
Ch.9 MC
Authored by JAE HWA CHOI
Computers
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Privacy concern that relates to the responsibility to ensure correct data collection.
accurary
access
history
identity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Individuals who collect and sell personal data.
information brokers
Trojan horses
phishers
DRM"
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Small data files deposited on your hard disk from websites you have visited.
digital footprints
online identities
cookies
crackers
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wide range of programs that secretly record and report an individual’s activities on the Internet.
spyware
viruses
zombies
web bugs
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malicious programs that damage or disrupt a computer system.
zombies
malware
cookies
firewalls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Infected computers that can be remotely controlled.
Trojan horses
zombies
crackers
WPA2
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Used by scammers to trick Internet users with official-looking websites.
online identity
history file
phishing
Trojan horse
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?