Computer criminals that create and spread viruses are punished under this law.
A. Gramm-Leach-Bliley Act
B. Freedom of Information Act
C. Family Educational Rights and Privacy Act
D. Computer Fraud and Abuse Act
查看答案
_______, a privacy issue, relates to the responsibility of controlling who is able to use data.
A. Encryption
B. Access
C. Restriction
D. Protection
Using publically available databases, information resellers create _______ and sell them to direct marketers, fundraisers, and others.
A. digital footprints
B. proxy people
C. electronic profiles
D. virtual avatars
_______ is the illegal assumption of someone's identity for the purposes of economic gain.
A. Denial of service attack
B. Keystroke logging
Cyberbullying
D. Identity theft
_______ store information about the current session, your general preferences, and your activity on the website.
A. First-party cookies
B. Web bugs
C. Third-party cookies
D. Keystroke loggers