
230303_5.6_SafeComputing

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Bob Hannah
Used 5+ times
FREE Resource
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
The activities of a user browsing in an anonymous window will not be visible to people who monitor the user’s network, such as the system administrator.
Items placed in a Web store’s shopping cart for future purchase during the anonymous browsing session will not be saved on the user’s computer.
A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?
Calling the bank at its official phone number to ask whether the request for personal information is legitimate
Calling the phone number given in the e-mail and providing the personal information over the phone
Checking that the domain name of the sender’s e-mail address is associated with the bank
Conducting aWeb search to see if other people have received similar requests for personal information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the greatest potential for compromising a user’s personal privacy?
A group of cookies stored by the user’s Web browser
The Internet Protocol (IP) address of the user’s computer
The user’s e-mail address
The user’s public key used for encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Question
Which of the following is most likely to be a data privacy concern for StreamPal users?
Users of the application are required to rate songs in order to enable all of the application’s features.
Users of the application may have the ability to determine information about the locations of users that are not on their contact list.
Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.
Users of the application may not have similar music taste to any other users on their contact list.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Question
Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?
Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.
Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.
Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are true statements about digital certificates in Web browsers?
I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication.
II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
I only
II only
I and II
Neither I nor II
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?
The sender’s public key
The sender’s private key
The recipient’s public key
The recipient’s private key
Create a free account and access millions of resources
Similar Resources on Wayground
23 questions
SLR14 | Hardware and Software

Quiz
•
11th Grade
23 questions
2.8 Social Engineering 5

Quiz
•
12th Grade
25 questions
Operating Systems

Quiz
•
9th - 12th Grade
27 questions
BJC AP CSP Unit 3 Exam Review

Quiz
•
9th - 12th Grade
25 questions
DP1 Term 1 Unit 1 Revision Quizziz

Quiz
•
11th Grade
24 questions
Animation Unit A

Quiz
•
12th Grade
25 questions
1ST QUARTER RECAP QUIZ

Quiz
•
12th Grade
28 questions
Introduction to Technology Review

Quiz
•
9th - 10th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
CTEA Computer Vocab Terms #1

Quiz
•
12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade