NAME

Question types


Start with


Question limit

of 20 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Digital Footprint
  2. Phishing
  3. Social Security Number
  4. Flaming
  5. Spyware
  1. a A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
  2. b Program placed on a computer without the user's knowledge that secretly collects information about the user.
  3. c Information gathered by "googling" someone, or something. Once online . . . ALWAYS online!
  4. d The act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.
  5. e Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.

5 Multiple choice questions

  1. Malicious software designed to infiltrate or damage a computer system without the user's informed consent.
  2. "Gender neutral" names that can be used instead of real names to increase your privacy online. For example, "Pat" can be both a girl's name or a boy's name; it is "gender neutral".
  3. A secret series of characters that enables a user to access a file, computer, or program.
  4. A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
  5. Business and college employees who frequently look at social networking sites (like Facebook) to assess the typical "behaviors" of their applicants.

5 True/False questions

  1. SpamOriginating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.

          

  2. WormA software program capable of reproducing itself that can spread from one computer to the next over a network.

          

  3. https:Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.

          

  4. Second LifeAn online, "virtual world"; an overly simplified example would be "FarmVille" on Facebook.

          

  5. ShoutingA technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".