5 Written Questions
5 Matching Questions
- Social Security Number
- a A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
- b Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
- c A secret series of characters that enables a user to access a file, computer, or program.
- d Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.
- e A person who takes advantage of another either physically, emotionally, or sexually.
5 Multiple Choice Questions
- The act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.
- Program placed on a computer without the user's knowledge that secretly collects information about the user.
- Business and college employees who frequently look at social networking sites (like Facebook) to assess the typical "behaviors" of their applicants.
- A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
- An online, "virtual world"; an overly simplified example would be "FarmVille" on Facebook.
5 True/False Questions
Digital Footprint → Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
www.cybertipline.org → A confidential website where you can report inappropriate behavior or concerns.
Worm → Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.
Mal Ware → Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
Privacy Settings → The ability to control access of information about oneself.