NAME

Question types


Start with


Question limit

of 20 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Phishing
  2. Social Security Number
  3. Mal Ware
  4. https:
  5. Password
  1. a A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
  2. b A secret series of characters that enables a user to access a file, computer, or program.
  3. c Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
  4. d Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
  5. e Defines the URL of a "secure" site.

5 Multiple choice questions

  1. A software program capable of reproducing itself that can spread from one computer to the next over a network.
  2. Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
  3. Program placed on a computer without the user's knowledge that secretly collects information about the user.
  4. A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
  5. "Gender neutral" names that can be used instead of real names to increase your privacy online. For example, "Pat" can be both a girl's name or a boy's name; it is "gender neutral".

5 True/False questions

  1. FlamingTyping an entire sentence in "all caps."

          

  2. Privacy SettingsA technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".

          

  3. ScoutsBusiness and college employees who frequently look at social networking sites (like Facebook) to assess the typical "behaviors" of their applicants.

          

  4. PredatorAn imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.

          

  5. www.cybertipline.orgBullying that takes place by email, instant messaging, text messages o.r web sites