Question types

Start with

Question limit

of 79 available terms

Print test

5 Written questions

5 Matching questions

  1. keyloggers
  2. web page
  3. data diddling
  4. cyber law
  5. Phishing
  1. a record keystrokes to provide cybercriminals with confidential data
  2. b Legitimate looking email created to get personal data
  3. c is a document that may include text, graphics, sound, animation, and video.
  4. d is the area of law dedicated to computer crime
  5. e insiders modify data by altering accounts or database records so that it's difficult or impossible to tell that they've stolen funds or equipment

5 Multiple choice questions

  1. uses radio waves to track a chip or tag
  2. a system used by the internet to link domain names with their corresponding IP addresses.
  3. companies that provide access to the Internet and no additional services
  4. the last part of a complete URL, gives the file name of the resource you're accessing.
  5. dot-com boom

5 True/False questions

  1. search operatorsare used to perform complex searches.


  2. paththe third part of a complete URL, specifies the location of the document on the server.


  3. cyberbullyinguse email, instant messaging, chat rooms, pagers, cell phone, or other forms of information technology to make repeated credible threats of violence against another individual or family members of an individual


  4. ubiquitous computingInteracting with multiple networked devices


  5. web beaconalert the sender that the spam message has been opened, adding your address to a list of validated addresses.