
230303_5.6_SafeComputing
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Bob Hannah
Used 5+ times
FREE Resource
Enhance your content in a minute
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
The activities of a user browsing in an anonymous window will not be visible to people who monitor the user’s network, such as the system administrator.
Items placed in a Web store’s shopping cart for future purchase during the anonymous browsing session will not be saved on the user’s computer.
A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?
Calling the bank at its official phone number to ask whether the request for personal information is legitimate
Calling the phone number given in the e-mail and providing the personal information over the phone
Checking that the domain name of the sender’s e-mail address is associated with the bank
Conducting aWeb search to see if other people have received similar requests for personal information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the greatest potential for compromising a user’s personal privacy?
A group of cookies stored by the user’s Web browser
The Internet Protocol (IP) address of the user’s computer
The user’s e-mail address
The user’s public key used for encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Question
Which of the following is most likely to be a data privacy concern for StreamPal users?
Users of the application are required to rate songs in order to enable all of the application’s features.
Users of the application may have the ability to determine information about the locations of users that are not on their contact list.
Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.
Users of the application may not have similar music taste to any other users on their contact list.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Question
Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?
Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.
Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.
Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are true statements about digital certificates in Web browsers?
I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication.
II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
I only
II only
I and II
Neither I nor II
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?
The sender’s public key
The sender’s private key
The recipient’s public key
The recipient’s private key
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
25 questions
PAS Kelas 7 Ganjil
Quiz
•
7th Grade - University
25 questions
latihan soal informatika SMALSA
Quiz
•
10th Grade
28 questions
4QICT12 - Current and Future Trends of Media and Information
Quiz
•
11th - 12th Grade
23 questions
4. razred TŠRB - KRMIS - SNMP
Quiz
•
11th Grade
25 questions
Q2_SummTest2
Quiz
•
9th Grade
25 questions
TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH
Quiz
•
5th Grade - University
25 questions
Mikrowave Link
Quiz
•
10th Grade
25 questions
Creación de Tablas en MS Word
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
