题目内容

The information that people voluntarily post in social networking sites, blogs, andphoto- and video-sharing sites is used to create their:

A. access approval
B. firewall
C. online identity
D. phish

查看答案
更多问题

Computer criminals who create and distribute malicious programs.

A. antispies
B. crackers
C. cyber traders
D. identity thieves

Programs that come into a computer system disguised as something else are called:

A. Trojan horses
B. viruses
C. web bugs
D. zombies

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

A. cyberbullying
B. online harassment
C. social networking discrimination
D. unethical communication

Special hardware and software used to control access to a corporation’s private network is known as a(n):

A. antivirus program
B. communication gate
C. firewall
D. spyware removal program

答案查题题库