Info Tech Quiz 4
Terms
undefined, object
copy deck
- private
- when the other side gets back scrambled data their use their ___ key to unscramble it bcause only they have it
- ISPs
- gives everyone access to the Internet
- IP addresses
- ISPs have a limited number of _____ they can give out
- Internet Service Provider
- ISP
- online profiling
- commercial websites would like to take as much personal info. from you as possible. taking this info, is called _______
- no
- is it okay to forward emails from people without their consent?
- WEP
- uses a key to encrypt the data
- wired network
- are typically how we connect desktop computers to our system of resources
- encryption
- the process of obscuring information to make it unreadable without special knowledge
- cookies
- websites will put a file on your computer in order to track where you go and what you do on the Interent. this is called _____
- internet
- the higher level view of all these smaller systems operating together
- no
- is it appropriate to cause harm using an anonymous email account?
- no
- are anonymous email accounts truly anonymous?
- telecommunication system
- a system that sends data
- private policy
- websites indicate what information they take from users and what they intend to do with it in their __________
- WEP and WPA
- the two main types of wireless security
- IP addresses
- are assigned to all computers that communicate on the Internet
- no
- can you expect privacy when you are on school email?
- Wired Equivalency Privacy
- WEP
- security
- when we have wireless networks we always need to be concerned about _____
- encrypt
- to secure information sent through the Internet we ___ it
- the longer the more secure, the more different characters, the more secure
- two ways to make password security more secure
- spam and phishing
- two things to be wary of in terms of email security
- secure
- when we send messages, etc. we have no say in how these messages get to thier final destination, but we can _____ the messages
- no
- can you expect privacy when you are on the Internet at school?
- spam
- electronic junkmail
- https: or the padlock
- you can tell if a website is secure if the have one or both of these signs
- radio waves
- wireless networks ar run using these which can be intercepted
- key cryptography
- in this type of encryption there is a key that is public and one that is private for each communicating party
- WPA
- This is more secure than WEP
- network
- is defined as one or more computers connected together using a telecommunication system for the purpose of communicating and sharing resources
- encryption
- is used to protect cell phone infromation and ATM transactions
- access points
- wireless networks consist of these
- cryptography
- the study of message security
- target advertising
- the information is analyzed and used to present ads that pertain to you
- scrambled data
- when we send data out, we use thier public key to encrypt the data, then we send back_____
- passwords
- we use these to allow use to log on to secure networks
- WPA
- uses a password or paraphrase to encrypt the data
- no
- is it okay to share private information about others in private or public settings on the Internet?
- talk with parents about allowable information, read privacy policy, and be aware of surveys, contests, and questionaires
- to protect you privacy you should do three 3 things.....
- spam
- unwanted messages that are unsolicited and sent to a large number of people
- Wi-Fi Protected Access
- WPA
- wired and wireless
- what are the two main types of networks?
- wireless network
- how we connect at school and at hot spots, and possibly home
- password
- a form of secret authentication data that is used to control access to a resource
- share information, share resources, and communicate
- why do we have networks?
- phishing
- an online con game used to attempt to gain access to personal information
- encryption
- we use this as extra security for our connection
- Internet Protocol
- IP
- password
- encrypts the information before we send it out of our computer