communication Basics

  • Defined as a two-way process for transmitting information between individuals or places.
  • Sender/source is the origin of the information or communication.
  • Elements of communication include: Sender/Source, Message, Encoding, Channel, Decoding, Receiver, and Feedback.
  • Feedback is intended to improve the sender's message, while a response is merely a reply.

Media Literacy

  • Encompasses the ability to access, analyze, evaluate, and communicate different types of media.
  • Critical for understanding the purpose of media messages.
  • Media convergence refers to the merging of distinct media technologies and formats.
  • Codes in media language help create meaning through signs and conventions.

Information and Technology Literacy

  • Information literacy involves recognizing the need for information and evaluating its credibility.
  • Technology literacy includes understanding network connectivity and effectively using tech tools.
  • Digital piracy is a crime that involves using media without proper acknowledgment of ownership.

Historical Context

  • The Industrial Age started in the 18th century, marked by a shift from traditional to industrial economies.
  • Karl Marx predicted the rise of laborers' power through economic and political revolutions.

Theories of Media and Responsibility

  • The Social Responsibility theory allows a free press without censorship.
  • Authoritarian Theory asserts that communication is controlled by elites or authorities.
  • Agenda-Setting Theory suggests that media prioritizes certain topics to influence public opinion.

Cybercrime Overview

  • Cybercrime can target computers directly (hacking) or involve using computers to commit offenses (like identity theft).
  • Types of Cybercrime include:
    • Hacking: Unauthorized access to computer systems.
    • Cyber Stalking: Online harassment and threatening messages.
    • Virus Dissemination: Harmful programs that affect computer data.
    • Phishing: Deceptive approaches to acquire sensitive data via email.

Academic and Scholarly Sources

  • Academic libraries support research and study in higher education.
  • Scholarly publications are well-researched articles primarily found in academic journals.

Media Experience and Interaction

  • New Media allows for more audience involvement and interactive experiences.
  • Users can give real-time feedback, unlike traditional media forms.

Ethical Considerations

  • Plagiarism is the unauthorized use of someone else's ideas or words.
  • Norms establish moral standards for right and wrong conduct in media.

Forms of Bullying

  • Types include verbal, social, and physical bullying.
  • Cyberbullying utilizes electronic platforms for harassment.

Additional Concepts

  • Netiquette refers to online conduct that is socially acceptable.
  • The term "domain" relates to the three-letter code in web addresses, such as ".com".

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Quarter 1 Media Literacy Review
18 questions
Media Literacy Module 1
10 questions

Media Literacy Module 1

BestKnownRosemary avatar
BestKnownRosemary
Introduction to Media Literacy
24 questions

Introduction to Media Literacy

AffectionateLosAngeles170 avatar
AffectionateLosAngeles170
Use Quizgecko on...
Browser
Browser