NAME

Question types


Start with


Question limit

of 20 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Scouts
  2. Flaming
  3. Androgynous Nicknames
  4. Digital Footprint
  5. Sprite
  1. a Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
  2. b An imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.
  3. c Business and college employees who frequently look at social networking sites (like Facebook) to assess the typical "behaviors" of their applicants.
  4. d The act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.
  5. e "Gender neutral" names that can be used instead of real names to increase your privacy online. For example, "Pat" can be both a girl's name or a boy's name; it is "gender neutral".

5 Multiple choice questions

  1. A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
  2. Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.
  3. Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
  4. Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
  5. A software program capable of reproducing itself that can spread from one computer to the next over a network.

5 True/False questions

  1. SpywareMalicious software designed to infiltrate or damage a computer system without the user's informed consent.

          

  2. Privacy SettingsA technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".

          

  3. PhishingA technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".

          

  4. Cyber BullyingBullying that takes place by email, instant messaging, text messages o.r web sites

          

  5. PasswordA secret series of characters that enables a user to access a file, computer, or program.

          

Create Set