You are on page 1of 2

9/16/2017 Multiple Choice Quiz 1

Home > Chapter 9 > Multiple Choice Quiz 1

Course-wide Content
Animations
Multiple Choice Quiz 1
(Se e re late d page s)
C areers
Environment

Results Reporter
Ethics
Explore
Making IT Work
DVD Direct
Tips Out of 10 questions, you answered 10 correctly with a final grade of 100%
Privacy
10 correct (100%)
C hapte r 9 0 incorrect (0%)
Quizzes 0 unanswered
Multiple Choice Qui... (0%)
Multiple C hoice Quiz 2
Matching Quiz 1 Your Results:
Matching Quiz 2
More Resources The correct answer for each question is indicated by a .
Flashcards
1 The three primary privacy issues are accuracy, property, and:
CORRECT
A) access

B) ethics

C) ownership

D) security

2 Highly detailed and personalized descriptions of individuals are electronic:


CORRECT
A) cookies

B) histories

C) profiles

D) web bugs

3 Browsers store the locations of sites visited in a:


CORRECT
A) history file

B) menu

C) tool bar

D) firewall

4 The browser mode that ensures your browsing activity is not recorded.
CORRECT
A) detect

B) insert

C) privacy

D) sleep

5 The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to
CORRECT create their:
A) access approval

B) firewall

C) online identity

D) phish

6 Computer criminals who create and distribute malicious programs.


CORRECT
A) antispies

B) crackers

C) cyber traders

D) identity thieves

7 Programs that come into a computer system disguised as something else are called:
CORRECT
A) Trojan horses

B) Viruses

C) web bugs

D) Zombies

8 The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person
CORRECT is known as:
A) cyberbullying

B) online harassment

C) social media discrimination

D) unethical communication

http://highered.mheducation.com/sites/0073516899/student_view0/chapter9/multiple_choice_quiz_1.html 1/2
9/16/2017 Multiple Choice Quiz 1
9 Special hardware and software used to control access to a corporation's private network is known as a(n):
CORRECT
A) antivirus program

B) communication gate

C) firewall

D) spyware removal program

10 To prevent copyright violations, corporations often use:


CORRECT
A) ACT

B) DRM

C) VPN

D) WPA2

E-mail Your Results

Date: Sat Sep 16 2017 17:12:17 GMT+0530 (India Standard Time)


My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To le arn m ore about the book this we bsite supports, ple ase visit its Inform ation C e nte r.

Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy

http://highered.mheducation.com/sites/0073516899/student_view0/chapter9/multiple_choice_quiz_1.html 2/2

You might also like