5 Written Questions
5 Matching Questions
- Trojan Horse
- a fake sites and Internet scams
- b A file that can be added to an e-mail, like a document, photograph, or song.
- c Information retrieved from the Internet, discs or CDs, and other computers which you can use or save to your computer.
- d is software that loads itself onto a computer and tracks the user's browsing habits or pops up advertisements while the computer is in use. Applications that send data to advertisers.
- e A virus that is disguised as a useful piece of software
5 Multiple Choice Questions
- files to store information on your browser, such as log-in or registration identification, user preferences, and online "shopping-cart" information.
- covers all sorts of malicious software designed to harm a computer or network
- Unwanted e-mail from someone you don't know.
- A list of websites the people using a particular computer have visited
- an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture.
5 True/False Questions
Hacker → files to store information on your browser, such as log-in or registration identification, user preferences, and online "shopping-cart" information.
Cyberbullying → Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones.
Piracy → Illegally copying copyrighted software, music, or movies.
Firewall → Illegally copying copyrighted software, music, or movies.
Pharming → An online scam that attacks the browser's address bar.