5 Written questions
5 Matching questions
- ubiquitous computing
- Internet service providers (ISPs)
- macro viruses
- cyber crimes
- Business-to-Consumer (B2C) E-Commerce
- a attach to data files and take advantage of application macros
- b shopping online rather than at a physical store
- c Interacting with multiple networked devices
- d are crimes perpetrated through the Internet
- e companies that provide access to the Internet and no additional services
5 Multiple choice questions
- authentication—the use of voice recognition, retinal scans, and fingerprint scans for authentication purposes.
- The identification of an Internet resource's type and location is performed through its
- refers to the exchange of business between individuals. eBay is a good example.
- requires a satellite dish in addition to a phone line and modem for an Internet connection.
- the main high-speed routes through which data travels
5 True/False questions
identity theft → when a criminal gains access to personal information in order to impersonate someone
path → Unsolicited e-mails received by users, usually from advertisers
cyberspace → use email, instant messaging, chat rooms, pagers, cell phone, or other forms of information technology to make repeated credible threats of violence against another individual or family members of an individual
keyloggers → angry messages sent by other users
resource name → the last part of a complete URL, gives the file name of the resource you're accessing.