Chapter 8
Chapter 8
Chapter 9
Chapter 9
Mixed
8 & 9
100

Part of the Deep Web that cannot be accessed with a regular web browser and consist of anonymously hosted websites.

What is the Dark Web?

100

This provides a way for people to use portions of a copyrights work.

What is fair use?

100

Criminal action perpetuated primarily using a computer.

What is cybercrime?

100

A program that gathers information about you while on the web without your knowledge.

What is spyware?

100

The use of computer for non-work related activities when an individual is at work is called _______.

What is cyberloafing?
200

_______ enables copyright holders to grant certain rights to the work.

What is copyleft?

200

Violations of a holders rights is called ______.

What is copyright infringement?

200
One of the most widespread cybercrime is the creation and distribution of __________ _________.

What is computer viruses?

200

Typical a two-factor authentication involve _______ and ________.

What is a password and an ID card/fingerprint/security question & answer/biometric scan?

200

A computer controlled by a hacker.

What is a zombie?

300

It is considered works without copyright protection.

What is public domain?

300

The illegal use of copyrighted software is called ______.

What is software piracy?

300

A program that enable a hacker to gather information and steal your logons and passwords is a _______ ________.

What is packet analyzer?

300

Small text files contain information about you when you surf some web sites.

What are cookies?

300

A program that allows a hacker to gain access to your computer without your knowledge.

What is a rootkit?

400

________ are stories that are invented and are intended to spread misinformation.

What is fake news?

400

This enables direct anonymous transactions between users.

What is cryptocurrency?

400

A _____ _____ ________ is configured in a firewall to ignore all incoming packets that request access to a particular port.

What is logical port blocking?
400

A type of backup that ensures a complete snapshot of all that makes your computer run.

What is an image?

400

Work is created and fixed into a digital or physical form is considered starts the _________ protection.

What is copyright?

500

__________ begins when a work is created and fixed into a digital or physical form.

What is copyright?

500

_________ incorporates into society as true events even though they are not.

What is urban legends?

500

____ floods a computer with request until it shuts down.

What is a DDOS (distributed denial of service)?

500
Named after a housing construction feature that slows the spread of fires from home to home.

What is a firewall?

500

Part of the internet that cannot be found using a search engine is called _____.

What is Deep Web?