Lesson 8: CIW

Lesson 8: CIW

8th Grade

37 Qs

quiz-placeholder

Similar activities

Computer Systems

Computer Systems

7th - 9th Grade

42 Qs

ISAC Team Quiz

ISAC Team Quiz

KG - Professional Development

40 Qs

OSI ( Network Model)

OSI ( Network Model)

KG - University

40 Qs

M4 Lesson 2 Quiz Review

M4 Lesson 2 Quiz Review

7th - 12th Grade

36 Qs

Computer Security  Ergonomics

Computer Security Ergonomics

1st - 12th Grade

35 Qs

IT Quiz - G8/G9

IT Quiz - G8/G9

8th Grade

39 Qs

KS3 Computing Terms C

KS3 Computing Terms C

7th - 9th Grade

32 Qs

Test Y8: ICT Applications

Test Y8: ICT Applications

8th Grade

38 Qs

Lesson 8: CIW

Lesson 8: CIW

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Alison Rayman

Used 43+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Because spam is sent to you uninvited, it can be considered:
a licensing agreement.
an invasion of privacy.
a trademark violation.
copyright infringement.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.
Because JavaScript and ActiveX controls cannot be authenticated.
Because JavaScript and ActiveX controls place an inordinate amount of cookies on your system.
Because JavaScript and ActiveX controls cannot be encrypted.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To what does "The Right to Be Forgotten" argument relate?
Protecting your image and personal information in the world of social networking
Protecting your data from computer viruses
Hiding your image and personal information from potential spammers
Protecting your data that resides in the "cloud"

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?
Employees may be forced to use company resources only for business purposes.
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
Employees may not be able to view or download spyware.
Employees may not be able to view or download malware.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a cookie?
A tool that guides users step-by-step through a software installation process
A tool that verifies the identity of a user who logs on to a computer system
A small text file that contains information sent between a server and a client to help track user activities
An technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

For what purpose should you use automatic cookie handling in most browsers?
To configure your browser to accept first-party cookies but reject third-party cookie
To control when and from whom cookies are accepted
To configure your browser to display warnings pending the receipt of first-party and third-party cookies
To configure your browser to accept third-party cookies but reject first-party cookies

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following Windows Internet Explorer privacy level settings blocks cookies from third-party Web sites that do not have a compact policy, and deletes cookies from third-party Web sites that use your personal information without your consent?
Medium
Accept all cookies
High
Low

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?