- Data privacy refers to:
- a) Protecting digital devices from malware
- b) Ensuring data is stored securely in the cloud
- c) The right to control personal information
- d) Using strong passwords for online accounts
- Which of the following is NOT a key principle of data protection?
- a) Purpose limitation
- b) Data encryption
- c) Data minimization
- d) Data retention
- Phishing is a type of cyber attack that involves:
- a) Overloading a system with excessive traffic
- b) Intercepting communication between two parties
- c) Sending deceptive emails to trick users into revealing sensitive information d) Injecting malicious code into a web application
- Multi-factor authentication (MFA) adds an extra layer of security beyond passwords by:
- a) Encrypting data transmitted between the user and the server
- b) Requesting multiple passwords for the same account
- c) Verifying the user’s identity using multiple methods
- d) Blocking access to an account after multiple failed login attempts
- Proper citation and referencing in academic writing are important because they:
- a) Make the writing more formal and sophisticated
- b) Allow readers to verify the sources and build credibility
- c) Add unnecessary length to the paper
- d) Are required by all academic institutions without exception
- Plagiarism in academic writing refers to:
- a) Using strong and unique passwords for online accounts
- b) Failing to properly cite and reference sources in the paper
- c) Encrypting data to protect it from unauthorized access
- d) Implementing multi-factor authentication for secure login
- Which citation style is commonly used in the fields of social sciences, education, and psychology?
- a) APA (American Psychological Association)
- b) MLA (Modern Language Association)
- c) Chicago
- d) Harvard
- The General Data Protection Regulation (GDPR) is a data protection regulation implemented in:
- a) The United States
- b) China
- c) The European Union
- d) Australia
- The California Consumer Privacy Act (CCPA) is a data protection regulation implemented in:
- a) California, USA
- b) Canada
- c) China
- d) The European Union
- A strong password should contain: a) A person’s name and birthdate b) A mix of upper and lower-case letters, numbers, and special characters c) Common words found in the dictionary d) The same characters repeated multiple times for length
inal Exam – Data Privacy, Cybersecurity, and Academic Integrity
Section 1: Data Privacy and Cybersecurity
- Define data privacy and explain its significance in the digital age.
- List three major data protection regulations and briefly describe one of them.
- What are the key principles of data protection? Provide examples of how these principles can be applied in real-life scenarios.
- Explain the value of personal data and the potential risks associated with data breaches.
- Discuss two best practices for data protection, and explain how they can enhance cybersecurity.
- What are the common types of cyber threats and attacks mentioned in the course? Provide a brief description of each.
- How does multi-factor authentication (MFA) enhance security beyond passwords? Give an example of an MFA method and its application.
- Describe the concept of phishing and its impact on individuals and organizations. How can individuals protect themselves from phishing attacks?
Section 2: Academic Integrity and Proper Citation
- Define academic integrity and explain its importance in research and academia.
- What are the consequences of academic dishonesty and plagiarism? How can students avoid academic cheating?
- Discuss the significance of proper citation and referencing in academic writing. Why is it essential to give credit to the original authors?
- Differentiate between direct quotes and paraphrasing. When and how should each be used in academic writing?
- Name two major citation styles used in academic writing (e.g., APA, MLA) and explain the differences between them.
- How can students avoid unintentional plagiarism when using external sources in their academic work?
- Why is academic integrity important in research and how does it contribute to the advancement of knowledge?
Section 3: Short Answer Questions
- Describe two best practices for protecting personal data online.
- What is the significance of having a strong, unique password for each online account?
- Provide three examples of cyber threats and briefly explain their potential impact.
- How does multi-factor authentication (MFA) work, and why is it considered more secure than single-factor authentication?
- Explain why it is crucial to properly cite and reference sources in academic writing.
Section 4: Critical Thinking
Imagine you are a cybersecurity consultant for a small business. The business owner wants to enhance data privacy and cybersecurity measures for their company. Provide three specific recommendations tailored to their needs, considering their budget and resources.
Section 5: Essay Question
In an essay of at least 300 words, discuss the intersection between data privacy and academic integrity. How does data privacy impact academic research, and why is academic integrity essential when handling sensitive data? Provide examples to support your arguments.
(Note: The final exam questions cover topics from the course, including data privacy, cybersecurity, academic integrity, and proper citation. The exam is designed to assess students’ understanding of the key concepts and principles presented in the course.)
- c) The right to control personal information
Leave a Reply