No student devices needed. Know more
20 questions
What is the definition of Cyber Bulling?
The use of the internet to blackmail someone.
The use of the internet to do school work.
The use of internet to bully or harm somebody else
The use of the internet to show others love ad respect.
An adult Internet user who uses social media or chat rooms to approach and eventually harass them, usually for inappropriate or abusive reasons is???
Cyber bullying
Hacker
Identity Theft
Online Predator
A computer program which replicates and spreads itself from one computer to another is ??
Hacker
Botnet
Computer Virus
Firewall
A collection of computers controlled by users other than their owners to perform automated tasks over the Internet is ???
Virtual Private Network
Social Engineering Vector
E-mail Scam
Botnet
A Social Engineering Vector is ???
Method through which hackers can gain access to a
computer
Fraud which involves stealing personal information for financial gain
through e-mail
Software designed to protect computers from viruses
Security component which encrypts data and keeps it private
within a public network
What is a Hacker??
Someone who knows a lot about computers
Someone who is an expert at computer programming and
who is able to solve computer problems, but also means someone who illegally gains access to others’ computer for their own profits
Someone who can break codes and get into other peoples computers.
All of the Above
A crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain???
Hacker
Identity Theft
Online Predator
None of the above
A fraud which involves stealing personal information for financial gain through e-mail is???
Hacker
Firewall
Identity Theft
E-mail Fraud
What is Firewall???
exception to copyright infringement
ownership of any creative work or invention
fraud which involves stealing personal information for financial gain
through e-mail
software designed to protect computers from viruses
What is Intrusion Detection System???
device which monitors network activities for malicious
attacks and produces reports to a management station
crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain
method through which hackers can gain access to a
computer
computer program which replicates and spreads itself from one
computer to another
What is Virtual Private Network???
security component which encrypts data and keeps it private
within a public network
All of the Above
keep data private within a public network
a security component
What is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer ???
Intranet
Entrant
Cloud Computing
Home page
What is a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen???
hypertext
Hyperlink
Hacker
spyware
what does WAV mean???
Waveform Audio File Format
Waveform Anti File
Waves As Formal
I don't know
True or False! Intellectual Property is the ownership of any creative work.
True
False
True or False!! Fair use is exception to copyright infringement.
False
True
True or False!! Spyware is software that allows users to obtain information about other peoples computer.
True
False
True
False
What is a small text file created by a website?
Hypertext
Cookie
Emoticon
Piracy
What is a Central Processing unit???
PUC
CUP
PCU
CPU
What are websites and applications that enable users to create and share content or to participate in social networking???
E-mail scam
Social Media
Internet
Home page
Explore all questions with a free account