← Terms Google Apps Test
5 Written Questions
5 Matching Questions
- a A Web log, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture.
- b Websites use these files to store information on your browser, such as log-in or registration identification, user preferences, and online "shopping-cart" information. Your browser saves the information and reuses it when you return to those websites. You can refuse to accept cookies or erase all cookies saved on your browser.
- c An online community where people from all over the world may meet and share common interests. These sites allow members to set up a profile, which may include information such as name, location, phone number, age, and gender. Often users will post pictures and videos.
- d Information retrieved from the Internet, discs or CDs, and other computers which you can use or save to your computer.
- e "malware" covers all sorts of malicious software designed to harm a computer or network. Malware can be installed on your machine without your knowledge, often through deceptive links or downloads posing as something you might be interested in. Once malware has been installed on your computer, cyber criminals can sometimes try to access your personal information. They do this by logging your keystrokes or monitoring your computer's activity. Your computer could also be controlled and forced to visit websites, send spam email or perform other actions without your knowledge. The effects of malware can be anything from a brief annoyance to identity theft.
5 Multiple Choice Questions
- A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world
- a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation, but steals information or harms the system.
- An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies. Scammers copy legitimate websites and set up nearly identical pages. People are lured into sharing user names, passwords, account information, or credit card numbers.
- This is a system that creates a special "wall" to keep out unwanted information, like spam and viruses, and unwanted people, like hackers.
- a self-replicating malware computer program, which uses a computer network to send copies of itself to other computers on the network.
5 True/False Questions
Cyberbullying → Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones.
Attachment → A popular term for someone who accesses computer information either legally or illegally.
netiquette → A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
Browser → A popular term for someone who accesses computer information either legally or illegally.
pharming → An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.