_______ is the illegal assumption of someone's identity for the purposes of economic gain.
A. Denial of service attack
B. Keystroke logging
Cyberbullying
D. Identity theft
查看答案
_______ store information about the current session, your general preferences, and your activity on the website.
A. First-party cookies
B. Web bugs
C. Third-party cookies
D. Keystroke loggers
_______ are used by advertising companies to keep track of your web activity as you move from one site to the next.
A. Sniffers
B. Third-party cookies
C. Keystroke loggers
D. First-party cookies
A(n) _______ is someone who gains unauthorized access to computer systems.
A. cracker
B. cookie
C. hacker
D. logger
_______ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
A. Loggers
B. Cookies
C. History files
D. Web bugs