Search Header Logo

Lesson 8: CIW

Authored by Alison Rayman

Computers

8th Grade

Used 43+ times

Lesson 8: CIW
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Because spam is sent to you uninvited, it can be considered:

a licensing agreement.
an invasion of privacy.
a trademark violation.
copyright infringement.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?

Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.
Because JavaScript and ActiveX controls cannot be authenticated.
Because JavaScript and ActiveX controls place an inordinate amount of cookies on your system.
Because JavaScript and ActiveX controls cannot be encrypted.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To what does "The Right to Be Forgotten" argument relate?

Protecting your image and personal information in the world of social networking
Protecting your data from computer viruses
Hiding your image and personal information from potential spammers
Protecting your data that resides in the "cloud"

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?

Employees may be forced to use company resources only for business purposes.
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
Employees may not be able to view or download spyware.
Employees may not be able to view or download malware.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a cookie?

A tool that guides users step-by-step through a software installation process
A tool that verifies the identity of a user who logs on to a computer system
A small text file that contains information sent between a server and a client to help track user activities
An technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

For what purpose should you use automatic cookie handling in most browsers?

To configure your browser to accept first-party cookies but reject third-party cookie
To control when and from whom cookies are accepted
To configure your browser to display warnings pending the receipt of first-party and third-party cookies
To configure your browser to accept third-party cookies but reject first-party cookies

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following Windows Internet Explorer privacy level settings blocks cookies from third-party Web sites that do not have a compact policy, and deletes cookies from third-party Web sites that use your personal information without your consent?

Medium
Accept all cookies
High
Low

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?