NAME

Question types


Start with


Question limit

of 79 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. data diddling
  2. 1995-2000
  3. boot sectors
  4. biometric authentication
  5. identity theft
  1. a execute each time you start the computer
  2. b dot-com boom
  3. c when a criminal gains access to personal information in order to impersonate someone
  4. d insiders modify data by altering accounts or database records so that it's difficult or impossible to tell that they've stolen funds or equipment
  5. e authentication—the use of voice recognition, retinal scans, and fingerprint scans for authentication purposes.

5 Multiple choice questions

  1. uses links to move to additional related information
  2. a simple web page on which any visitor can post text or images, read previous posts, change posted information, and track earlier changes
  3. a computer file included with an e-mail message.
  4. what the URL is made up of: domain name, path, and resource name.
  5. uses tags to specify how a Web page should display.

5 True/False questions

  1. Internet service providers (ISPs)companies that provide access to the Internet and no additional services

          

  2. Interneta universal system of computers and networks

          

  3. malwareangry messages sent by other users

          

  4. firewallprovide organized subject guide links to topics such as the news, local weather, and e-mail.

          

  5. web pageis a document that may include text, graphics, sound, animation, and video.