Chapter2 Part 2

Is this your test? Login to manage it. If not, you can generate an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following describes a scheme used to take money under false pretenses?
2.
1 point
______________ refers to using material created by another person and claiming it as your own.
3.
1 point
Keying text in ALL CAPS is considered to be shouting.
4.
1 point
To reduce the possibility of identity theft, keep your social security card in your wallet at all times.
5.
1 point
Copyright is a form of protection granted by the U.S. government protecting works such as books, articles, music, plays, movie scripts, and artwork.
6.
1 point
Firewalls break down network defenses, leaving computers vulnerable to hackers and viruses.
7.
1 point
A destructive program loaded onto a computer and run without the computer owner's knowledge is called a:
8.
1 point
Accessing computers or networks without permission is called hacking.
9.
1 point
______________ theft occurs when a criminal steals an individual's personal information and pretends to be that person.
10.
1 point
A document that tells how personal data will be used is called a: