Effective Communication and Online Etiquette Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the recommended practice before sharing a post from social media with other parties?

  • Share it without seeking permission.
  • Always ask the author for permission. (correct)
  • Delete the post after sharing.
  • Modify the post before sharing.
  • What type of information should you avoid sharing online to protect your privacy and safety?

  • Home address and phone number (correct)
  • Passwords and hints
  • Public social plans
  • Financial information
  • What consequences can copying someone else's work and passing it off as your own have?

  • Increased reputation
  • Academic recognition
  • Plagiarism accusations (correct)
  • Legal protection
  • Why is it important to exercise good judgment when sharing information online?

    <p>To protect your privacy and safety</p> Signup and view all the answers

    What should you do if you wish to share an email you received with others?

    <p>Ask for permission from all recipients</p> Signup and view all the answers

    Why should you be careful about what you post publicly on discussion boards and social media?

    <p>To maintain privacy as posts can be seen by the public</p> Signup and view all the answers

    What is the best practice when sharing a viewpoint that differs from someone else’s?

    <p>Restate the other person's viewpoint briefly in your own words</p> Signup and view all the answers

    What phrase can you use to indicate that an opinion is solely yours?

    <p>In my experience</p> Signup and view all the answers

    What should you do before sending a message electronically?

    <p>Ask yourself if you would be okay if someone else had written it</p> Signup and view all the answers

    What is the first rule mentioned in the Ten Commandments of Computer Ethics?

    <p>Do unto others as you would have them do unto you</p> Signup and view all the answers

    What does Rule 2 of the Ten Commandments of Computer Ethics emphasize?

    <p>Maintaining the same standards of behavior online as in real life</p> Signup and view all the answers

    How should you address a viewpoint that is not your own according to the text?

    <p>&quot;According to Eric Ericson&quot; or &quot;The president believes&quot;</p> Signup and view all the answers

    What is copyright infringement?

    <p>Unauthorized use of a copyright holder's exclusive rights</p> Signup and view all the answers

    How is plagiarism defined?

    <p>Using someone else's language and thoughts without permission</p> Signup and view all the answers

    What does 'computer addiction' generally refer to?

    <p>Playing games offline and online</p> Signup and view all the answers

    In the context provided, what is 'Virtual Self'?

    <p>The virtual image you create of yourself online</p> Signup and view all the answers

    What is hacking in the realm of cybercrimes?

    <p>Unauthorized access or interference with computer systems</p> Signup and view all the answers

    Why is online computer addiction given more attention in scientific research?

    <p>Most cases of computer addiction are related to online activities</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser