Selective Exposure and Cognitive Dissonance Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What refers to the ability of an individual or group to seclude themselves or information selectively?

  • Internet Privacy
  • Surveillance
  • Data Breach
  • Privacy (correct)
  • Which term describes the monitoring of behavior, activities, or information for the purpose of information gathering?

  • Surveillance (correct)
  • Data Breach
  • Cyberbullying
  • Application Security
  • Which act mandates all elementary and secondary schools to adopt policies to prevent and address acts of bullying?

  • Republic Act 10627 or Anti Bullying Act of 2013 (correct)
  • Data Breach
  • Cyberbullying
  • Civic Engagement
  • What is the right to keep sensitive data and information produced as a result of using the web private?

    <p>Internet Privacy</p> Signup and view all the answers

    What refers to security measures at the application level aiming to prevent data or code within an app from being stolen?

    <p>Application Security</p> Signup and view all the answers

    What is the primary motivation behind selective exposure?

    <p>To reinforce pre-existing beliefs and avoid contradictory information</p> Signup and view all the answers

    Which term describes bullying that takes place over digital platforms like computers and tablets?

    <p>Bullying</p> Signup and view all the answers

    Which theory suggests that people strive for cognitive equilibrium when consuming information?

    <p>Cognitive Dissonance Theory</p> Signup and view all the answers

    What is the primary consequence of political polarization?

    <p>It can result in the demonization of activists and human rights defenders</p> Signup and view all the answers

    What is the primary function of social capital?

    <p>To enable a society to function effectively through networks of relationships</p> Signup and view all the answers

    Which of the following is instrumental to democracy, according to the text?

    <p>Civic engagement and collective action</p> Signup and view all the answers

    What is the primary focus of the Selective Exposure Theory?

    <p>The motivated selection of information that aligns with one's existing beliefs</p> Signup and view all the answers

    Which of the following best describes the concept of selective exposure?

    <p>Individuals select information that is consistent with their existing beliefs and attitudes.</p> Signup and view all the answers

    Which of the following is not a type of civic engagement described in the text?

    <p>Protest marches</p> Signup and view all the answers

    Which of the following is a type of data breach that involves tricking individuals into revealing sensitive information?

    <p>Phishing</p> Signup and view all the answers

    Which of the following is a key aspect of the cognitive dissonance theory as described in the text?

    <p>Individuals seek to maintain a state of equilibrium by reinterpreting information.</p> Signup and view all the answers

    Which of the following is not a type of data breach mentioned in the text?

    <p>Spyware</p> Signup and view all the answers

    Which of the following best describes the concept of selective perception?

    <p>Individuals do not perceive information that is incongruent with their attitudes.</p> Signup and view all the answers

    Study Notes

    Privacy and Surveillance

    • Privacy is the ability to selectively seclude oneself or information from others.
    • Surveillance is the monitoring of behavior, activities, or information for various purposes, including information gathering and influencing.

    Data Breach and Application Security

    • A data breach is an incident where information is stolen or taken from a system without authorization.
    • Application security measures aim to prevent data or code from being stolen or hijacked.

    Internet Privacy and Cyberbullying

    • Internet privacy is the right to keep sensitive data and information produced while using the web private.
    • Cyberbullying is bullying that takes place over digital platforms, such as computers, tablets, and SMS.

    Republic Act 10627 (Anti-Bullying Act of 2013)

    • Signed by President Benigno Aquino III, the Act mandates schools to adopt policies to prevent and address bullying.

    Civic Engagement and Goals

    • The goal of civic engagement is to address public concerns and promote quality of life in the community.
    • Civic engagement involves participating in activities intended to improve the quality of life in one's community.

    Selective Exposure and Cognitive Dissonance

    • Selective exposure is the motivated selection of messages that match one's beliefs.
    • Selective exposure theory suggests that people favor information that reinforces their views and avoid contradictory information.
    • Cognitive dissonance theory proposes that people strive for cognitive equilibrium and may reinterpret information or select information that aligns with their views.

    Political Polarization and Social Capital

    • Political polarization refers to cases where an individual's stance on an issue is strictly defined by their political party identification.
    • Social capital is the network of relationships among people in a society that enables it to function effectively.

    Types of Civic Engagement

    • Electoral participation: citizens participating in the formation and procedures of their government through electoral processes.
    • Volunteerism: involvement of volunteer labor, especially in community services.
    • Activism and advocacy: working to bring about political or social change through increasing public awareness and support for particular causes or policies.

    Types of Data Breaches

    • Stealing information: stealing something without the owner's knowledge or consent.
    • Ransomware: software that holds data in exchange for money.
    • Password guessing: cracking passwords for malicious purposes.
    • Keyloggers: software that tracks every keystroke or key press.
    • Phishing: emails or websites that pretend to be authentic but are actually malicious.
    • Computer viruses: programs that manipulate computers while replicating themselves.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on Selective Exposure Theory, which focuses on favoring information that aligns with pre-existing beliefs, and Cognitive Dissonance Theory, which discusses the discomfort of holding conflicting views. Explore how these concepts impact decision-making and information consumption.

    More Like This

    Use Quizgecko on...
    Browser
    Browser