Buscar
Estás en modo de exploración. debe iniciar sesión para usar MEMORY

   Inicia sesión para empezar

level: Basic Issues

Questions and Answers List

level questions: Basic Issues

QuestionAnswer
If someone uses social media to deliberately harm others is called?Cyberbullying
Creating public arguments with people online and commenting in a way that frustrates them is calledTrolling
In countries like China, many foreign websites are banned. Such an act can be termed asInternet censorship
The act of monitoring what other people are doing on computer or internet is calledComputer surveillance
An illegal activity that involves computer or internet is calledCyber Crime
Flooding a network by sending useless traffic from multiple sources to a target system can be called asDistributed Denial of Service (DDos) Attack
The method of cracking passwords using trial and error or using an automated software can be termed asBrute force attack
Software that is freely available on the internet and is allowed to modify its source code can be called asOpen Source Software
Illegal copying of software is called asSoftware Piracy (Copyright Infringement)
What is DRM in the context of copyright?Digital Rights Management
The web browser Mozilla Firefox would fall under what kind of software:Open Source or Copyrighted?Open Source
What is DMCA in the context of copyright?Digital Millennium Copyright Act
What is GDPR stands for in the context of data protection?General Data Protection Regulation
Gaining access to a system by exploiting the weakness in the system security can be called asHacking
An electronic device sets for discarding/recycling/reusing can be termed asE-Waste
Is it advisable to supply credit card details on an e-commerce website without SSL?No
A program or file intentionally designed to harm a computer or network is calledMalware
The act of capturing data packets flowing across a network is calledPacket Sniffing
The act of modifying a copyrighted software in a way that affects its copy protection feature is calledSoftware Cracking
Is it a good practice to read privacy agreement before using a software or visiting a website?Yes