Chapter 2 part 2

Is this your test? Login to manage it. If not, you can create an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the followoing describes a scheme used to take money under false pretenses
2.
1 point
______________________ refers to using material created by another person and claiming it as your own.
3.
1 point
Keying test in ALL CAPS is considered to be shouting.
4.
1 point
To reduce the possibility of identity theft, keep your social security card in a secure place at all times.
5.
1 point
Copyright is a form of protection granted by the U.S. government protecting works such as books, articles, music, plays, movie scripts, and artwork.
6.
1 point
Firewalls break down network defenses, leaving computers vulnerable to hackers and viruses.
7.
1 point
A destructive program loaded onto a computer and run without the computer owner's knowledge is called a:
8.
1 point
Accessing computers or networks without permission is called hacking
9.
1 point
_____________________ theft occurs when a criminal steals an individual's personal information and pretends to be that person
10.
1 point
a document that tells how personal data will be used is called a: