5 Written questions
5 Matching questions
- inclusion operator
- memory shaving
- a knowledgeable thieves remove some of a computer's RAM chips but leave enough to start the computer.
- b similar to a virus but does not need the action of a user to execute the code and cause damage
- c internet equivalent of a journal
- d Legitimate looking email created to get personal data
- e generally a plus sign (+), used so that only Web pages including those criteria are retrieved
5 Multiple choice questions
- the main high-speed routes through which data travels
- alert the sender that the spam message has been opened, adding your address to a list of validated addresses.
- a collection of Web pages
- Unsolicited e-mails received by users, usually from advertisers
- uses radio waves to track a chip or tag
5 True/False questions
malware → a form of spyware that generates annoying pop-up and banner ads
Business-to-Consumer (B2C) E-Commerce → refers to a business providing supplies to other businesses via the Internet
cyberstalkers → use email, instant messaging, chat rooms, pagers, cell phone, or other forms of information technology to make repeated credible threats of violence against another individual or family members of an individual
path → the third part of a complete URL, specifies the location of the document on the server.
hyperlink → words and images that bring other documents into view when clicked