(csc134) ch9 - Privacy, Security and Ethics

(csc134) ch9 - Privacy, Security and Ethics

University

25 Qs

quiz-placeholder

Similar activities

Algoritma Remedial RPL

Algoritma Remedial RPL

University

20 Qs

Jarkom STMIK MERCUSUAR 01

Jarkom STMIK MERCUSUAR 01

University

20 Qs

Ulangan Harian Analisis Data 8C

Ulangan Harian Analisis Data 8C

8th Grade - University

20 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

ITE TEST 2

ITE TEST 2

University

20 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

SOFTWARE 7I

SOFTWARE 7I

7th Grade - University

20 Qs

Spreadsheet Fundamentals - Quiz2

Spreadsheet Fundamentals - Quiz2

University

20 Qs

(csc134) ch9 - Privacy, Security and Ethics

(csc134) ch9 - Privacy, Security and Ethics

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

ABD RICK

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main concern of Privacy in computing?

Restricting access to software
Collecting and using personal data
Avoiding plagiarism
Ensuring ethical programming

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a common privacy issue?

Accuracy
Ownership
Property
Access

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does a cookie do?

Scans your device for viruses
Sends email from anonymous accounts
Tracks user activity and stores data on websites visited
Encrypts your Internet traffic

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which law protects personal financial information in the U.S.?

HIPAA
FERPA
DMCA
Gramm-Leach-Bliley Act

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of using Incognito Mode in browsers?

To block ads
To avoid tracking by your ISP
To ensure browsing activity is not recorded on your hard drive
To automatically delete downloads

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Denial of Service (DoS) attack?

Stealing someone's password
Flooding a system with traffic to slow it down or crash it
Installing software updates
Encrypting system files for backup

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A computer infected by malware and used to launch attacks without the owner's knowledge is known as a:

Worm
Hacker
Zombie
Botnet

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?