Using publically available databases, information resellers create _______ and sell them to direct marketers, fundraisers, and others.
A. digital footprints
B. proxy people
C. electronic profiles
D. virtual avatars
查看答案
_______ is the illegal assumption of someone's identity for the purposes of economic gain.
A. Denial of service attack
B. Keystroke logging
Cyberbullying
D. Identity theft
_______ store information about the current session, your general preferences, and your activity on the website.
A. First-party cookies
B. Web bugs
C. Third-party cookies
D. Keystroke loggers
_______ are used by advertising companies to keep track of your web activity as you move from one site to the next.
A. Sniffers
B. Third-party cookies
C. Keystroke loggers
D. First-party cookies
A(n) _______ is someone who gains unauthorized access to computer systems.
A. cracker
B. cookie
C. hacker
D. logger