Group 4 Sex and Technology Multiple Choice: D. Child Pornography

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

GROUP 4 SEX AND TECHNOLOGY

MULTIPLE CHOICE

1. A type of pornography that exploits children for sexual stimulation?

a. Pornography

b. Cybersex

c. Child Abuse

d. Child Pornography

2. Children used in child pornography are victims of?

a. Child Abuse

b. Love

c. Poverty

d. Harassment

3. An activity in which one engages in sexual activity with another person?

a. Prostitution

b. Virtual Prostitution

c. Sexual Harassment

d. Cybersex

4. Which of the following is a type of Prostitution?

a. Street

b. Escort

c. Gigolo

d. All of the above


5. Travel for sexual intercourse with prostitutes or to engage in other sexual activity?

a. Escort

b. Street

c. Sex Tourism

d. Gigolo

TRUE OR FALSE

6. Penalties range up to life imprisonment for those involved in trafficking, which is covered by the Anti-
Trafficking in Persons Act of 2003

ANSWER: TRUE

7. There are several reasons why individuals partake in child pornography, and while some are very
specific, the general themes include: Sexual gratification and Control

ANSWER: TRUE

8. Cybersex can be defined as a subcategory of online sexual activity where Internet is used for sexually
gratifying activities.

ANSWER: TRUE

9. A virtual sex encounter in which two or more people sends each other sexually explicit messages
online.

ANSWER: TRUE

10. An internet relationship is a relationship between people who have met online, and in many cases
know each other only via the Internet.

ANSWER: TRUE
GROUP 5 INTRUSION PREVENTION

MULTIPLE CHOICE

1. IPS Stands for?

a. Intrusion Prevention System

b. Internal Prevention System

c. Intrusion Protection System

d. Invasion Prevention System

2. Which of the following is an actions of IPS

a. Sending an alarm to the administrator

b. Dropping malicious packets

c. Blocking traffic from the source address.

d. All of the above

3. Is an identity theft prevention tool which safeguards you from online spying?

a. Advance Identity Protector

b. Advance Identification Protector

c. Advance Identity Prevention

d. Absent Identity Protector

4. One of identity theft protection services which keeps an eye on your personal information, warns you
about threats, and protect you

a.IdentityTracker

b. IdentityForce

c. IdentityLocator

d. IdentityMonitor
TRUE OR FALSE

5. Data monitoring is the process of proactively reviewing and evaluating your data and its quality to
ensure that it is fit for purpose.

ANSWER: TRUE

6. A social science number is the key to obtaining credit, opening bank accounts, and receiving
government benefits. As such, it is the most powerful personal identifier you have.

ANSWER: FALSE (social security number)

7. Identity theft is the deliberate use of someone's personal data, usually to gain a financial advantage in
the other person's name, or to harm the person whose identity has been assumed

ANSWER: TRUE

8. Tax withdraw theft takes place when someone uses another person’s social security number to get a
job or file a fraudulent state or federal tax return using another person’s information, usually to receive
that individual’s tax refund

ANSWER FALSE ( Tax Identity Theft)

9. IDENTITY THEFT is like a virus. Its constantly evolves and is relentless to find another host.

ANSWER: TRUE

10. An individual commits social media identity theft when he or she duplicates or hijacks someone else’s
social media account

ANSWER: TRUE
GROUP 6 NETWORK SECURITY

MULTIPLE CHOICE

1. A person who enjoys learning the details of computer systems and how to stretch their capabilities?

a. IT

b. Hacker

c. Both A and B

D. None of the above

2. is the state or process of protecting and recovering networks, devices, and programs from any type of
cyberattack.

a. Cyberattack

b. Cyber Security

c. Cybercrime

d. Cybersex

3. Access control systems can be hacked. When a system is hacked, a person has access to several
people's information, depending on where the information is stored

a. Intrusion

b. Hacking

c. Accessing

d. None of the above

4. Also refers to the processes and methodologies involved with keeping information confidential,
available, and assuring its integrity.

a. Cyber Security

b. Computer Security

c. Both A and B
D. None of the above

TRUE OR FALSE

5. As technology has increased with time, so have these control systems. A simple four-digit PIN and
password are not the only options available to a person who wants to keep information secure.

ANSWER: TRUE

6. Information warfare (IW) is a concept involving the battlespace use and management of information
and communication technology (ICT) in pursuit of a competitive advantage over an opponent.

ANSWER: TRUE

7. APTs (Advanced Persistent Threats), a type of attack on integrity, are attacks where an unauthorized
user infiltrates a network undetected and stays in the network for a long time.

ANSWER: TRUE

8.Network Security involves the authorization of the access to the data in a network

ANSWER: TRUE

9. Social attack, a type of attack on confidentiality, is the process of psychologically manipulating people
into performing actions or giving away information.

ANSWER: FALSE ( Social Engineering)

10. Malware, or malicious software, is a type of attack on availability. It refers to software that is
designed to gain access or damage a computer without the knowledge of the owner.

ANSWER: TRUE
GROUP 7 TELEMEDICINE

MULTIPLE CHOICE

1. remote delivery of healthcare services, such as health assessments or consultations, over


the telecommunications infrastructure.

a. Virtual Medicine

b. Telemedicine

c. E-Medicine

d. All of the above

2. Which of the following istype of Telemedicine

a. Interactive Telemedicine

b. Remote Patient Monitoring

c Store-and-forward

d. All of the above

3. Delivery of mental health counseling via the Internet.

a. Virtual Medicine

b. Interactive Telemedicine

c. Virtual Therapy

d. Telemedicine

4. Lets providers share patient information, such as lab results, with a physician at another location.

A. Store and Forward

b. Interactive Telemedicine

c. Virtual Therapy

d. Telemedicine
TRUE OR FALSE

5. The key technical feature of telemedicine is being able to communicate medical data over a distance,
and long distance communication methods existed throughout human history.

ANSWER: TRUE

6. Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use
mobile medical devices and technology to gather patient-generated health data (PGHD) and send it to
healthcare professionals

ANSWER: TRUE

7. Therapists are required by law to tell the truth and give an accurate account of the care they can
provide.

ANSWER: TRUE

8. Telemedicine is a subset of telehealth, which includes both remote clinical service delivery and
nonclinical elements of the healthcare system.

ANSWER: TRUE

9. Telehealth refers to a broader spectrum of remote healthcare services than telemedicine and does not
necessarily involve clinical services

ANSWER: TRUE

10. If the therapist believes there is an immediate danger of serious self-harm or suicide, confidentiality
may be broken for the purposes of informing emergency healthcare services

ANSWER: TRUE
GROUP 8 ONLINE CRIMES

MULTIPLE CHOICE

1. Also known as “Sales Promotion And Marketing”?

a. Marketing

b. Spamming

c. Sales

d. None of the above

2. Also known as unsolicited bulk email (UBE), is the practice of sending unwanted messages., frequently
with commercial content, in large quantities to an indiscriminate set of recipients.

a. Internet Marketing

b. E-Commerce

c. Email Spamming

d. None of the above

3. Is unwanted spam content appearing on social networking services and any website with user-
generated content e.g. comments, chats, etc.

a. Email Spamming

b. Spamming

c. Social Network Spam

d. None of the above

4. It is politically motivated use of computers and information technology to cause severe disruption or
widespread fear in cociety

a. Cyberattack

b.Cyberterrorism

c. Cybercrime
d. None of the above

TRUE OR FALSE

5. mobile phone spam is directed at the text messaging services of a mobile phone.

ANSWER: TRUE

6. Web or Search Spam means excessive manipulation of web contents or keywords to gain search engine
rankings which also make a website to gain more popularity and exposure than how it deserves.

ANSWER: TRUE

7. CYBERTERRORISM IS A KIND OF CYBER-ATTACK

ANSWER: TRUE

8. Phishing scams are based on communication made via email or on social networks.

ANSWER: TRUE

9. Greeting card scams are another new Internet scams used by malicious actors to inject malware and
harvest users’ most valuable data

ANSWER: FALSE ( old)

10. Terrorism is, in the broadest sense, the use of intentionally indiscriminate violence as a means to
create terror among masses of people; or fear to achieve a religious or political aims

ANSWER: TRUE
GROUP 9 BLOGGING

TRUE OR FALSE

1. Social Media Sites are interactive computer-mediated technologies that facilitate the creation and
sharing of information, ideas, career interests and other forms of expression via virtual communities and
networks.

ANSWER: TRUE

2. Company Website are world wide web pages created by an individual to contain content of a personal
nature rather than content pertaining to a company, organization or institution.

ANSWER: FALSE( Personal Website)

3. email or e-message is the act of composing and sending electronic messages

ANSWER: FALSE ( Text Messaging or Texting)

4. Sexting is slang for the act of sending sexually explicit or suggestive content between mobile devices
using SMS. A genre of texting, it contains either text, images, or video that is intended to be sexually
arousing.

ANSWER: TRUE

5. An online game is a video game that is either partially or primarily played through the internet or any
other computer network available.

ANSWER: TRUE

6. Online Shopping is a form of electronic commerce which allows consumers to directly buy goods or
services from a seller over the Internet using a web browser.

ANSWER: TRUE

7. Consumers find a product of interest by visiting the website of the retailer directly or by searching
among alternative vendors using a shopping search engine, which displays the same product's availability
and pricing at different e-retailers.

ANSWER: TRUE

8. The term "mobile office" is also used for the workspace of salespeople or similar, working out of their
company office.

ANSWER: TRUE

9. Text messaging has affected students academically by creating an easier way to cheat on exams.

ANSWER: TRUE
10. Text messaging has been a subject of interest for police forces around the world. One of the issues of
concern to law enforcement agencies is the use of encrypted text messages.

ANSWER: TRUE

You might also like