Search Header Logo

2.1 PLTW Data Diligence

Authored by Erin LoBue

Computers

9th Grade

Used 84+ times

2.1 PLTW Data Diligence
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

0 sec • 1 pt

Information about an individual, such as social security number, age, race,phone number(s), medical information, financial information, andbiometric data such as fingerprint records and retina scans.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The unauthorized access or retrieval of confidential or otherwise protected data.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Small text-based bits of information about your browser that a web server saves.

4.

FILL IN THE BLANK QUESTION

0 sec • 1 pt

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information,such as passwords and credit card numbers.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

6.

FILL IN THE BLANK QUESTION

0 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

7.

FILL IN THE BLANK QUESTION

0 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?