
230303_5.6_SafeComputing
Authored by Bob Hannah
Computers
9th - 12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
The activities of a user browsing in an anonymous window will not be visible to people who monitor the user’s network, such as the system administrator.
Items placed in a Web store’s shopping cart for future purchase during the anonymous browsing session will not be saved on the user’s computer.
A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?
Calling the bank at its official phone number to ask whether the request for personal information is legitimate
Calling the phone number given in the e-mail and providing the personal information over the phone
Checking that the domain name of the sender’s e-mail address is associated with the bank
Conducting aWeb search to see if other people have received similar requests for personal information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the greatest potential for compromising a user’s personal privacy?
A group of cookies stored by the user’s Web browser
The Internet Protocol (IP) address of the user’s computer
The user’s e-mail address
The user’s public key used for encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Question
Which of the following is most likely to be a data privacy concern for StreamPal users?
Users of the application are required to rate songs in order to enable all of the application’s features.
Users of the application may have the ability to determine information about the locations of users that are not on their contact list.
Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.
Users of the application may not have similar music taste to any other users on their contact list.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Question
Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?
Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.
Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.
Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are true statements about digital certificates in Web browsers?
I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication.
II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
I only
II only
I and II
Neither I nor II
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?
The sender’s public key
The sender’s private key
The recipient’s public key
The recipient’s private key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
24 questions
Html
Quiz
•
9th Grade
25 questions
Tin 9: Bài 13. Phần mềm ghi âm và xử lí âm thanh AUDACITY
Quiz
•
9th Grade
27 questions
Computadora
Quiz
•
1st - 12th Grade
24 questions
Fourth Grade March Rivision
Quiz
•
4th Grade - University
25 questions
Tugas Kuis Bandwidth - 2
Quiz
•
12th Grade
25 questions
Network Threat Prevention 2
Quiz
•
8th - 10th Grade
24 questions
Topic D - Types of programming and mark up languages
Quiz
•
12th Grade
24 questions
SE LIGA! Desenvolvendo Habilidades para o Futuro
Quiz
•
9th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade