Question types

Start with

Question limit

of 20 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. https:
  2. Sprite
  3. Mal Ware
  4. Social Security Number
  5. Phishing
  1. a A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
  2. b An imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.
  3. c Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
  4. d Defines the URL of a "secure" site.
  5. e Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.

5 Multiple choice questions

  1. Business and college employees who frequently look at social networking sites (like Facebook) to assess the typical "behaviors" of their applicants.
  2. Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
  3. The act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.
  4. "Gender neutral" names that can be used instead of real names to increase your privacy online. For example, "Pat" can be both a girl's name or a boy's name; it is "gender neutral".
  5. A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.

5 True/False questions

  1. SpywareProgram placed on a computer without the user's knowledge that secretly collects information about the user.


  2. ShoutingTyping an entire sentence in "all caps."


  3. SpamOriginating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.


  4. PasswordA software program capable of reproducing itself that can spread from one computer to the next over a network.


  5. PredatorA secret series of characters that enables a user to access a file, computer, or program.


Create Set